Joke Collection Website - Public benefit messages - Privacy policy
Privacy policy
Zhengzhou Tax Special Information Technology Co., Ltd. (hereinafter referred to as "the company") provides you with this product. Our company is well aware of the importance of personal information and data to users, so we will respect and protect your personal information and privacy in accordance with laws and regulations. We hope that you will read and understand this privacy policy carefully before using this product and related services, so as to make an appropriate choice. This privacy policy only applies to user information and data collected and stored by this product. When you click the "Agree and Enter" button in the process of using products and services, it means that you have carefully read and clearly agreed to abide by the contents of this privacy policy and all relevant terms and guidelines incorporated by reference, and are bound by the corresponding contents.
? We will collect and use your information in accordance with the privacy policy, but we will not collect personal information through compulsory binding just because you agree to this privacy policy.
? When you use or open related functions or use services, we will collect and use relevant information needed to realize functions and services. Unless it is necessary to realize basic business functions or according to the requirements of laws and regulations, it can refuse to provide it without affecting other functions or services.
? If you don't have a login account, we will ensure basic functions, such as information push, through the identifier information corresponding to the device. If you log in to the account, we will realize basic functions such as information push according to the account information.
The following contents will help you to know more personal information and data related to users before and during the use of this product and related services.
?
?
1. How do we collect and use personal information?
We will voluntarily collect the following information provided by you when you use the service, and automatically collect the information generated during your use or acceptance of the service.
Registration and login of 1. 1
A. When using this product and related services after registration, information (such as avatar, nickname, mobile phone number, etc. ) is to help you complete your registration and modify and improve your account information in the future.
1.2 Not logged in for account use.
A. When using this product and related services, you don't need to log in the account number and information (identifier information corresponding to the device, IP, etc.). ) is to ensure the use of the basic functions of the product.
1.3 Safe operation
1.3. 1 safety function
We are committed to providing you with safe and reliable products and use environment, and providing quality and reliable service is our core goal. The information collected to realize the security function is necessary information.
1.3.2 device information and log information
A. In order to ensure the safe operation of software and services, we will collect your hardware model, operating system version number, international mobile equipment identification code, unique equipment identifier, network equipment hardware address, IP address, WLAN access point, Bluetooth, base station, software version number, network access mode, type, status, network quality data, operation, use and service logs.
B. In order to prevent malicious programs and necessary for safe operation, we will collect information about installed applications or running processes. For example, we will retrieve whether you have installed WPS App, and if so, we will jump directly to the App to display the document content.
C. You hereby solemnly confirm and agree that we can use your account information, equipment information, service log information and information that our affiliated companies and partners are authorized by you or can enjoy according to law for judging account security, identity authentication, detecting and cracking down on illegal products, and detecting and preventing security incidents.
1.4 Other
1.4. 1 In order to provide corresponding services according to your networking status, we need to check your current network status, connect and disconnect the WLAN network, and check the WLAN on and off status.
1.4.2 We will create this product APP icon on your desktop when you install this product, and delete this product APP icon on your desktop when you uninstall it;
5. Changes in the purpose of collecting and using personal information
Please note that with the development of our business, the functions and services provided by this product may be adjusted and changed. In principle, when new functions or services are related to the functions or services we currently provide, the personal information collected and used will be directly or reasonably related to the original processing purpose. We collect and make it if it is not directly or unreasonably related to the original processing purpose.
With your personal information, we will inform you again and get your consent.
1.6 Personal information collected and used with consent shall be exempted according to law.
Please understand that under the following circumstances, according to laws and regulations and relevant national standards, we do not need your authorization to collect and use your personal information.
Directly related to national security and national defense security;
B directly related to public safety, public health and major public interests.
C directly related to criminal investigation, prosecution, trial and judgment execution;
D it is difficult to obtain personal consent in order to safeguard the major legitimate rights and interests of the subject of personal information or other individuals such as life and property;
E. The personal information you collected is disclosed to the public by yourself;
F. Your personal information collected from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels;
Necessary conditions for signing or performing the contract according to your requirements.
H. It is necessary to maintain the safe and stable operation of software and related services, such as finding and handling the faults of software and related services; Necessary for legal news reporting;
J. When it is necessary for academic research institutions to conduct statistical or academic research based on the public interest and provide the results or explanations of academic research to the outside world, the personal information contained in the results is identified;
K. Other circumstances stipulated by laws and regulations.
In particular, I would like to remind you that if this information cannot identify you individually or in combination with other information, it does not belong to your personal information in the legal sense; When your information can identify you individually or be used in combination with other information, or when we use data that cannot be associated with any specific personal information in combination with other personal information, these information will be regarded as your personal information and protected according to this privacy policy during the period of combined use.
2. Use of 2.Cookie and similar technologies
Cookie and similar technologies are widely used on the Internet. When you use this product and related services, we may use related technologies to send one or more Cookie or anonymous identifiers to your device to collect and store information when you access and use this product. We promise that Cookie will not be used for any other purposes than those specified in this privacy policy. We use Cookie and similar technologies mainly to achieve the following functions or services.
2. 1 ensures the safe and efficient operation of products and services.
We may set cookie or anonymous identifiers for authentication and security, so that we can confirm whether you log in to the service safely or whether you encounter embezzlement, fraud and other illegal acts. These technologies will also help us improve service efficiency and speed up login and response.
2.2 Help you get a more relaxed visit experience.
2.3 Recommend, display and push content or accounts that you may be interested in.
A. We may use Cookie and similar technologies to understand your preferences and usage habits, and conduct data analysis to improve products and services, recommend information or functions that users are interested in, and optimize your choice of advertisements.
B. We may use cookie to record browsing activities, which will be used to recommend information to you, eliminate related anomalies (such as crashes and delays) and explore better service methods.
2.4 cookie deletion
The mobile phone application management function supports clearing application data, and you can clear the corresponding data in the setting function. If you clear it, you may not be able to use the services or corresponding functions provided by companies that rely on Cookie because of these modifications.
3. How do we enjoy, transfer and publicly disclose personal information?
3. 1***
3. 1. 1 * * enjoyment principle
A principle of authorization and consent: providing your personal information to our third party * * * requires your authorization and consent. The personal information you enjoy is the unlabeled information or the information of a natural person whose information cannot be recognized by a third party, unless our related party * * * enjoys the necessary personal information and is bound by the purpose stated in this privacy policy. If related parties and third parties use the information for purposes beyond the original authorized consent, they need to obtain your consent again.
B. Principle of legality, legitimacy and minimum necessity: the data enjoyed by related parties and third parties must have a legitimate and legitimate purpose, and the data enjoyed by * * * is limited to the range necessary to achieve the purpose.
C. Principle of security and prudence: We will carefully evaluate the purpose of related parties and third parties to use data to enjoy information, comprehensively evaluate the security guarantee ability of these partners, and require them to abide by the cooperation legal agreement. We will strictly monitor the security of the software tool development kit (SDK) and application program interface (AP) that the partners obtain information to protect data security.
3. 1.2 * * Information about enjoying functions or services.
A. When you use the functions provided by our related parties and third parties in this product, or when software service providers, smart device providers and system service providers jointly provide services for you, we will share unmarked personal information and natural person information that cannot be recognized by third parties with these related parties and third parties for comprehensive statistics, and analyze features and preferences through algorithms to form indirect crowd portraits, which can be used for.
B. Login to a third-party account: When you log in to this product account and click Jump to a third-party product, we may associate your nickname, avatar and account balance, the unrecognized pud and cid with the third-party product you logged in * * *.
C location services: when you use location-related services (if any), we will share GPS information with the location service provider (Baidu map) so that we can return the location results to you. GPS information belongs to sensitive personal information. Refusing to provide it will only affect the geographical location service function and will not affect the normal use of other functions.
3. 1.3 * * Enjoy the advertising related information.
A. Advertising Push: We may * * share information with partners who entrust us to promote and advertise, but we will not * * share information (name and ID number) that can identify you personally. We will only provide these partners with de-identified or anonymized indirect portrait labels and information to help them improve the effective advertising reach rate without identifying your personal identity.
B. Advertising statistics: We may share de-identified statistical information with service providers, suppliers and other partners, which is difficult to correlate with your identity information and will help us analyze and measure the effectiveness of advertisements and related services.
3. 14 realizes the security and analysis statistics of * * * information.
A. Ensure safe use: We attach great importance to the security of accounts and services. In order to ensure the security of your account and property and protect your legitimate rights and interests from illegal infringement, we and affiliated companies or service providers may * * enjoy the necessary equipment, account and log information.
B. Analysis of product usage: In order to analyze the usage of our services and improve the user experience, we may share the statistical data of product usage (crash and flashback) with related parties or third parties, and it is difficult to identify your personal identity by combining other information.
3. 1.5 Help you to participate in marketing promotion activities.
When you choose to participate in related marketing activities organized by us and our related parties or third parties, you may need to provide your name, mailing address, contact information and bank account information. This information is sensitive personal information and I refuse to mention it.
Offering may affect your participation in related activities, but it will not affect other functions. Only with your consent will we share this information with related parties or third parties * * * to ensure that you can get the same experience in joint activities, or entrust a third party to cash your reward in time.
3.2 Transfer
A. We will not transfer your personal information to any other third party unless we get your express consent.
B with the continuous development of our business, it will be possible for us to merge, acquire and transfer assets, and your personal information may be transferred as a result. In case of the above changes, we will ask the receiver to protect your personal information according to laws and regulations and not less than the security standards specified in this privacy policy, otherwise we will ask the receiver to obtain your authorization again.
3.3 disclosure
A. Unless we abide by national laws and regulations or obtain your consent, we will not disclose your information publicly. When we publicly disclose your personal information, we will take security protection measures that meet industry standards.
B. We will disclose the information of relevant accounts when we announce the punishment for illegal accounts and fraud.
3.4 Personal information shared, transferred and publicly disclosed with the consent of * * * is exempted from liability according to law.
Please understand that under the following circumstances, according to laws, regulations and national standards, we * * * enjoy, transfer and publicly disclose your personal information without your authorization.
Directly related to national security and national defense security;
B directly related to public safety, public health and major public interests.
C directly related to criminal investigation, prosecution, trial and judgment execution;
D in order to protect your life, property and other important legitimate rights and interests, it is difficult to obtain the consent of the protected person.
E. Personal information disclosed to the public by yourself;
F. Collect personal information from legally disclosed information, such as legal news reports, government information disclosure and other channels.
4. How do we store personal information?
4. 1 storage location
According to laws and regulations, we store personal information collected and generated during your operation in People's Republic of China (PRC). At present, we will not send the above information overseas. If we transmit it overseas, we will follow the relevant regulations of the country or get your consent.
4.2 Storage life
We only keep your personal information for the period required to provide this product and service: while your account is not revoked, deleted or cancelled, the information, comments, likes and related information you posted will be kept. Unless otherwise stipulated by laws and regulations, we will delete or anonymize your personal information beyond the necessary time limit.
5. How can we protect the security of personal information?
A. We attach great importance to the security of your personal information, and will strive to take reasonable security measures (including technical and management aspects) to protect your personal information and prevent the personal information provided by you from being improperly used or accessed, publicly disclosed, used, modified, damaged, lost or leaked without authorization.
B. We will protect your personal information through encryption technology, anonymization and relevant reasonable and feasible means, and use security protection mechanism to prevent your personal information from malicious attacks.
C. We will establish a special security department, security management system and data security process to ensure the security of your personal information. We adopt a strict data use and access system to ensure that only authorized personnel can access your personal information, and conduct a security audit of data and technology in time.
D. Although the above reasonable and effective measures have been taken and the standards required by relevant laws have been observed, please understand that due to technical limitations and possible malicious means, in the Internet industry, even if
Do your best to strengthen security measures, and it is impossible to always ensure the security of information. We will try our best to ensure the security of the personal information you provide us.
E. You know and understand that the system and communication network you use to access our services may have problems due to factors beyond our control. Therefore, we strongly recommend that you take active measures to protect personal information, including but not limited to using complex passwords, changing passwords regularly, and not revealing your account password and related personal information to others.
F. We will formulate an emergency plan, and immediately start the emergency plan when there is a user information security incident, and strive to prevent the impact and consequences of these security incidents from expanding. In the event of a user information security incident (leakage or loss), we will inform you of the basic situation and possible impact of the security incident in time according to the requirements of laws and regulations, the disposal measures we have taken or will take, the suggestions that you can independently prevent and reduce risks, and the remedial measures taken for you. We will inform you of the incident in time by push notice, email, letter, short message and related forms. When it is difficult to tell them one by one, we will make an announcement in a reasonable and effective way. At the same time, we will also report user information security according to the requirements of relevant regulatory authorities.
Disposal of parts.
G. Once you leave this product and related services and browse or use other websites, services and content resources, we will not be able to directly protect any personal information submitted by software and websites other than this product and related services, regardless of whether you log in, browse or use the above software or websites based on the links or guidance of this product.
6. Manage your personal information
We attach great importance to your personal information management, and do our best to protect your personal information-related rights, such as inquiring, accessing, modifying, deleting, revoking consent authorization, canceling accounts, reporting complaints and setting privacy functions, so that you can protect your privacy and information security.
6. 1 autonomous controllability of received information
A. Decide to receive the push message independently, and you can choose whether to accept the notification through the settings of the mobile phone system.
B. Programmatic advertising information: Programmatic advertising is one of the advertising display technologies, and advertisers make intelligent recommendations according to your preferences in their applications. This product only provides programmatic advertising docking technology, and will not obtain your behavior or personal data in other applications.
6.2 Change or overflow authorization settings and overflow and information processing
6.2. 1 Change or cancel sensitive permission settings
You can turn off GPS geographic location, address book, camera, microphone and photo album, change the scope of authority or revoke authorization in the operating system of the device itself. After the authorization is revoked, we will no longer collect information related to these rights.
6.2.2 Processing of changing or returning authorization information
Specific business functions and services will require you to fill in information. After you withdraw your consent or authorization, we will no longer provide you with the functions and services corresponding to the consent or authorization, and we will no longer process your corresponding personal information. However, your decision to revoke the consent or authorization will not affect the company's previous personal information processing according to your authorization.
6.3 Access, delete and correct your personal information.
A Access personal account information: You can query, access and correct your avatar, user name, gender, region and other contents.
B it is especially important to remind you that you may not be able to modify some initial registration information submitted during registration due to security and identity (such as number appeal service). If you really need to modify such registration information, please contact us according to the contact information specified in this privacy policy.
6.4 account cancellation
You can follow the cancellation process to help you complete the cancellation or contact customer service. We will verify your personal identity, security status and equipment information before you cancel your account. Please refer to the tips on the logout page for the process and content of logout. You know and understand that canceling your account is irreversible. When you cancel your account, we will delete your relevant information or keep it anonymous, unless otherwise stipulated by laws and regulations.
6.5 Complaints and reports
You can make a complaint or report according to our publicity system. If you think that your personal information rights may be infringed, or you find clues that infringe your personal information rights (for example, you think that our collection of your personal information violates
Legal provisions or mutual agreement), you can contact us. We will feedback your complaints and reports in time after verification.
6.6 Access Privacy Policy
1. When installing this product for the first time, you can click on the privacy policy in the pop-up page to view it.
You can also view the full contents of this privacy policy by setting the Privacy Policy page.
Please understand that the "products" and related services mentioned in this privacy policy may be different due to factors such as mobile phone model, system version, software application version and mobile client. The final product and service depends on the Product software and related services you use.
6.7 Stop the operation and notify you.
If we stop operating, we will stop collecting your personal information in time, notify you of the notice of stopping operation one by one, and delete or anonymize your personal information.
7. Minors clause
7. 1. If you are a minor under the age of 18, you should read and agree to this privacy policy under the supervision and guidance of your parents or other guardians before using this product and related services.
7.2. We protect the personal information of minors in accordance with relevant national laws and regulations, and only collect, use, store, enjoy, transfer or disclose the personal information of minors when permitted by law, explicitly agreed by parents or other guardians or necessary for the protection of minors; If we find that the personal information of minors has been collected without prior verifiable parental consent, we will try to delete the relevant information as soon as possible.
7.3. If you are the guardian of a minor, if you have any questions about the personal information of the minor you are monitoring, please contact us through the contact information published in our privacy policy.
8. Revision and notification of privacy policy
8. 1 We may modify this privacy policy from time to time according to the requirements of laws and regulations or the needs of business operations. Unless otherwise specified, any changes or modifications will take effect immediately after the release of this product, and your use and continued use of this product will indicate your acceptance of such changes or modifications.
8.2 If you disagree with all the terms of this Privacy Policy (including any amendments we may make from time to time or other rules cited therein), please do not use this product and related services, or you can cancel the use of this product and related services on your own initiative.
8.3 In order to facilitate your understanding of the terms and conditions applicable to your use of this product, we will publish our amendments to this product agreement, and you should check this privacy policy and other rules and contents incorporated by reference from time to time.
9. Contact us
If you have any questions, comments or suggestions about the content of this privacy policy or the protection of personal information, you can contact us through the contact information in the product, and we will give timely feedback and communication after checking and verifying your user identity.
10. Applicable legal provisions and dispute resolution methods
The interpretation, performance and dispute resolution of this Privacy Policy shall be governed by the laws of People's Republic of China (PRC). In the process of implementing this policy, all disputes arising from or related to this privacy policy shall be settled by all parties concerned through negotiation. If negotiation fails, either party may bring a lawsuit to the local people's court.
1 1. Supplementary clauses
If any provision of this privacy policy is invalid or unenforceable in whole or in part for any reason, the other provisions of this privacy policy will continue to be valid. Matters not covered in this privacy policy shall be handled in accordance with the relevant laws and regulations of China, the relevant business regulations of information providers and the user registration agreement agreed upon when you registered this website /APP. If a supplementary privacy policy needs to be formulated, its legal effect is the same as this privacy policy. If this privacy policy is not updated by our company, after you confirm and sign this privacy policy, its validity will affect all your operations at this time and in the future. This privacy policy will be signed by electronic signature, and the content will take effect after you click "Agree and proceed to the next operation".
- Previous article:How to receive Tik Tok voice verification code?
- Next article:How do real estate agents pay a return visit to customers?
- Related articles
- Network SMS platform source code
- How to improve the goodwill of outstanding star artists
- The Mid-Autumn greetings to lovers are very brief.
- I owe Bai Hua money. Why did Heng Chang Finance send text messages?
- I want to check the phone bill for the work phone number sent by the company, but I can't give you a random password prompt. What should I do?
- When will Haining Shanghai-Hangzhou Expressway start?
- Yesterday I sent a Happy New Year to my girlfriend who broke up with me and I still haven¡¯t received a reply yet?
- How many people know alex wong because of Godfrey Tsao?
- Greetings to students on Mid-Autumn Festival
- Composition of Autumn Tour in Guanghan Qiyi School 20 16