Joke Collection Website - Blessing messages - User privacy policy

User privacy policy

This policy will help you understand the following:

1. How do we collect and use your personal information?

Second, how do we use Cookie and similar technologies?

Three. How can we * * * enjoy, transfer and publicly disclose your personal information?

4. How can we protect your personal information?

Verb (short for verb) Your right.

Six, how do we deal with the personal information of minors?

7. How do you transfer your personal information around the world?

Eight. This policy may change.

Nine, how to contact us

We are fully aware of the importance of personal information to you and will do our best to protect your personal information safely and reliably. We are committed to maintaining your trust in us and adhere to the following principles to protect your personal information: the principle of consistency of rights and responsibilities, the principle of clear purpose, the principle of choice and consent, the principle of minimum sufficiency, the principle of ensuring safety, the principle of subject participation, and the principle of openness and transparency.

Please note that this Agreement may be revised and updated as appropriate, and you agree to check the latest version of this Agreement at any time. Please read and understand this privacy policy carefully before using our products (or services) to ensure that you always know the latest version of this privacy policy.

1. How do we collect and use your personal information?

Personal information refers to all kinds of information recorded by electronic or other means that can identify the identity of a specific natural person or reflect the activities of a specific natural person alone or in combination with other information. Collect and use your personal information for the following purposes specified in this policy. If you wish to use your information for purposes other than:

(a) To provide you with products and services provided on its and/or its affiliated companies' web game platforms.

1. Register as a user

Fill in the information to complete account creation. For example: your mobile phone number, ID number and created user name.

2. Provide you with advertisements, information and product information that you may be interested in.

In order to provide you with advertisements that are more relevant to you, rather than widely distributed advertisements, we may collect and use your operation records and some necessary equipment information (for example, your unique equipment identification code), as well as other information you browse or request when using our services, details of game accounts and transaction information, extract your browsing and behavior habits, and send marketing information to the user groups with the same or similar tags as you by email, SMS or other means, and provide it.

3. Payment and settlement

In order to make it easier for you to comprehensively judge your account and transaction risks, verify your identity, and detect and prevent security incidents when paying related orders, we may collect your personal virtual property information (only virtual property information such as transaction records, virtual currency, virtual transactions and game redemption codes) during the transaction.

4. Safety

We will use some of your personal public equipment information for authentication, security prevention, fraud monitoring, archive backup and other purposes. For example, the unique device code is used for security prevention and user identification, and the personal online record is used for security prevention and fraud monitoring.

When you use our customer service, we may keep your communication/call records and contents or your contact information, so as to contact you or help you solve problems, or record the solutions and results of related problems.

5. Product development and service optimization

For example, in order to repair system failures and optimize our services, we may need to record and analyze the information generated by system failures.

(II) Scope of application of privacy policy

This privacy policy applies to all our products and services, except some products and services. These specific products and services will be subject to specific privacy policies. Specific privacy policies for specific products and services will explain more specifically how we collect and use your information in these products and services. If there is any inconsistency between the privacy policy of a specific product and service and this privacy policy, the privacy policy of that specific product and service shall prevail.

(3) Exceptions to the application of this privacy policy.

Our services may include or link to social media or other services (including websites) provided by third parties. For example:

1. You use the "Share" button to share some content with our service, or you use a third-party connection service to log in to our service. These functions may collect your relevant information (including your log information), and may install cookies on your computer in order to run the above functions normally;

2. We provide you with links through advertisements or other means of our services, so that you can visit the services or websites of third parties that collect and apply your information.

Such third-party social media or other services may be operated by third parties. Your use of social media services or other services of these third parties (including any personal information you provide to these third parties) shall be subject to the terms of service and privacy policy of the third party (not this privacy policy), and you need to read its terms carefully. This privacy policy only applies to the information we collect, not to the services provided by any third party or the rules for the use of information by third parties, and we are not responsible for the use of information provided by you by any third party.

Second, how do we use Cookie and similar technologies?

(1) cookies

Cookie usually contain identifiers, site names, and some numbers and characters. In order to ensure the normal operation of the website and help us to confirm that you are our registered user, we will store a small data file named Cookie on your computer or mobile device. We will not use Cookie for any purposes other than those specified in this policy. You can manage or delete Cookie according to your own preferences through a browser or other means.

(2) No tracking (No tracking)

Many web browsers have the Do Not Track function, and you can post Do Not Track requests to websites. At present, major Internet standards organizations have not yet formulated relevant policies to stipulate how websites should respond to such requests. But if your browser is enabled, please don't track, all our websites will respect your choice. However, please note that this may affect your experience in using the products and services provided.

3. How can we * * * enjoy, transfer and publicly disclose your personal information?

(1) Enjoy * * *

You understand and agree that we will provide personal information to a third party by means of * * * on the premise that the data receiver cannot re-identify the subject of personal information. We may share your personal information with any company, organization or individual except the following circumstances:

1. Explicitly agree to enjoy: We will share your personal information with other parties after obtaining your explicit consent.

2. According to laws and regulations or mandatory requirements of administrative departments, we may * * enjoy your personal information.

3. Share with our affiliated companies * * *: Your personal information may be shared with affiliated companies * * *. We will only * * * enjoy the necessary personal information and will be bound by the purposes stated in this privacy policy. If the affiliated company wants to change the purpose of processing personal information, it will ask for your authorization again.

4. Sharing with authorized partners * * *: Some of our services will be provided by authorized partners only for the purposes specified in this policy. We may share some of your personal information with our partner * * * to provide better customer service and user experience. We will only * * enjoy your personal information for legitimate, legitimate, necessary, specific and clear purposes, and only * * * will enjoy the personal information necessary for providing services. Our partners have no right to use the personal information enjoyed by * * * for any other purpose.

At present, our authorized partners include the following two types:

1) Authorized partner of advertising and analysis services. Unless we get your permission, we will not share your personally identifiable information (information that can identify you, such as your name or email address, through which you can be contacted or identified) with partners who provide advertising and analysis services.

2) Suppliers, service providers and other partners. We send information to suppliers, service providers and other partners who support our business, such as communication service providers who push notifications on our behalf. These supports include providing technical infrastructure services, analyzing the usage of our services, measuring the effectiveness of advertisements and services, providing customer service, promoting payment and other support for products and services.

(2) Transfer

We will not transfer users' personal information to any company, organization or individual. Unless required by laws and regulations in People's Republic of China (PRC), we will continue to protect users' personal information according to the standards required by laws and regulations or require new managers to continue to protect users' personal information according to this policy.

(3) Public disclosure

We will only publicly disclose your personal information in the following circumstances:

1. After obtaining your explicit consent;

2, involving national security and national defense security;

3 the relationship between public safety, public health and major public interests;

4. Related to criminal investigation, prosecution, trial and judgment execution;

5. It is difficult to obtain your consent in order to protect the life and property of the information subject or other individuals;

6. The information collected is disclosed to the public by yourself;

7. Collect information disclosed according to law from legal news reports, government information disclosure and other channels;

8. Necessary for signing a contract according to your requirements;

9. It is necessary to maintain the safe and stable operation of services, such as finding and handling the faults of products or services;

10, which is necessary for legal news reporting;

1 1. When academic research institutions conduct statistical or academic research based on public interests and provide academic research results or explanations to the outside world, they will de-identify the information contained in the results;

12, other circumstances stipulated by laws and regulations.

4. How can we protect your personal information?

1. We will take reasonable and feasible measures to protect your personal information.

We have a dedicated security team to handle matters related to data protection. At the same time, we also set up specific processes and security procedures for the collection and processing of specific user data to ensure that the storage and use of data meet our expectations and the requirements of laws and regulations. For example, we use TLS/SSL encryption technology for data transmission and SHA256/AES encryption algorithm to store sensitive data to ensure its security. In addition, we will regularly assess the risks of security policies and data protection measures to ensure that our products will not be threatened by risks such as data leakage or privacy violations.

(2) Other security measures we take to protect information.

We manage the storage and use of standardized information by establishing data classification and grading system, data security management specification and data security development specification.

We conduct comprehensive security control on data through information contact confidentiality agreement, monitoring and auditing mechanism.

(3) We only allow employees who need to know this information to contact your information, and at the same time require all personnel who may come into contact with your information to fulfill the corresponding confidentiality obligations. If you fail to fulfill these obligations, you may be investigated for legal responsibility or suspended from cooperation.

(4) We will take all reasonable and feasible measures to ensure that irrelevant personal information is not collected. We will only keep your personal information for a necessary and reasonable period, unless it is necessary to extend the retention period or permitted by law.

(5) The Internet is not an absolutely secure environment, and e-mail, instant messaging and communication with other users are not encrypted. We strongly recommend that you do not send personal information in this way. Please use a complicated password to help us ensure the security of your account.

(6) Internet environment is not 100% safe. We will try our best to ensure or guarantee the security of any information you send us. If our physical, technical or management protection facilities are damaged, resulting in unauthorized access, public disclosure, tampering or destruction of information, resulting in damage to your legitimate rights and interests, we will bear corresponding legal responsibilities.

(7) After the unfortunate personal information security incident, we will take necessary measures to prevent the security incident from expanding and inform you in the form of push notice and announcement.

Verb (short for verb) Your right.

According to the relevant laws, regulations and standards of China and the common practices of other countries and regions, we guarantee that you can exercise the following rights on your personal information:

(1) Access your personal information.

You have the right to access your personal information, except for the exceptions stipulated by laws and regulations.

(2) Control your personal information.

You can inquire and manage personal information under your account. Account name and ID number are your important network identities. For security and identification, you can't change them after registration.

(3) Delete your personal information.

We will collect and use your information in accordance with this policy and only use it to realize the functions of our products or services. If you find that our collection and use of your personal information violates laws, administrative regulations or the agreement between the two parties, you can ask us to delete it. If you find that your personal information collected and stored by us is incorrect, you can also ask us to correct it. Please contact us through the contact information listed in this policy.

(4) Respond to your above requirements.

For security reasons, you may need to provide a written request or otherwise prove your identity. We may ask you to verify your identity before processing your request. We will reply within a reasonable time limit. If you are not satisfied, you can contact customer service or handle it according to the user registration service agreement.

In principle, we don't charge you for your reasonable request, but we will charge you a certain fee as appropriate for repeated requests that exceed reasonable limits. We may reject requests that are unnecessarily repetitive, require too many technical means (for example, need to develop new systems or fundamentally change existing practices), bring risks to the legitimate rights and interests of others, or are very unrealistic (for example, involve backing up information stored on tapes).

In the following cases, according to the requirements of laws and regulations, we will not be able to respond to your request:

1, which is directly related to national security and national defense security;

2 directly related to public safety, public health and major public interests;

3. Directly related to criminal investigation, prosecution, trial and judgment execution;

4. There is sufficient evidence to show that you have subjective malice or abuse your rights;

5. Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals and organizations;

6. Involving trade secrets;

7. Other circumstances that we have reasonable reasons to refuse.

Six, how do we deal with the personal information of minors?

Our products, websites and services are mainly for adults. According to the national policy, minors are not allowed to create their own user accounts without the consent of their parents or guardians. Personal information of minors is collected with the consent of parents or guardians, and we will only use or publicly disclose this information when permitted by law, explicitly agreed by parents or guardians or necessary for the protection of minors.

7. How do you transfer your personal information around the world?

Personal information we collect and generate in People's Republic of China (PRC) will be stored in People's Republic of China (PRC) and will not be transferred or transmitted around the world.

Eight. This policy may change.

We will not reduce your rights under this privacy policy without your express consent. We will post any changes to this policy on this page.

For major changes, we will also provide more eye-catching notice. If you don't agree with the changes, you can choose to stop using our service. If you continue to use our service, you agree to be bound by this revised privacy policy.

Nine, how to contact us

If you have any questions, comments or suggestions about this privacy policy, you can log in to official website Customer Service Center or call the customer service center hotline: 0553-8 125237, 4008585237. If you are not satisfied with our reply, especially if our personal information processing behavior harms your legitimate rights and interests, you can also handle it in the way agreed in the user registration service agreement.

It is our goal to create a comfortable, fair and humanized game environment for users. The platform pays attention to users' needs and always opens its heart to accept users from different regions, different ages and different cultural backgrounds. Whether it is the staff who perform tasks in their respective posts or tens of thousands of users who play different roles in platform games, they all have many expectations and dreams for online games. We thank and respect users who respect the rules of the game and others. Let's work together to create a green game environment!

Young users must abide by the National Convention on Youth Network Civilization: they should be good at online learning and not browse bad information; Honest and friendly, not insulting and deceiving others; To enhance self-protection awareness, don't date netizens at will; It is necessary to maintain network security without disturbing network order; It should be beneficial to physical and mental health, and we should not indulge in virtual time and space.

Link: /p/83f72f 100d32

Source: