Privacy Policy


1. The information we collect
In accordance with relevant laws, regulations and national standards, we may collect and use your relevant personal information without requiring your authorization under the following circumstances:Directly related to national interests such as national security and national defense security;Directly related to major public interests such as public security, public health and public knowledge; Directly related to criminal investigation, prosecution, trial and execution of judgment; For the purpose of safeguarding your life, property, reputation and other significant legitimate rights and interests, but it is difficult to obtain the consent of the person; The personal information you collect is disclosed to the public by yourself; Collecting personal information from legally disclosed information, such as legitimate news reports, government information disclosure and other channels; It is necessary to sign and perform the contract according to your requirements; Necessary to maintain the safe and stable operation of the products or services provided, such as the discovery and disposal of faults of the products or services; Necessary for carrying out legitimate news reports; When it is necessary to carry out statistics or academic research in the public interest, and when it provides the results of academic research or description to the outside world, the personal information contained in the results shall be de-identified; Other circumstances stipulated by laws and regulations. Please understand, we provide you with the functions and services are constantly updated and development of the, if a certain function or service is not in the foregoing statement and collected your information, we will have a page hint, interactive process, website announcement to explain to you the content of the information collection, the scope and purpose, with the consent of you.As for business development in the future from a third party of indirect access to your personal information, we will be told to you before to get personal information source, type and scope of use, such as we do business need to personal information processing activities beyond your original to provide personal information to a third party agreed scope of authorization, we will deal with you in the personal information such as your authorization consent before;In addition, we will strictly comply with relevant laws and regulations, and require third parties to guarantee the legitimacy of the information they provide.
2.Storage of information
2.1 How and by how long information is stored We will store your information in secure ways, including local storage (such as data caching by APP), databases, and server logs. Under normal circumstances, we will only store your personal information within the period of time necessary for the purpose of the service or under the conditions stipulated by laws and regulations.Order reading and subscription. If you choose to delete the above information, we will delete the corresponding personal information accordingly.
2.2 An area where information is stored We will store the personal information collected in China in accordance with laws and regulations. Currently we do not transfer or store your personal information across borders.In the future, if you need to transfer or store information across borders, we will inform you of the purpose of the information exit, the recipient, security assurance measures and security risks, and obtain your consent.
2.3 Notice when a product or service ceases to operate When our products or services cease to operate, we will notify you in the form of push notification, announcement, etc., and delete your personal information or anonymize it within a reasonable period of time, unless otherwise stipulated by laws and regulations.
3. information safety
3.1 safety precautions
Wsafety precautions We strive to provide security for users' information to prevent the disclosure, loss, improper use, unauthorized access and disclosure of information.We use multi-directional security protection measures to ensure that the protection of users' personal information is at a reasonable level of security, including technical protection means, management system control, security system guarantee and many other aspects.In addition, we have also passed the national network security level protection (level 3) assessment and filing. We adopt industry-leading technology protection measures.The techniques we use include but are not limited to firewalls, encryption (such as SSL), de-identification or anonymization, and access control measures.In addition, we will continue to enhance the security capabilities of software installed on your device.For example, we will complete some information encryption work locally on your device to consolidate secure transmission;We will know your installed application information and running process information to prevent viruses, trojans and other malicious programs. We have established a special management system, process and organization to ensure the security of personal information.For example, we strictly limit the scope of people who have access to information, require them to observe confidentiality obligations and conduct audits, and punish those who violate such obligations.We will also review the management system, processes and organization to prevent unauthorized access, use or disclosure of user information. We suggest you to pay full attention to the protection of personal information when using products and services, we will also provide a variety of security functions to help you protect your personal information security.
3.2 Security incident handling measures In the event of personal
information disclosure, damage, loss and other security incidents, we will launch an emergency plan to prevent the expansion of security incidents.After the occurrence of a security incident, we will promptly inform you by push notification, email and other forms of the basic situation of the security incident, the disposal measures and remedial measures we will take or have taken, as well as our response Suggestions to you.If it is difficult to realize one by one inform, we will be issued by way of notice warning.
4. contact us
If you have any other complaints, Suggestions, or need to delete all access records, please send email
We will review the issue as soon as possible and respond within 30 days of verifying your user identity.

Content us
E-Mail:mqtdlpgoveqmzijklntk@hotmail.com
Report abuse