Privacy Policy

This policy will help you understand the following:

  1. How do we collect and use your information

  2. Information storage

  3. Information Security

  4. How we use information

  5. External provision

  6. How we collect and use your personal information

When you use our products and/or services, we need/may need to collect and use your personal information including the following two types:

In order to provide you with the basic functions of our products and/or services, you must authorize us to collect and use the necessary information. If you refuse to provide the corresponding information, you will not be able to use our products and/or services normally;

In order to provide you with additional functions of our products and/or services, you have chosen to authorize us to collect and use information. If you refuse to provide, you will not be able to use the relevant additional functions or achieve the functional effects we intend to achieve, but it will not affect your normal use of the basic functions of our products and/or services.

You understand and agree:

  1. We are committed to creating a variety of products and services to meet your needs. Because we provide you with a large variety of products and services and the specific products/services that different users choose to use, there are differences in the range of specific products/services. Additional functions and the type and scope of personal information collected and used will be different. Please refer to the specific product/service function;

  2. In order to bring you a better product and service experience, we continue to work hard to improve our technology, and we may launch new or optimized functions from time to time, and may need to collect and use new personal information or change Purpose or method of using personal information. In this regard, we will separately explain to you the purpose, scope and use of the corresponding information by updating this policy, pop-up windows, page prompts, etc., and provide you with a way to choose your consent, and after obtaining your express consent Collect and use. During this process, if you have any questions, comments or suggestions, you can contact us through the various contact methods we provide, and we will answer you as soon as possible.

We will implement the following functions of this policy to collect and use your personal information:

(1) Help you become our user

In order to comply with the requirements of laws and regulations, when you register as our user, you need to provide your phone number to create an account for this product. For services that require an account for this product, we may verify your user identity based on the above information provided by you to ensure that we are providing services for you.

When you use this product, in order to maintain your basic information and improve your service experience, you can improve the network identification information (such as avatar, user name and login password, etc.).

Authorized login: We may share your account information (avatar, nickname and other information shared with your consent) with a third party with your consent, so that you can easily register or log in to a third-party account. In addition, we may obtain your account information from a third party based on your authorization and bind it to your product account, so that you can directly log in, use our products and/or services, or implement Interoperability of related rights between accounts. We will use your relevant information within the scope of your authorization and consent in accordance with the agreement with the third party.

(2) Provide you with product or service information display

During your use of our services, in order to understand the suitability of the product, identify the abnormal status of the account, and provide you with page display and search results more suitable for your needs, we may request you to provide or automatically collect your usage and store it as Network log information, including:

1.2.1 Device information: We will receive and record the device-related information you use (including device model, operating system version, device settings, unique device identifiers, mobile devices, etc.) based on your specific operations during software installation and use. Software and hardware feature information such as application and other software information), device location-related information (including your authorized GPS location and sensor information such as WLAN access points, Bluetooth, and base stations).

1.2.2 Service log information: When you use the products or services provided by our website or client, we will automatically collect your detailed usage of our services and save it as a service log. Including browse, click to view, search query, favorite, share, download and IP address, telecom operator, language used, access date and time.

Please note that separate device information, log information, and location information are information that cannot identify a specific natural person. If we combine this type of non-personal information with other information to identify a specific natural person, or combine it with personal information, this type of non-personal information will be treated as personal information during the combined use period, unless you obtain your authorization Or unless otherwise provided by laws and regulations, we will anonymize and de-identify such information. In order to provide you with information display, search and push services that are more convenient and more in line with your individual needs, we will extract your preference characteristics based on your device information, location information and service log information, and indirect crowds based on characteristic tags Portrait, display and push information.

In addition, we will also use your above information in order to continuously improve and optimize the above functions.

(3) Provide you with the function of editing the diary

In order to provide a better diary editing experience, it may be necessary to obtain the photo album or recording function. We will save it in the cloud for storage, but will not share the diary with third parties.

  1. Information storage

2.1 Where to store information

We will store the personal information of users collected in China in China in accordance with laws and regulations.

We currently do not transfer or store your personal information across borders. In the future, if cross-border transmission or storage is required, we will inform you of the purpose, recipient, security assurance measures, and security risks of the information going abroad, and obtain your consent.

3.information security

3.1 Safety protection measures

We strive to provide guarantees for user information security to prevent information leakage, loss, improper use, unauthorized access and disclosure, etc. We use multi-faceted security protection measures to ensure that the protection of users’ personal information is at a reasonable level of security, including technical protection means, management system control, security system protection and many other aspects. In addition, we have passed the national network security level protection (level three) evaluation and filing.

We adopt industry-leading technological protection measures. The technical methods we use include but are not limited to firewalls, encryption (such as SSL), de-identification or anonymization, access control measures, etc. In addition, we will continue to strengthen the security capabilities of the software installed on your device. For example, we will complete part of the information encryption work locally on your device to consolidate secure transmission; we will understand the application information installed on your device and the running process information to prevent malicious programs such as viruses and * horses.

We have established a special management system, process and organization to ensure the safety of personal information. For example, we strictly limit the scope of people who can access information and require them to observe confidentiality obligations and conduct audits. Those who violate their obligations will be punished in accordance with regulations. We will also review the management system, process and organization to prevent unauthorized persons from accessing, using or disclosing user information.

3.2 Security incident handling measures

In the event of personal information leakage, damage, loss and other security incidents, we will activate emergency plans to prevent the expansion of security incidents. After a security incident occurs, we will promptly inform you of the basic situation of the security incident, the disposal measures and remedial measures we are about to or have taken, and our response suggestions to you in the form of push notifications, emails, etc. If it is difficult to notify one by one, we will issue a warning through announcements and other methods.

  1. how we use information

We strictly abide by the provisions of laws and regulations and the agreements with users, and use the collected information in accordance with the privacy protection guidelines to provide you with better services.

4.1 Information Use Rules

We will use the collected information in accordance with the following rules:

  1. We will provide you with various functions and services based on the collected information, including providing corresponding books, book recommendations and other services

  2. We will use cookies and related technologies to collect your account number, search history, browsing history, location information and other characteristics to provide you with personalized services, including indirect population portraits based on the feature tags of the corresponding account numbers and provide you with more accurate And personalized services and content, to show you more relevant advertisements or other promotional content, optimize the experience of personalized services, and evaluate and improve the effects of our advertising and other promotional activities;

  3. We will analyze the operation of our products based on the frequency of your use of this product, fault information, performance information, etc., to ensure the safety of services, optimize our products, and improve the quality of our services. We will not combine the information we store in the analysis software with the personally identifiable information you provide.

4.2 Ways to obtain consent after informing the purpose of the change

We will use the collected information for the purposes covered by this privacy protection guide. If we use your personal information beyond the stated purpose at the time of collection and the scope of direct or reasonable connection, we will notify you again and obtain your express consent before using your personal information

5.external provision

At present, we will share information with our product partners so that they can send users information about their products and services. When we share your information, we will urge alliance members, partners or other trusted third-party suppliers and services Businesses and agents abide by the privacy policy and require them to take relevant confidentiality and security measures to handle the above information. We will use relevant technologies to locate your actual location. These technologies include IP address, GPS, and sensor technologies such as WLAN access points, Bluetooth and base stations that can provide relevant information. We only collect your geographic location at the time, but will not associate your location information at various times to determine your whereabouts.

We will not publicly disclose the personal information it collects. If public disclosure is necessary, we will inform you of the purpose of this public disclosure, the type of information disclosed and the sensitive information that may be involved, and obtain your express consent.

Contact email prettycroan@outlook.com

上一篇:BBS论坛(三十三)


下一篇:Asp.Net Core 跨域处理_Ajax 跨域处理整理