Privacy Policy

The Company (collectively "" or" we ") has always solemnly undertaken to protect the personal information and privacy security of users (collectively "Users" or "you") who use the products and Services (collectively "Services"). When you use the Services, we may collect and use your personal information. We hope that through the Privacy Policy (hereinafter referred to as the "Policy") to explain to you the corresponding processing rules and other related matters when we collect and use your relevant personal information, in order to better protect your rights and interests.
[Special Note] This policy applies to all services we provide. When you use any of our individual services, you agree to be protected by this policy and the specific privacy information policy terms that we set up in that individual service (hereinafter referred to as the "Specific Terms"), in which case the specific terms and terms of this Policy will be effective for you. For users under 14 years of age, both this policy and the Self-Regulation Convention apply. If there is any inconsistency between a particular term and this Policy term, the specific term shall prevail within the scope of the specific term. If a single service provided by us does not apply to this Policy, the service will expressly exclude the application of this policy in an appropriate manner.
Before using the services, please be sure to carefully read and thoroughly understand this policy, especially the terms marked in bold, you should focus on reading, after confirming full understanding and consent before starting to use. If you do not agree with the contents of this policy, it may cause the service to fail to operate normally, or cannot achieve the service effect we intend to achieve, you should immediately stop accessing/using the Service.
After reading this Policy, if you have any questions about this Policy or matters related to this Policy, you can contact us through the feedback channels listed in the "How to Contact Us" section of this Policy, and we will answer you as soon as possible.
This policy will help you understand the following:
How do we collect and use Personal Information
2. How do we use COOKIES or similar technologies
Personal information we may share, transfer and disclose
How do we store and protect Personal information
5. How to manage your personal information
6. third party services
7. Protection of minors
8. Amendments and Notices
9. how to contact us
How do we collect and use Personal Information
We collect your personal information primarily to make it easier and more satisfying for you and other users to use the Services. Our goal is to provide all Internet users with a safe, fun and educational experience online, and this information helps us achieve this goal.
(a) We will collect and obtain your personal information through the following ways:
1. Information you provide. For example:
(1) Information you provide to us when you register for the Service or use the Service;
(2) The shared information you provide to third parties through the Services, and the information stored when you use the Services.
Please note that your information may be collected and used by others if you disclose it in information you upload or post in public areas of the Service that are visible to other users, or in your response to information uploaded or posted by others. If you become aware that others have improperly collected or used your information, you may contact us through the feedback channels listed in the "How to Contact Us" section of this Policy.
2. Your information shared by third parties. That is, shared information about you provided by third parties when they use the Services.
3. Information we obtain about you. When you use the Service, we collect, summarize, and record information, such as log information, location information, and device information.
(b) We will collect and use the following types of your personal information for the following purposes:
We need to remind you that because our products and services are more, the content provided to you is also different, so the relevant business functions (including the type of your personal information collected by it) will also be different due to the content of the products/services you choose, please refer to the actual use of products/services prevail. In addition, you understand and agree that we want to provide you with perfect products and services, so we will continue to improve our products and services, which means that as products and services are iterated, expanded, upgraded, etc., we may often introduce new services or business functions or reclassify business functions. It may be necessary to collect new personal information or change the purpose or manner of use of personal information. If we want to use your personal information for other purposes not specified in this policy or collect additional personal information not mentioned, we will obtain your consent separately through page prompts, interactive processes, website announcements or other means in accordance with the law. During this process, you can contact us through the feedback channels listed in the "How to Contact Us" section of this policy, and we will respond to you as soon as possible.
1. Help you complete registration and login
In order for us to provide you with continuous and stable services and ensure the security of your use of the Services, we require you to provide basic registration or login information, including mobile phone number, email address, and create your account, user name and password. In some individual services, if you only need to use basic functions such as browsing and search, you do not need to register as a user and provide the above information.
2. Realize identity authentication
In accordance with relevant laws and regulations and regulatory requirements, or to meet the needs of user identity verification, security of systems and services and other specific service functions, we may require you to provide real identity information (such as name, ID card, passport, driver's license, household registration), biometric information (static or dynamic) and other identity information to complete identity authentication. If you do not provide the above information, we will not be able to provide you with the relevant functions and services.
For the purpose of identity authentication, you agree and authorize us to provide, query and check your aforementioned identity information to relevant identity authentication agencies (such as personal credit bureaus, government departments, etc.) on our own or by a third party.
Please note that your identity information, biometric information and other sensitive personal information, please provide carefully, if you refuse to provide you may not be able to obtain the relevant services, but it will not affect the normal use of other functions and services.
3. Maintain the normal operation of basic functions
When you use our services, in order to provide you with basic functions such as browsing and searching, identify abnormal account status, understand the suitability of products, ensure the network and operation security of the services, and maintain the normal operation of the above-mentioned basic functions, we may directly or indirectly collect and store information about the services you use and the way you use them, and associate such information. This information includes:
(1) Log information: When you use our services (including background running status), we may automatically collect details about your use of our services and save them as relevant network logs. For example: your login account, search query content, IP address, browser type, telecom operator, network environment, language used, date and time of visit and the web browsing record of your visit, Push open record, stay time, refresh record, post record, follow, subscribe, favorite and share.
(2) Device information: When you use our services (including background running status), we may receive and record information about the devices you use. For example: Equipment models, operating system and version, the client version, resolution, the package name, equipment, process, and the list of software, device identifier (MAC address/IMEI/Android ID/IDFA/OpenUDID/GUID/SIM card IMSI Information), software and hardware characteristics, and information about the location of the device (such as IP address, GPS location, and WLAN access points, Bluetooth, and base station sensors that can provide relevant information). In order to collect the above basic personal device information, we will apply for the right to access your device information, we collect this information to provide you with our basic services and basic functions, if you refuse to provide the above permission may cause you to be unable to use the service.
Please note that individual device information and log information are information that cannot identify a specific natural person. If we combine such non-personal information with other information to identify a specific natural person, or use it with personal information, during the period of combined use, such non-personal information will be regarded as personal information, and unless authorized by you or otherwise provided for by laws and regulations, we will anonymize and de-identify such personal information. During the combined use, this information will be treated and protected as your personal information in accordance with this policy.
4, to provide you with interactive and publishing services
When you use the Services, upload and/or post information, and engage in related interactive behaviors (such as post, reply to post, top post, like article, post talk, share, contribute game material), we will collect information you upload, post or form, and use your nickname, avatar, and post content for display.
Please note that the information you publicly release may contain your personal information or sensitive personal information, please carefully consider before Posting. If the information you post involves the personal information of others, you should obtain the consent of others before Posting.
5, to help you complete the order, payment and delivery of goods or services to you
In order to show you the transaction information of your account and ensure the security of the transaction, we will collect the information generated during your use of the service (such as the information of the goods or services you have purchased, the specific order number, the time when the order was created, the transaction amount) for showing you and facilitating your management of the order;
6, to provide you with customer service or other user response functions
When you contact our customer service or use other user response features (such as in-sale requests, personal information protection complaints or suggestions, other customer complaints and needs), we may require you to provide the necessary personal information to match and verify your user identity in order to protect your account and system security. We may also store your contact information (which you use when contacting us or other contact information that you voluntarily provide to us), the records and contents of your communications/calls with us, and other necessary information related to your needs, in order to contact you or help you solve the problem, or to record the resolution and results of the relevant problem.
7. Your personal information we collect indirectly:
Based on the services you choose to use, we may obtain information from affiliates and third-party partners that you authorize to share. For example, when you use a third-party platform account to log in to the service, we will obtain the relevant information under the third-party account according to your authorization (including: user name, nickname, avatar, the specific content of your authorization shall be subject to), and after you agree to this policy, your third-party account and your service account will be bound, so that you can directly log in and use the service through the third-party account. We will collect and use your information in accordance with relevant laws and regulations, and in accordance with the agreement with related parties or third party partners, and under the premise that the information provided by them is legitimate.
8. Provide you with information display and push of goods or services
Based on the information you provide to us, the information we may collect and the information we collect from you indirectly (such as your browsing and search history, device information, location information, order information), we may, based on a combination of one or more of the above information, Carry out recommendation algorithm modeling, programmatic advertising recommendation algorithm modeling, user behavior analysis and user portrait to extract your browsing, search preferences, behavior habits, location information related features, in order to provide you with more suitable page display and recommendation personalized content. We may also send you marketing messages, user surveys and surveys based on signature tags to help us improve our services and to offer or promote our/third parties' goods and services as follows:
Our goods and services, including but not limited to: Instant messaging services, online media services, interactive entertainment services, social networking services, payment services, Internet search services, location and mapping services, application software and services, data management software and services, online advertising services, Internet finance and other social media, entertainment, online games, e-commerce, information and communication software and services;
And third party goods and services, including but not limited to: Internet services, food and dining, sports, music, movies, television, live performances and other arts and entertainment, books, magazines and other publications, clothing and accessories, jewelry, cosmetics, personal health and hygiene, electronics, collectibles, housewares, appliances, home decor and furnishings, pets, automobiles, hotels, transportation and travel, banking, insurance and financial services, points And reward programs, as well as other goods and services that we believe may be relevant to you.
If you want to manage our personalized services, you can follow the guidelines provided by the individual services you use.
9, to provide you with security
In order to improve the security of your use of the services provided by us and our partners, protect the personal and property safety of you or other users or the public from infringement, better prevent phishing websites, fraud, network vulnerabilities, computer viruses, network attacks, network intrusion and other security risks, and more accurately identify violations of laws and regulations or service related agreement rules, We may collect, use or integrate your account information, transaction information, device information, log information and information authorized by our affiliates and partners from you or shared by law to comprehensively determine your account and transaction risks, conduct identity verification, detect and prevent security incidents, and take necessary recording, audit, analysis and disposal measures in accordance with law.
10. You understand and agree that some individual services may require you to enable specific access rights in your device to achieve the collection and use of information related to these rights. For example:
(1) After you open the storage permission, you allow us to access your storage space, so that you can download and save content, or through caching to achieve the corresponding services and other functions;
(2) After you open the device information rights, you allow us to obtain your device information as a unique identifier of your device, in order to provide you with more suitable page display and recommend personalized content, understand the suitability of products, identify abnormal states and ensure the network and operation security of services;
(3) After you open the permission of the album and/or camera (camera), you can upload and take photos/pictures/videos, achieve the release of information and comments, live video or communicate with customer service to provide proof and other functions;
(4) After you open the address book permission, we can obtain your address book friend information, in order to provide you with friend status query, invite your friends to use the service, share content/products to people you know and other functions;
(5) After you turn on the microphone and relevant voice rights, you can use the voice function to exchange information with our products and others, or contact customer service;
(6) After you open the location rights, we can obtain your location information, so that you can exchange information with nearby friends or push personalized content to you;
(7) After you turn on our permission to read/write your calendar, we can obtain your schedule time in order to provide you with records, appointments, reminders and other functions.
When you need to turn off these features, most mobile devices will support you to do so, please refer to or contact your mobile device service provider or manufacturer for details. Please note that if you turn on any permission, you authorize us to collect and use the relevant information to provide you with the corresponding service. If you turn off any permission, you cancel the authorization. We will no longer collect and use the relevant information based on the corresponding permission, and we will not be able to provide you with the corresponding service. However, your decision to turn off permissions will not affect the collection and use of information previously conducted under your authorization.
11. Exceptions to authorized consent
According to relevant laws and regulations, the collection of your information in the following circumstances does not require your authorization consent:
(1) Directly related to national security and national defense security;
(2) directly related to public safety, public health, and major public interests;
(3) directly related to criminal investigation, prosecution, trial and execution of judgments;
(4) In order to protect the life, property and other major legitimate rights and interests of you or other individuals, but it is difficult to get my consent;
(5) The personal information collected is disclosed to the public by you;
(6) necessary for the conclusion and performance of the contract at your request;
(7) Collecting personal information from legally publicly disclosed information, such as legal news reports, government information disclosure channels;
(8) necessary for the conduct of legitimate news reporting;
(9) Other circumstances provided by laws and regulations.
12. Tips on sensitive personal information
Sensitive personal information refers to personal information that, once leaked or illegally used, is likely to lead to the violation of the human dignity of natural persons or harm to the safety of person and property. The above information provided by you or collected by us may contain your sensitive personal information, such as ID card number, personal biometric information (static or dynamic), bank account number, communication records and contents, property information, whereabouts, accommodation information, transaction information. Please be careful and pay attention to sensitive Personal information, you agree that we may process your sensitive personal information for the purposes and in the manner described in this policy.
2. How do we use COOKIES or similar technologies
We or our partners may obtain and use your information through COOKIES or similar technologies and store such information as log information.
By using COOKIES, we provide users with a simple and personalized web experience. A cookie is a small amount of data that is sent from a web server to your browser and stored on your computer's hard disk. We use COOKIES for the benefit of their users. For example, to make the login process of the virtual community faster, you can choose to store the user name in a cookie. This will make it easier and faster the next time you want to log in to the service. COOKIES help us determine which pages and content you connect to, how much time you spend on a particular service and which service you choose.
COOKIES enable us to serve you better and faster, and to personalize your experience with the service. However, you should be able to control whether and how COOKIES are accepted by your browser. Please consult the documentation that comes with your browser for more information on this.
We and our third party partners may collect and use your information through COOKIES or similar technologies and store such information.
We use our own COOKIES or similar technologies for the following purposes:
1. Remember who you are. For example, COOKIES or similar technologies help us identify you as a registered user of ours, or save you from providing us with preferences or other information about you;
2. Analyze your use of our services. We may use COOKIES or similar technologies to understand what activities you use the Services for or which services are most popular;
3. Advertising optimization. COOKIES or similar technologies help us to provide you with relevant advertising based on your information rather than general advertising.
When we use COOKIES or similar technologies for the purposes described above, we may provide aggregate non-personally identifiable information collected through COOKIES or similar technologies to advertisers and other partners for analyzing how you and other users use the Services and for advertising purposes.
There may be COOKIES or similar technologies placed on the Services by advertisers and other partners. These COOKIES and similar technologies may collect non-personally identifiable information about you in order to analyze how users use the services, to send you advertisements that may be of interest to you, or to evaluate the effectiveness of advertising services. The collection and use of such information by these third party COOKIES or similar technologies is not governed by this policy, but by their own information protection statements, and we are not responsible for third party COOKIES or similar technologies.
You can refuse or manage COOKIES or similar technologies through your browser or user selection mechanism. However, please note that if you disable COOKIES or similar technologies, we may not be able to provide you with the best service experience and some services may not work properly. At the same time, you will still receive ads, but they will be less relevant to you.
Personal information we may share, transfer or disclose
(1) Sharing
We take the protection of your personal information very seriously. We will not share your personal information with any third party without your consent, except in the following circumstances:
1. Sharing necessary to implement our services/functions. In some cases, we need to share your information with third parties to realize the functions of our products and/or services, so that you can normally use the services you need, including: (1) Sharing the corresponding transaction order information and payment amount information with third-party payment institutions that provide payment services; (2) Share order information with third-party merchants and logistics service providers on the platform; (3) Share the information required for real-name authentication with real-name authentication service providers; (4) other necessary sharing with suppliers, service providers and business partners in connection with our services/functions.
2. Necessary sharing with some of our partners. We may need to share your information with certain partners for the necessary/reasonable purpose of conducting business smoothly, meeting your requests, fulfilling our obligations under the relevant User Agreement or this Policy, exercising our rights or complying with legal requirements, including: (1) Share log information and equipment information with partners who provide data services (including online advertising monitoring, data statistics, data analysis, etc.); (2) To provide product analysis services (including application crash analysis, network performance analysis, domain name resolution optimization) to share your product usage (such as crash, flash down) statistical data; (3) Share your relevant information (including: device information) with partners who provide marketing services (including advertising, marketing); (4) Share with the partners who entrust us to promote how many people have viewed their promotional information or purchased products after seeing such information, or provide them with non-personally identifiable statistical information to help them understand their audience or customers; (5) Other necessary sharing with some of our partners.
3. Necessary sharing with our affiliates. In order to facilitate us to provide you with consistent services based on a unified account system, and to facilitate your unified management, personalized recommendation, and security of the system and account, your personal information may be shared between us and our affiliates as necessary, including: 1) In order to help you save time and simplify the operation process, you can log in to some individual services without re-registration after registering our mobile phone account/email account, and the relevant information of your account will be shared within our products and our affiliates as necessary; 2) In order to enable you to have a consistent and personalized browsing, advertising and other service experience on our and our affiliates' products and/or services, you acknowledge and agree that your account information, device information, related browsing data and other information reflecting your usage habits and preferences may be shared with our affiliates.
4, to achieve the other purposes described in Article 1 of this policy, "How we collect and use Personal Information" section.
5, to fulfill our obligations and exercise our rights under this Policy or other agreements we have with you.
6. Within the scope permitted by laws and regulations, we may exchange information with other companies and organizations in order to comply with the law, protect us and our affiliates or partners, you or other users or social public interests, property or safety from damage, such as to prevent fraud and other illegal activities and reduce credit risks. However, this does not include information that is sold, rented, shared or otherwise disclosed for profit in violation of the commitments made in this Policy.
7. Upon your legitimate demand or upon your authorization.
8. Provide your information upon lawful request of your guardian.
9. Provided in accordance with the individual service agreement signed with you (including the electronic agreement signed online and the corresponding platform rules) or other legal documents.
10. Based on academic research.
11, based on the social public interests in line with laws and regulations.
We will only share your personal information for legal, legitimate, necessary, specific and explicit purposes. We sign strict confidentiality agreements with the companies, organizations and individuals with whom we share personal information, requiring them to handle the information in accordance with our instructions, this policy and any other relevant confidentiality and security measures.
(2) Transfer
1. As our business continues to grow, we may engage in mergers, acquisitions, asset transfers or similar transactions, and your information may be transferred as part of such transactions. We will require the new company or organization that holds your personal information to continue to be bound by this policy, otherwise, we will require the company or organization to seek authorization from you again.
2, after obtaining your express consent, we will transfer your personal information to a third party.
(3) Disclosure
We will only disclose your personal information in the following circumstances and with industry-standard security measures in place:
1. According to your needs, disclose the information you specify under the disclosure method you expressly agree to.
2. When it is necessary to provide your information according to the requirements of laws, regulations, mandatory administrative law enforcement or judicial requirements, we may disclose your information according to the type of information and disclosure method required. Under the premise of complying with laws and regulations, when we receive the above request for disclosure of information, we will require the recipient to provide the corresponding legal documents, such as subpoenas or investigation letters. We strongly believe that we should be as transparent as possible about the information we are asked to provide to the extent permitted by law. All requests are carefully reviewed to ensure they have a legitimate basis and are limited to data that law enforcement has a legitimate right to obtain for specific investigative purposes.
(4) Exceptions to obtaining prior authorized consent when sharing, transferring or disclosing information
In the following cases, the sharing, transfer and disclosure of your information do not require your prior authorization and consent:
1. Directly related to national security and national defense security;
(2) Directly related to public safety, public health and major public interests;
(3) Directly related to judicial or administrative law enforcement such as criminal investigation, prosecution, trial and execution of sentences;
4, for the protection of your or other individuals' life, property and other major legitimate rights and interests, but it is difficult to get my consent;
5. Information that you disclose to the public by yourself;
(6) Collecting information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels;
7. Related to our fulfillment of obligations stipulated by laws and regulations.
According to the law, the sharing, transfer and disclosure of de-identified personal information, and ensuring that the data recipient cannot recover and re-identify the information subject, does not belong to the external sharing, transfer and public disclosure of personal information, and the storage and processing of such data will not need to notify you and obtain your consent.
How do we store and protect Personal information
(1) Storage of personal information
Unless otherwise required by law, regulation or regulatory authorities, we will only store your personal information for the shortest period necessary for the purposes described in this Policy. If we terminate our services or operations, we will promptly stop the activities of continuing to collect your personal information, and will comply with relevant laws and regulations to inform you in advance, and delete or anonymize your personal information after termination of services or operations, except as otherwise stipulated by laws and regulations or regulatory authorities.
Personal information collected and generated by our operations in the People's Republic of China is stored in the People's Republic of China, except for the following circumstances:
1, laws and regulations have clear provisions;
2. Obtain your authorization and consent;
3, the service you use involves cross-border, and you need to provide your personal information overseas. In view of the above circumstances, we will ensure that it is implemented in accordance with national laws and regulations and relevant regulatory authorities, and provide adequate protection for your personal information.
(2) Protection of personal information
We attach great importance to information security, set up a dedicated security team, and take all reasonable and practicable measures to protect your personal information:
1. Data security technical measures
We will adopt industry-standard security measures, including the establishment of reasonable systems and norms, security technology to prevent your personal information from being unauthorized access, use, modification, to avoid data damage or loss.
Our services adopt a variety of encryption technologies, for example, in some services, we will use encryption technology (such as SSL) to encrypt your personal information and isolate it through isolation technology to protect your personal information.
In the use of personal information, such as information display, information correlation calculation, we will use a variety of data desensitization technology to enhance the security of information in use.
We also use strict data access control and multi-factor authentication technology to protect personal information and prevent unauthorized use of data.
2. Other security measures we take to protect personal information
We have the industry's advanced data as the core, around the data life cycle of the data security management system, from the organizational construction, system design, personnel management, product technology and other aspects to enhance the security of the entire system. We manage and regulate the storage and use of personal information by establishing data classification and classification systems, data security management norms, and data security development norms.
We have full security control over data through access confidentiality agreements, monitoring and auditing mechanisms.
We also conduct security and privacy training courses to enhance our employees' security awareness and understanding of our personal information protection policies and procedures.
3. We only allow employees and partners who need to know this information to access your personal information, and set up strict access control and monitoring mechanisms for this purpose. We also require all persons who may have access to your personal information to fulfill the corresponding confidentiality obligations. Failure to meet these obligations may result in legal liability or suspension of the partnership.
4, the Internet is not an absolutely secure environment, and E-mail, instant messaging, social software or other services to communicate with other users can not be sure whether the full encryption, we recommend that you use such tools please use complex passwords, and pay attention to protect your information security. When communicating with third parties or purchasing goods and services through the Services, you will inevitably disclose your own information, such as contact information or postal address, to the counterparty or potential counterparty. Please protect your personal information and provide it to others only when necessary.
5, the Internet environment is not 100% secure, we will do our best to ensure or guarantee the security of your personal information sent to us. If our physical, technical, or management protection facilities are damaged, resulting in unauthorized access to personal information, public disclosure, tampering, or destruction, resulting in damage to your legitimate rights and interests, we will bear the corresponding legal responsibilities.
6. Security incident handling
In order to deal with the possible risks such as leakage, damage and loss of personal information, we have formulated a number of systems to clarify the classification and classification standards of security incidents and security vulnerabilities and the corresponding processing process. We have also established an emergency response team for security incidents, which, in accordance with the requirements of the safety incident handling norms, launches safety plans for different security incidents, carries out stop loss, analysis, positioning, formulation of remedial measures, and joint with relevant departments for tracing and combating. We also organize regular internal training and emergency drills so that our relevant staff can master the corresponding emergency response strategies and procedures.
In the event of an information security incident, we will inform you in a timely manner in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, the suggestions you can independently prevent and reduce risks, and the remedial measures for you. At the same time, we will timely inform you of the relevant information of the event by email, letter, telephone, push notification, etc. When it is difficult to inform the information subject one by one, we will take a reasonable and effective way to release the announcement. At the same time, we will also proactively report the disposal of information security incidents in accordance with the requirements of the regulatory authorities.
Please understand that due to technical limitations and risk prevention limitations, even if we have tried to strengthen security measures, it is not always possible to guarantee 100% security of information. You need to understand that the systems and communication networks you use to access the Services may be subject to problems due to circumstances beyond our control.
Please be sure to keep your account number, password and other identity elements safe. When you use the Services, we will identify you by your account number, password and other elements of identity. Once you disclose the above information, you may suffer losses and may be used against you. If you find that your account, password and/or other identity elements may or have been leaked, please contact us immediately so that we can take appropriate measures in a timely manner to avoid or reduce relevant losses.
5. How to manage your personal information
(a) Access, update and delete
We encourage you to update and modify your personal information to make it more accurate and effective.
If you want to query, modify, or delete your part information, please login account center (: http://user.td22.com/logins.aspx;) As well as the relevant function pages of each individual service, we provide you with relevant operation guidelines and operation Settings. For your information collected through COOKIES or similar technologies, we also describe the options available to you in section 2 of this Policy, "How We Use COOKIES or similar technologies."
You may also contact us for your processing through the feedback channels listed in the "How to Contact Us" section of this Policy. We will take appropriate technical means or contact channels to enable you to access, update and delete your personal information or other information provided when using the Services, except as otherwise provided by laws and regulations.
Unless otherwise provided by laws and regulations, when you correct or delete your personal information, we may not immediately correct or delete the corresponding information from the backup system, but will correct or delete such information when the backup is updated.
(2) Openness and sharing
Many of our services allow you to publicly share information about yourself, not only with your social network, but also with all users of the Services, for example, information you upload or post on the Services, your responses to information uploaded or posted by others, by email or in public areas of the Services that are not visible to specific users, And include location data and log information related to this information. The information may remain in the public domain as long as you do not delete the information you have disclosed or shared; Even if you delete the shared information, the information may still be cached, copied or stored independently by other users or third parties not under our control, or stored in the public domain by other users or such third parties. If you disclose or share information through the above channels, we will not be responsible for the disclosure of your information. Therefore, we remind and ask you to carefully consider whether to disclose or share your information through the above channels.
(III) Change the scope of your authorization
You can always choose whether to disclose personal information to us. Some personal information is necessary to use the Services, but the provision of most other information is at your discretion. You can change the scope of your authorization for us to continue collecting information or withdraw your authorization by deleting information, disabling device functions, canceling your account, etc.
After the authorization is withdrawn, we cannot continue to provide you with the services corresponding to the withdrawal of the authorization, and we will no longer process your corresponding information. However, your decision to withdraw your authorization will not affect the processing of information previously conducted on the basis of your authorization.
(4) Obtaining copies of personal information
If you need a copy of your personal information, you can contact us through the feedback channels listed in the "How to Contact Us" section of this policy, after verifying your identity, we will provide you with a copy of your personal information in our services (including basic information, identity information), except as otherwise stipulated by laws and regulations or otherwise agreed in this policy.
(5) Responding to your above requests
For security purposes, you may need to provide a written request or otherwise prove your identity. We may ask you to verify your identity before processing your request. For your reasonable request, we do not charge fees in principle, but for repeated requests that exceed reasonable limits, we will charge a certain cost fee according to the situation. We may reject requests that are unnecessarily repetitive, require too much technical effort (for example, the development of new systems or fundamental changes to existing practices), pose a risk to the legitimate interests of others, or are highly impractical (for example, involving information stored on backup tapes).
We will not be able to respond to your request in the following circumstances:
1. Related to our performance of obligations stipulated by laws and regulations;
2. Directly related to national security and national defense security;
(3) Directly related to public safety, public health and major public interests;
(4) Directly related to criminal investigation, prosecution, trial and enforcement of judgments;
5, we have sufficient evidence that you have subjective malice or abuse of rights;
6, for the protection of your or other individuals' life, property and other major legitimate rights and interests, but it is difficult to get my consent;
7. Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals and organizations;
8. Involving trade secrets.
Sixth, third party services
The Services may access or link to social media or other services (including websites or other forms of services) provided by third parties. Includes:
1, you can use the "Share" button to share certain service content to the third party service, or you share the third party service content to the service. These features may collect information about you (including your log information) and may install COOKIES on your device in order to function properly;
2, we provide you with links through advertising or other means of our services, so that you can link to third party services or websites;
3. Other situations of accessing third-party services. For example, to achieve the purposes stated in this Policy, we may access SDKS or other similar applications provided by third party service providers (such as in the form of embedded code, plug-ins, etc.) in order to provide you with better customer service and user experience. At present, the third-party service providers we access mainly include the following types:
(1) For advertising related services, including advertising display, advertising data monitoring/statistics, etc.;
(2) For message Push function, including mobile phone manufacturer push push, specific event reminder, personalized content recommendation, etc.;
(3) For payment related services, including order payment, transaction behavior verification, income settlement, payment information summary statistics, etc.;
(4) For obtaining device location rights, collecting device information and log information with your consent;
(5) For third-party authorization services, including third-party account login, sharing of relevant content to third-party products;
(6) Used to support product function modules, including online live broadcast, video playback, voice recognition, AR, intelligent customer service, bullet-screen playback, content storage, etc.;
(7) Used to optimize product performance, including improving hardware distribution network capabilities, reducing server costs, functional hot repair, etc.;
(8) For account security, product reinforcement related services, including network monitoring, domain name resolution, anti-hijacking, anti-spam, anti-cheating, encryption and decryption services.
Some third party SDKS or similar applications that we access may collect your personal information, and if you use such services provided by third parties in our services, you agree that your information will be directly collected and processed by them. We will assess the legality, legitimacy and necessity of such third-party services to collect personal information, and require such third parties to take protective measures against your personal information and strictly comply with relevant laws, regulations and regulatory requirements. You may also choose to contact us through the feedback channels listed in the "How to Contact Us" section of this Policy, and we will respond to you as soon as possible.
The above third party social media or other services are operated by the relevant third party. Your use of such third parties' social media services or other services (including any information you provide to such third parties) is subject to the third parties' own Terms of Service and Information Protection Statement (not this Policy), and you should read their terms carefully. This policy applies only to the personal information we collect and does not apply to any third party services or third party information use rules. If you find that these third party social media or other services are risky, we recommend that you terminate the relevant operations to protect your legitimate rights and interests and contact us in a timely manner.
7. Protection of minors
We recommend that any minors participating in online activities should obtain the prior consent of their parents or other guardians (hereinafter referred to as "guardians"). We will protect minors' information in accordance with relevant national laws and regulations.
We encourage guardians to guide minors in using the services. If you are a minor under the age of 16, please inform your guardian to jointly read and accept our Self-Regulation Convention and seek their consent and guidance before you use the Services or submit personal information.
In order to provide you with better services, we may timely modify the terms of this policy according to the update of the service and the relevant requirements of laws and regulations, and such changes form a part of this policy. We will post any changes to this policy on this page. We may also provide more prominent notices (including website announcements, push notifications, pop-ups or other means) for material changes, including but not limited to:
8. Amendments and Notices
1. Our service model has undergone significant changes. Such as the purpose of processing personal information, the type of personal information processed, the use of personal information, etc.;
2. We have made significant changes in our ownership structure. Such as business adjustment, bankruptcy merger and acquisition caused by the owner change;
3, the main object of personal information sharing, transfer or public disclosure has changed significantly;
4, your rights to participate in the processing of personal information and the way they are exercised have changed significantly;
5, we are responsible for handling personal information security departments, contact methods and complaint channels have changed significantly;
6, other important or may seriously affect your personal rights and interests occur.
Any changes we make will put your satisfaction first. We encourage you to review our Privacy policy every time you use the Services.
Nine, how to contact us
We have established a dedicated Personal information protection department that will protect your personal information in accordance with this policy. If you have complaints and reports about network information security, or you have any questions, comments or suggestions about this policy, privacy measures, and matters related to your information, please contact the person in charge of personal information protection, contact QQ: 99066725.
In general, we will process your question, comment or suggestion within 15 working days after we receive it and verify your user identity. If you are not satisfied with our processing, you can also complain to the department that performs the duty of personal information protection.
CompanyName:GARDNERH LLC
E-mail:gardnerhllc@outlook.com