Personal information protection policy

This release date: 2020 Nian 11 Yue 06 Ri

Effective Date: 2020 Nian 11 Yue 06 Ri

 

In order to effectively protect users' personal information and optimize user experience, we have formulated a "Personal Information Protection Policy" ( " this policy " ) in accordance with current laws and policies . This policy will detail the policies and measures for obtaining, managing and protecting users' personal information. This policy applies to all services provided to you, regardless of whether you obtain services through computer equipment, mobile terminals or other devices. 

If you have any questions about this policy or related matters, you can contact us at any time by visiting the online customer service system, official service account, or calling any of our customer service telephones.

This policy will help you understand the following:

1. Collection of personal information

2. The use of cookies and web beacons  

3. Use of personal information

4. Protection and security measures of personal information

5. Storage of personal information

6. Sharing, transfer and public disclosure of personal information

7. Management of personal information

8. Special protection of personal information of minors

9. Modification of personal information protection policy

10. Dispute resolution

This policy is the basic legal document for your use of the service and various functions. We hope you read carefully before using the service and make it clear that you have fully understood and accepted the content of this policy, and hope that you can make appropriate choices based on your own understanding . We strive to express the relevant terms involved in this policy in popular language and provide links to further explanations for your better understanding. After we update this policy (we will prompt you to update it), if you continue to use our products and / or services, you agree to the content of this policy ( including updated versions ) and agree to our collection and use in accordance with this policy , Save and share your related information.

The personal information involved in this policy includes: network identification information (including system accounts , IP addresses , email addresses, and passwords and secrets related to the foregoing ); address books; personal Internet records (including search records , software use records , and click records) ); Personal commonly used device information (including hardware model , device MAC address , operating system type , software list, unique device identification code (such as IMEI / android ID / IDFA / OPENUDID / GUID , SIM card IMSI information, etc. ) Information about the basic condition of the equipment).

Personal sensitive information refers to personal information that, once leaked, illegally provided or abused, may endanger personal and property safety, and easily lead to personal reputation, physical and mental health damage, or discriminatory treatment. Personal sensitive information involved in this policy includes: network identity Identification information (including account name , account nickname , email address, and password and password protection questions and answers related to the foregoing ); other information (including address book , personal phone number , mobile phone number , travel information , web browsing history , precise location information , Bank account ). For personal sensitive information, we will mark it in this policy, please read it carefully.

Collection of personal information

Before you use, we will guide you to read this policy. If you agree to this policy, it means that you know and agree to the entire content of this policy, and we will collect and use your personal information in accordance with the content of the policy; if you do not agree to this policy, you may not be able to use all or part of the functions and Services, or unable to obtain more personalized functional services.

Your personal information will only be collected in the following situations:

When you send and use the provided location location service, we will collect your location information and device information . This information is collected to provide you with sign-in information sharing services, or to provide you with more accurate and personalized services and to protect your account security. Ensure that other irrelevant information will not be collected when using location services on your device.

When you use the provided search service, we will collect your query keyword information , search history , and device information . In order to provide an efficient search service, some of this information will be temporarily stored in your local storage device. Here, you need to note that your keyword information cannot individually identify your personal identity, and it does not belong to your personal information, so we have the right to use it for other purposes; only when you search for keywords When the information is related to your other information and can identify your personal identity, during the combined use period, we will use your search keyword information as your personal information, which will be carried out in accordance with this policy along with your search history. Treatment and protection.

If you want to get information about your city, the specific location information of your device will be collected . The collected information will not involve other information about your device.

When you use the services provided by a third party in China, you need to allow the third party to collect your order information , payment information, etc. If you refuse the third party to collect such information when providing services, you may not be able to use it in China Third-party services.

Based on the effective protection of your information, we will de-identify the collected information to protect your information security. I hope you understand and accept that you have the right to analyze and commercialize your information that has been de-identified, provided that the collected information is de-identified and your personal information will not be disclosed. Of use.

When you log in to a third-party application, the third party may obtain your personal nickname , avatar and other information. If you refuse to provide such information to a third party, you can turn off the settings, turn off the path: PC end - I - Management Center - my application - Remove third-party applications.

When it involves national security and interests, social public interests, and related activities related to criminal investigations, or the safety of your or other people’s lives and property but in special circumstances you cannot obtain your timely authorization, and can obtain from other legal and open channels or laws Under other circumstances stipulated by laws and regulations, your personal information may be collected without your consent or authorization.

In some special circumstances, you will be required to provide paper information such as relevant certificates . If you provide such paper-based information as required, you will be properly handled and notified in time within 30 days of receiving your paper-based information .

In addition, if your personal information is obtained outside of the above-mentioned scenarios, your express consent will be obtained again, and the application scenario and the content and scope of obtaining your relevant information will be fully explained to you before obtaining your express consent.

When you use Mini Programs on our platform, we may obtain necessary personal information (such as device information, operation log information) from Mini Program developers and their technical service providers for the purpose of providing technical support for docking. ), in which we will obtain your separate authorization for sensitive personal information. If you refuse to collect relevant personal information, it may result in the failure of the overall function or part of the mini program. When you use Mini Program services through our platform, Mini Program developers and technical service providers will collect and use your personal information in accordance with the privacy protection policies provided by them. It is recommended that you read and confirm your understanding of the relevant agreements before accepting relevant services. .

Of Cookie and web beacon used

Cookies can help websites identify registered users, count the number of users, and are usually used by websites to determine whether registered users have already logged in. We promise that the research on cookie information will only be used for the purpose of improving service / product quality and optimizing user experience. At the same time, if you don’t want your personal information to be kept in cookies , you can configure your browser: select " reject cookies" or " notify you when the website sends cookies " , you should know that the services provided by the company are implemented by supporting cookies Yes , after completing the operation of turning off cookies , it may affect your access or services that cannot be fully obtained. When you do not disable cookies , you may be prompted whether to keep user information the next time you enter this website to simplify login procedures (such as one-click login).

The method and purpose of using web beacon are the same as cookies .

Use of personal information

In order to provide you with better services or products, your personal information will be used in the following situations: 

1) According to the requirements of relevant laws and regulations; 

2) According to your authorization; 

3) According to the relevant terms of service and application license agreement.

In addition, you know and agree that: within the scope permitted by current laws and regulations, your non-sensitive personal information may be used for marketing, including but not limited to: using the information you provide to display it to you Or provide advertisements and promotional materials, notify or recommend service or product information to you, and other such information that may be of interest to you based on your use of the service or product. It also includes the information that you choose to share when you take certain actions such as authorization, such as when you add friends, add landmarks in your feed, and use contact import tools.

Personal information protection and security measures

1. All reasonable efforts will be made to protect the personal information of users we obtain, and the personal information will be protected by a dedicated data security department. In order to prevent users' personal information from being illegally accessed, copied, modified, transmitted, lost, destroyed, processed or used in unexpected and unauthorized situations, the following measures have been and will continue to be taken to protect your personal information:

1 ) Our network service adopts encryption technologies such as the transport layer security protocol, and provides browsing services through https and other methods to ensure the safety of user data during transmission.

2 ) The user's personal information is encrypted and stored by adopting encryption technology, and is isolated by isolation technology.

3 ) When using personal information, such as personal information display and personal information association calculations, we will use a variety of data desensitization technologies including content replacement, encryption desensitization, etc. to enhance the security of personal information in use.

4 ) Establish a strict data use and access system, adopt strict data access authority control and multiple identity authentication technologies to protect personal information, and prevent data from being used in violation of regulations.

5 ) Adopt special data and technical security audits, and set up multiple measures for log audits and behavior audits.

2. Other security measures taken to protect personal information

1 ) Manage and regulate the storage and use of personal information by establishing a data classification system, data security management specifications, and data security development specifications.

2 ) Establish a special department for data security, responsible for the security emergency response organization, to promote and protect personal information security.

3 ) Strengthen safety awareness. We will also organize security and privacy protection training courses to strengthen employees' awareness of the importance of protecting personal information.

3. Notification of personal information security incidents

1 ) In the event of a personal information-related security incident, it will be reported to the corresponding competent authority as soon as possible, and the problem will be investigated in time and emergency measures will be carried out.

2 ) Send notifications to all users to remind them to change their passwords, or reach out to users through various methods such as phone calls and text messages, and run publicity on public operating platforms to prevent data leakage.

Although the above reasonable and effective measures have been taken, and the standards required by relevant laws and regulations have been complied with, the security of your personal information when communicating through unsafe channels cannot be guaranteed. Therefore, users should take active measures to ensure the security of personal information, such as: changing account passwords regularly, and not disclosing personal information such as their account passwords to others.

You know: The personal information protection measures provided are only applicable to the platform. Once you leave, browse or use other websites, services and content resources, you have no ability and obligation to protect any personal information you submit on other websites, regardless of whether you log in or Whether browsing the aforementioned websites is based on links or guidance.

There are always various risks of information leakage in the network environment. When accidents, force majeure, etc. cause your information to leak, we will try our best to control the situation and inform you in time of the cause of the incident, the safety measures you take, and the safety you can take proactively. Measures and other related situations.

Storage of personal information

Appropriate security measures and technical means will be taken to store and protect your personal information to prevent loss, misuse, unauthorized access or leakage, tampering or destruction. Your personal information is stored in a password-controlled server located in China, and access is restricted. When you need cross-border information transmission services, you will continue to use servers in China by default.

Personal information will be stored for different periods of time according to different levels of personal information. The storage period is strictly in accordance with laws and relevant regulations, and the minimum period is not less than 6 months. We will keep your personal information in accordance with the deadlines set by the "Network Security Law" and "E-Commerce Law". After the statutory retention period is exceeded, we will delete or anonymize your personal information.

If you stop using ""For software and services, we will stop the collection and use of your information, except as otherwise provided by laws and regulations. If we stop operations, we will stop collecting and using your personal information. We will stop the user's logout within 6 months Then the corresponding information will be deleted or anonymized.

We only allow third parties such as employees who need to know this information to access personal information, and require them to perform corresponding confidentiality obligations.

If it involves the transfer of personal information overseas, the user will be clearly notified and consent will be obtained.

Sharing, transfer, and public disclosure of personal information

1. We will treat your information with a high degree of diligence. We will not share or transfer identifiable personal information to third parties unless you have obtained your prior authorization. We may share and transfer de-identified personal information, and ensure that the third party cannot re-identify the natural person subject of such information. Under certain conditions, we may share your personal information with third parties, but we will only share necessary personal information, and the third parties are bound by the purpose stated in this policy. We will require third parties to take protective measures for your personal information and strictly comply with relevant laws, regulations and regulatory requirements. If a third party wants to change the purpose of processing personal information, it will ask for your authorization again.

You agree that we share information with the following types of third-party authorized partners:

( 1 ) In order to achieve specific functions, we may share your information with business partners. Some of our services will be provided by authorized partners. We may share some of your personal information with our partners to provide better customer service and user experience. We share this information only for the purposes stated in this policy. For example, when third-party software, equipment systems and ""When products or services are combined to provide you with location-based services, "" May collect your location information and device information based on your authorization and settings for system positioning (such as hardware model, operating system version number, International Mobile Equipment Identity ( IMEI ), network device hardware address ( MAC ) ) , And provide it to the aforementioned partners after de-identification processing. In special circumstances, it will also include your additional contact information . If you refuse the collection and use of such information, you need to set it in the device system or turn off the service Software, ""It is not possible to automatically or manually shut down related services. We will only share your personal information for legal, legitimate, necessary, specific and clear purposes, and will only share personal information necessary to provide services. Our partners do not The right to use the shared personal information for any other purpose.

( 2 ) In order to achieve programmatic advertising push, we may share de-identified or anonymized information with advertising partners. Without your authorization, we will not share your personally identifiable information (referring to information that can identify you, such as your name or e-mail address , through which you can be contacted or identified) with service providers that provide advertisements. However, we may share your anonymized user portrait with advertising service providers to help them increase the effective reach of advertising without identifying you personally. For example, only after advertisers agree to abide by our advertising regulations, we may tell advertisers how effective their ads are, or how many people have seen their ads or installed apps after seeing them, or cooperate with them Partners provide unidentifiable statistical information (for example, " female, 25-29 years old, located in Beijing " ) to help them understand their audience or customers . You can refuse us to push you programmatic advertising, but it will not affect your use of other services.

( 3 ) To help you participate in marketing and promotion activities, we may share your information with third parties. When you choose to participate in relevant marketing activities held by us, you may provide us with your name, mailing address, contact information, and bank account according to the needs of the activity . With your express consent, we will share the above information with third parties so that we can entrust third parties to provide services to you in a timely manner.

2. For companies, organizations and individuals with whom we share personal information, we will investigate their data security environment, sign strict confidentiality agreements with them, and require them to follow our instructions, this privacy policy and any other relevant confidentiality and Security measures to handle personal information.

3. With the continuous development of our business, we and our affiliated companies may conduct mergers, acquisitions, asset transfers or similar transactions, and your personal information may be transferred as part of such transactions. We will transfer We will notify you in advance that we will continue to protect or require the new controller to continue to protect your personal information in accordance with laws and regulations and standards not lower than those required by this privacy policy.

4. Without your permission, we will not share, transfer or publicly disclose your personal information to any company, organization or individual other than the company and its affiliates, except in the following circumstances:

( 1 ) Obtain your explicit authorization in advance; 

( 2 ) You share, transfer, and disclose to a third party by yourself; 

( 3 ) Directly related to national security, national defense security, public security, public health, and public interests; 

( 4 ) Disclosure or provision in accordance with applicable laws and regulations, requirements of legal procedures, and mandatory administrative and judicial requirements, or personal information provided to the outside world is directly related to criminal investigation, prosecution, trial, and execution of judgments. Under the aforementioned circumstances, we will provide / disclose your personal information based on the type and method of personal information requested to be provided or disclosed . Under the premise of complying with laws and regulations, when we receive the above request for information disclosure, we will require the requesting party to issue corresponding legal documents, such as subpoenas or investigation letters. We will carefully review all requests to ensure that they have a legal basis, and the requested data is limited to data that the administrative and judicial departments have legal rights to obtain for specific investigation purposes; 

( 5 ) Within the scope permitted by laws and regulations, to maintain " " Necessary for other users, companies and their affiliates, to control the company’s life, property, and other legal rights, or to maintain the safe and stable operation of products or services, such as finding, preventing, and handling fraud and other illegal activities and reducing credit risk; but this It does not include disclosing or providing personal information for profit purposes in violation of the commitments made in this policy;

( 6 ) The company files lawsuits or arbitrations against users in order to protect legal rights and interests; 

( 7 ) When it involves mergers, divisions, acquisitions, asset transfers or similar transactions, if it involves the transfer of personal information, the company will require new companies and organizations that hold your personal information to continue to be bound by this privacy policy, otherwise , The company has the right to request the company or organization to obtain your authorization again; 

( 8 ) Collecting personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels;

( 9 ) For academic research purposes, or for academic research institutions that are necessary for conducting statistical or academic research in public interest, and when the results of academic research or description are provided to the outside, the personal information contained in the results is de-identified of;

( 10 ) Other circumstances stipulated by laws and regulations.

5. You should understand that in the process of using the service, you can send personal information such as photos, identity information, location information to specific people, and you can also share your own photos, location information, identity information, etc. to unspecified people based on the service Personal information. If your personal information is known to others due to these active sharing and disclosure behaviors, you shall not bear the relevant responsibility.

Management of personal information

After you complete the account registration and conduct reasonable and necessary authentication, you can view, modify, and delete the personal information you submitted. Generally, you can browse, modify, and delete the information submitted by yourself at any time.

Always give top priority to the protection of your personal information, and at the same time, pay attention to your personal information. For your personal information, you can inquire, modify, and delete online through the mobile client and other channels.

You have the right to independently update or correct your personal information, or authorize customer service to update or correct information. Before you update and correct your information, we will first verify your identity. After verifying your identity, you can correct and update your information.

If you have comments or suggestions about this policy or its functions related to the collection, use, storage, and protection of your personal information, you can provide feedback or complaints through the function page or customer service channels, and you will receive your comments and suggestions. The feedback information will be returned to you as soon as possible.

You can prevent access to your personal information by turning off some functions. After turning off some functions, we will not be able to provide you with corresponding services.

You can request to cancel your account to ensure that your personal information is no longer collected. You can log out of your account through the mobile client. Before you log out of your account, your personal identity, security status, commonly used equipment and other information will be verified. The act of canceling your account is irreversible. Once you cancel your account, all information about your account will be deleted immediately and this information will not be leaked. At the same time, you will not be able to obtain services through the cancelled account.

If we terminate the service or operation, we will notify you at least 30 days in advance, and delete or anonymize your personal information after terminating the service or operation.

Special protection of personal information of minors

If you are a minor under the age of 18, you are using "" Before software and related services, you should read and decide whether to agree to this personal information protection policy under the supervision and guidance of your parents or other guardians. The company protects the personal information of minors in accordance with relevant national laws and regulations.

If you are a child under the age of 14 , we must ask your parent (guardian) for consent when we collect your personal information. If you want to use our services, please inform your parents that they should go to the " Youth Mode " in the section and learn more about the "Children’s Personal Information Protection Policy".

Modification of personal information protection policy

1. In order to provide you with better services and with the development of our business, this policy will be updated accordingly. However, without your explicit consent, we will not reduce your rights under the currently effective personal information protection policy.

We will post an updated version on the website and mobile terminal and remind you of relevant content updates through website announcements or other appropriate methods before it takes effect, so that you can keep abreast of the latest personal information protection policies.

2. For major changes, we will also provide more noticeable notifications (we will explain the specific changes to the personal information protection policy by including but not limited to emails, SMS, private messages, or special reminders on the browsing page).

The major changes referred to in this policy include but are not limited to:

( 1 ) Our service model has undergone major changes. Such as the purpose of processing personal information, the type of personal information processed, the way of using personal information, etc.;

( 2 ) Significant changes have taken place in our ownership structure and organizational structure. Such as changes in owners caused by business adjustments, bankruptcy mergers, etc.;

( 3 ) The main objects of personal information sharing, transfer or public disclosure have changed;

( 4 ) Your right to participate in the processing of personal information and how to exercise it has undergone major changes;

( 5 ) When our responsible department, contact method and complaint channel for handling personal information security change;

( 6 ) When the personal information security impact assessment report shows that there is a high risk.

Dispute Resolution

When you have any disputes due to the implementation of this policy, the two parties should first negotiate and amicably resolve them; if they cannot be resolved through negotiations, both parties have the right to file a lawsuit in a court with jurisdiction in accordance with the registration agreement.