隐私政策
(以下简称“我们”)深知个人信息对您的重要性,并会尽全力保护您的个人信息安全可靠。我们致力于维持您对我们的信任,恪守以下原则,保护您的个人信息:权责一致原则、目的明确原则、选择同意原则、最少够用原则、确保安全原则、主体参与原则、公开透明原则等。同时,我们承诺,我们将按业界成熟的安全标准,采取相应的安全保护措施来保护您的个人信息。请在使用我们的产品(或服务)前,仔细阅读并了解本《隐私权政策》。
一、我们如何收集和使用您的个人信息
个人信息是指以电子或者其他方式记录的能够单独或者与其他信息结合识别特定自然人身份或者反映特定自然人活动情况的各种信息。我们仅会出于本政策所述的以下目的,收集和使用您的个人信息:
(一)开展内部数据分析和研究,第三方SDK统计服务,改善我们的产品或服务我们收集数据是根据您与我们的互动和您所做出的选择,包括您的隐私设置以及您使用的产品和功能。我们收集的数据可能包括:定位信息、互联网服务提供商、时间戳、应用标识符、应用程序版本、独立设备标识符等。
当我们要将信息用于本策略未载明的其它用途时,会事先征求您的同意。当我们要将基于特定目的收集而来的信息用于其他目的时,会事先征求您的同意。
(一)共享
1、业务功能一:成为用户 我们不会向其他任何公司、组织和个人分享您的个人信息
2、我们可能会根据法律法规规定,或按政府主管部门的强制性要求,对外共享您的个人信息。
3、与授权合作伙伴共享:仅为实现本隐私权政策中声明的目的,我们的某些服务将由授权合作伙伴提供。我们可能会与合作伙伴共享您的某些个人信息,以提供更好的客户服务和用户体验。例如,我们聘请来提供第三方数据统计和分析服务的公司可能需要采集和访问个人数据以进行数据统计和分析。在这种情况下,这些公司
必须遵守我们的数据隐私和安全要求。我们仅会出于合法、正当、必要、特定、明确的目的共享您的个人信息,并且只会共享提供服务所必要的个人信息。
对我们与之共享个人信息的公司、组织和个人,我们会与其签署严格的保密协定,要求他们按照我们的说明、本隐私政策以及其他任何相关的保密和安全措施来处理个人信息
(二)转让 我们不会将您的个人信息转让给任何公司、组织和个人
二、我们如何保护您的个人信息
(一)我们已使用符合业界标准的安全防护措施保护您提供的个人信息,防止数据遭到未经授权访问、公开披露、使用、修改、损坏或丢失。我们会采取一切合理可行的措施,保护您的个人信息。我们会使用加密技术确保数据的保密性;我们会使用受信赖的保护机制防止数据遭到恶意攻击;我们会部署访问控制机制,确保只有授权人员才可访问个人信息;以及我们会举办安全和隐私保护培训课程,加强员工对于保护个人信息重要性的认识。
(二)我们会采取一切合理可行的措施,确保未收集无关的个人信息。我们只会在达成本政策所述目的所需的期限内保留您的个人信息,除非需要延长保留期或受到法律的允许。
(三)互联网并非绝对安全的环境,而且电子邮件、即时通讯、及与其他我们用户的交流方式并未加密,我们强烈建议您不要通过此类方式发送个人信息。请使用复杂密码,协助我们保证您的账号安全。
(四)互联网环境并非百分之百安全,我们将尽力确保或担保您发送给我们的任何信息的安全性。如果我们的物理、技术、或管理防护设施遭到破坏,导致信息被非授权访问、公开披露、篡改、或毁坏,导致您的合法权益受损,我们将承担相应的法律责任。
(五)在不幸发生个人信息安全事件后,我们将按照法律法规的要求,及时向您告知:安全事件的基本情况和可能的影响、我们已采取或将要采取的处置措施、您可自主防范和降低风险的建议、对您的补救措施等。我们将及时将事件相关情况以邮件、信函、电话、推送通知等方式告知您,难以逐一告知个人信息主体时,我们会采取合理、有效的方式发布公告。
同时,我们还将按照监管部门要求,主动上报个人信息安全事件的处置情况。
三、您的权利
按照相关的法律、法规、标准,以及其他国家、地区的通行做法,我们保障您对自己的个人信息行使以下权利: (一)访问您的个人信息 (您有权访问您的个人信息,法律法规规定的例外情况除外。如果您想行使数据访问权,可以通过以下方式自行访问:
账户信息——如果您希望访问您的账户中的个人资料信息,您可以通过访问设置中的个人账户功能执行此类操作。 如果您无法通过上述链接访问这些个人信息,您可以随时使用我们的 Web
表单联系,或发送电子邮件至。我们将在30天内回复您的访问请求。
对于您在使用我们的产品或服务过程中产生的其他个人信息,只要我们不需要过多投入,我们会向您提供。如果您想行使数据访问权,请发送电子邮件至。
(二)更正您的个人信息 (当您发现我们处理的关于您的个人信息有错误时,您有权要求我们做出更正。您可以通过“(一)访问您的个人信息”中罗列的方式提出更正申请。 如果您无法通过上述链接更正这些个人信息,您可以随时使用我们的 Web
表单联系,或发送电子邮件至。我们将在30天内回复您的更正请求。
(三)删除您的个人信息 在以下情形中,您可以向我们提出删除个人信息的请求:
1、如果我们处理个人信息的行为违反法律法规;
2、如果我们收集、使用您的个人信息,却未征得您的同意;
3、如果我们处理个人信息的行为违反了与您的约定;
4、如果您不再使用我们的产品或服务,或您注销了账号;
5、如果我们不再为您提供产品或服务。 若我们决定响应您的删除请求,我们还将同时通知从我们获得您的个人信息的实体,要求其及时删除,除非法律法规另有规定,或这些实体获得您的独立授权。
当您从我们的服务中删除信息后,我们可能不会立即备份系统中删除相应的信息,但会在备份更新时删除这些信息。
(四)改变您授权同意的范围 每个业务功能需要一些基本的个人信息才能得以完成(见本策略“第一部分”)。对于额外收集的个人信息的收集和使用,您可以随时给予或收回您的授权同意。
当您收回同意后,我们将不再处理相应的个人信息。但您收回同意的决定,不会影响此前基于您的授权而开展的个人信息处理。
(五)个人信息主体注销账户,软件并无注册登录信息记录,请放心使用。
(六)约束信息系统自动决策 在某些业务功能中,我们可能仅依据信息系统、算法等在内的非人工自动决策机制做出决定。如果这些决定显著影响您的合法权益,您有权要求我们做出解释,我们也将提供适当的救济方式。
(七)响应您的上述请求
四、免责声明
1、用户违反本《协议》或相关的服务条款的规定,导致或产生的任何第三方主张的任何索赔、要求或损失,包括合理的律师费,用户同意赔偿
与合作公司、关联公司,并使之免受损害。
2、用户因第三方如电信部门的通讯线路故障、技术问题、网络、电脑故障、系统不稳定性及其他各种不可抗力原因而遭受的一切损失,
及合作单位不承担责任。
3、因技术故障等不可抗事件影响到服务的正常运行的,
及合作单位承诺在第一时间内与相关单位配合,及时处理进行修复,但用户因此而遭受的一切损失,
及合作单位不承担责任。
4、 本服务同大多数互联网服务一样,受包括但不限于用户原因、网络服务质量、社会环境等因素的差异影响,可能受到各种安全问题的侵扰,如他人利用用户的资料,
造成现实生活中的骚扰;用户下载安装的其它软件或访问的其他网站中含有“特洛伊木马”等病毒,威胁到用户的计算机信息和数据的安全,继而影响本服务的正常 使用等等。用户应加强信息安全及使用者资料的保护意识,要注意加强密码保护,以免遭致损失和骚扰。
5、用户须明白,使用本服务因涉及Internet服务,可能会受到各个环节不稳定因素的影响。因此,本服务存在因不可抗力、计算机病毒或黑客攻击、系统
不稳定、用户所在位置、用户关机以及其他任何技术、互联网络、通信线路原因等造成的服务中断或不能满足用户要求的风险。用户须承担以上风险,
不作担保。对因此导致用户不能发送和接受阅读信息、或接发错信息,
公司不承担任何责任。
6、用户须明白,在使用本服务过程中存在有来自任何他人的包括威胁性的、诽谤性的、令人反感的或非法的内容或行为或对他人权利的侵犯(包括知识产权)的匿
名或冒名的信息的风险,用户须承担以上风险,
和合作公司对本服务不作任何类型的担保,不论是明确的或隐含的,包括所有有关信息真实性、适商
性、适于某一特定用途、所有权和非侵权性的默示担保和条件,对因此导致任何因用户不正当或非法使用服务产生的直接、间接、偶然、特殊及后续的损害,不承担 任何责任。
五、知识产权保护
1 知识产权声明
(1)本“软件”是由
开发。“软件”的一切版权、商标权、专利权、商业秘密等知识产权,以及与“软件”相关的所有信息内容,包括但不限于:文字表述及其组合、图标、图饰、图表、色彩、界面设计、版面框架、有关数据、印刷材料、或电子文档等均受中华人民共和国著作权法、商标法、专利法、反不正当竞争法和相应的国际条约以及其他知识产权法律法规的保护,除涉及第三方授权的软件或技术外,
享有上述知识产权。
(2)未经
书面同意,用户不得为任何营利性或非营利性的目的自行实施、利用、转让或许可任何三方实施、利用、转让上述知识产权,
保留追究上述未经许可行为的权利。
2 “软件”授权范围
(1)
用户可单一台终端设备上安装、使用、显示、运行本“软件”。,不可以对该软件或者该软件运行过程中释放到任何计算机终端内存中的数据及该软件运行过程中客户端与服务器端的交互数据进行复制、更改、修改、挂接运行或创作任何衍生作品,形式包括但不限于使用插件、外挂或非经授权的第三方工具/服务接入本“软件”和相关系统。
(2) 保留权利:未明示授权的其他一切权利仍归
所有,用户使用其他权利时须另外取得
的书面同意。
Privacy Policy
(hereinafter referred to as "we") is well aware of the importance of personal information to you and will do our best to protect the security and reliability of your personal information. We are committed to maintaining your trust in us, adhering to principles such as the consistency of rights and responsibilities, clear purposes, choice and consent, minimal necessity, ensuring security, subject participation, and transparency. At the same time, we promise to adopt corresponding security measures to protect your personal information in accordance with mature industry standards. Please carefully read and understand this "Privacy Policy" before using our products (or services).
1. How We Collect and Use Your Personal Information
Personal information refers to various information recorded by electronic or other means that can identify the identity of a specific natural person alone or in combination with other information or reflect the specific activities of a specific natural person. We will only collect and use your personal information for the following purposes as stated in this policy:
(1) Conduct internal data analysis and research, third-party SDK statistical services, improve our products or services. We collect data based on your interactions with us and the choices you make, including your privacy settings and the products and features you use. The data we collect may include: location information, internet service provider, timestamps, application identifiers, application versions, unique device identifiers, etc.
When we use information for purposes not specified in this policy, we will seek your consent in advance. When we use information collected for specific purposes for other purposes, we will seek your consent in advance.
(2) Sharing
1. Business Function One: Becoming a User. We will not share your personal information with any other companies, organizations, and individuals.
2. We may share your personal information with third parties in accordance with legal requirements or mandatory requirements from government regulatory authorities.
3. Sharing with authorized partners: Only to achieve the purposes stated in this Privacy Policy, some of our services will be provided by authorized partners. We may share some of your personal information with partners to provide better customer service and user experience. For example, companies hired to provide third-party data statistics and analysis services may need to collect and access personal data for data statistics and analysis. In this case, these companies must comply with our data privacy and security requirements. We will only share your personal information for legitimate, lawful, necessary, specific, and clear purposes, and only share the personal information necessary to provide the service.
For companies, organizations, and individuals with whom we share personal information, we will sign strict confidentiality agreements with them, requiring them to process personal information in accordance with our instructions, this privacy policy, and any other relevant confidentiality and security measures.
(3) Transfer. We will not transfer your personal information to any company, organization, or individual.
2. How We Protect Your Personal Information
(1) We have used security protection measures that comply with industry standards to protect the personal information you provide to prevent unauthorized access, public disclosure, use, modification, damage, or loss of data. We will take all reasonable measures to protect your personal information. We will use encryption technology to ensure the confidentiality of data; we will use trusted protection mechanisms to prevent data from being maliciously attacked; we will deploy access control mechanisms to ensure that only authorized personnel can access personal information; and we will hold security and privacy protection training courses to enhance employees' awareness of the importance of protecting personal information.
(2) We will take all reasonable measures to ensure that irrelevant personal information is not collected. We will only retain your personal information for the period required to achieve the purposes stated in this policy, unless it is necessary to extend the retention period or permitted by law.
(3) The internet is not an absolutely secure environment, and communication methods such as email, instant messaging, and communication with other users are not encrypted. We strongly recommend that you do not send personal information through such means. Please use complex passwords to help us ensure the security of your account.
(4) The internet environment is not 100% secure, and we will do our best to ensure or guarantee the security of any information you send to us. If our physical, technical, or managerial protective facilities are compromised, leading to unauthorized access, public disclosure, tampering, or destruction of information, resulting in damage to your legitimate rights and interests, we will bear corresponding legal responsibilities.
(5) In the event of a personal information security incident, we will inform you promptly in accordance with legal requirements, including the basic situation and possible impact of the security incident, the measures we have taken or will take, suggestions for you to independently prevent and reduce risks, and remedial measures for you. We will inform you of the relevant situation through email, letters, phone calls, push notifications, and other methods in a timely manner. If it is difficult to inform each individual information subject one by one, we will adopt reasonable and effective methods to announce it.
At the same time, we will proactively report the disposal of personal information security incidents to regulatory authorities in accordance with regulatory requirements.
3. Your Rights
According to relevant laws, regulations, standards, and common practices in other countries and regions, we ensure that you exercise the following rights regarding your personal information:
(1) Access to your personal information. You have the right to access your personal information, except in cases provided for by laws and regulations. If you want to exercise the right of access to data, you can access it through the personal account function in the settings. If you wish to access personal information in your account and cannot access it through the above link, you can use our web form or send an email to [email protected]. We will respond to your access request within 30 days. For other personal information generated during your use of our products or services, we will provide it to you as long as it does not require excessive investment on our part. If you want to exercise the right of access to data, please send an email to [email protected].
(2) Correction of your personal information. When you find errors in the personal information we process about you, you have the right to request correction. You can submit a correction application through the methods listed in "(1) Access to your personal information". If you cannot correct this personal information through the above link, you can use our web form or send an email to [email protected]. We will respond to your correction request within 30 days.
(3) Deletion of your personal information. In the following situations, you can request the deletion of personal information:
1. If our processing of personal information violates laws and regulations;
2. If we collect and use your personal information without your consent;
3. If our processing of personal information violates the agreement with you;
4. If you no longer use our products or services, or you have canceled your account;
5. If we no longer provide products or services to you. If we decide to respond to your deletion request, we will also notify entities that have obtained your personal information from us to promptly delete it, unless otherwise provided by laws and regulations, or these entities obtain your independent authorization. After you delete information from our services, we may not immediately delete the corresponding information in the backup system, but we will delete this information when the backup is updated.
(4) Change the scope of your authorized consent. Each business function requires some basic personal information to be completed (see the "First Part" of this policy). For the collection and use of additional personal information, you can give or withdraw your consent at any time. After you withdraw your consent, we will no longer process the corresponding personal information. However, your decision to withdraw consent will not affect the personal information processing carried out based on your authorization before.
(5) Account cancellation by the data subject. The software does not record registration and login information, so you can use it with confidence.
(6) Restriction of automated decision-making by the information system. In some business functions, we may make decisions based solely on non-human automatic decision-making mechanisms such as information systems and algorithms. If these decisions significantly affect your legitimate rights and interests, you have the right to ask us for an explanation, and we will also provide appropriate remedies.
(7) Response to your above requests.
Disclaimer
1. In the event of the user violating this Agreement or relevant service terms, resulting in any third-party claims, demands, or losses, including reasonable legal fees, the user agrees to indemnify
and its affiliated companies and exempts them from harm.
2.
and its affiliated units are not liable for any losses incurred by users due to third-party factors such as telecommunication line failures, technical issues, network and computer malfunctions, system instability, and other force majeure reasons.
3. In the case of technical malfunctions or other uncontrollable events affecting the normal operation of the service,
and its affiliated units promise to cooperate with relevant entities to promptly handle and repair the issues. However,
and its affiliated units do not assume responsibility for any losses suffered by users as a result.
4. Like most internet services, this service is susceptible to various security issues due to factors such as user behavior, network service quality, and social environment differences. Users should enhance awareness of information security and protect user data.
is not responsible for any losses or harassment caused by others using user information.
5. Users must understand that due to the nature of internet services, interruptions or failure to meet user requirements may occur due to factors such as force majeure, computer viruses, hacker attacks, system instability, user location, user shutdown, and other technical, internet network, and communication line reasons. Users bear these risks, and
does not provide any guarantees.
is not liable for any damages resulting from the user's inability to send or receive messages or the sending/receiving of incorrect messages.
6. Users must understand the risk of encountering threatening, defamatory, offensive, or illegal content or actions from any other party during the use of this service, including anonymous or misrepresented information that infringes on the rights of others (including intellectual property rights). Users assume these risks, and
and its affiliated companies do not provide any type of guarantee regarding the authenticity, suitability, specific purpose, ownership, and non-infringement of all information. [Company name] and its affiliated companies do not assume any liability for any direct, indirect, incidental, special, or consequential damages resulting from the user's improper or illegal use of the service.
Intellectual Property Protection
1. Intellectual Property Declaration (1)
This "software" is developed by
. All copyrights, trademarks, patents, trade secrets, and other intellectual property rights related to the "software," as well as all information content related to the "software," including but not limited to: text expressions and their combinations, icons, decorations, charts, colors, interface designs, layout frameworks, related data, printed materials, or electronic documents, are protected by the Copyright Law of the People's Republic of China, the Trademark Law, the Patent Law, the Anti-Unfair Competition Law, and corresponding international treaties, as well as other intellectual property laws and regulations. Except for software or technology authorized by third parties,
reserves the above intellectual property rights.
(2) Without the written consent of
, users may not implement, utilize, transfer, or license any third party for their own profit or non-profit purposes to implement, utilize, or transfer the above-mentioned intellectual property.
reserves the right to pursue unauthorized actions.
2. "Software" Authorization Scope (1)
Users can install, use, display, and run this "software" on a single terminal device. Users are not allowed to copy, change, modify, link to run, or create any derivative works of the data released to any computer terminal memory during the operation of the software or the interactive data between the client and server during the operation of the software, including but not limited to using plugins, add-ons, or unauthorized third-party tools/services to access this "software" and related systems.
(2) Reserved Rights: All other rights not expressly authorized still belong to
. Users must obtain written consent from
when using other rights.