Privacy Policy

2020-08-20 21:00 阅读 1,494 views 次 Privacy Policy已关闭评论

Release date: October 10, 2019
Effective date: October 17, 2019
Presentment clause
Your trust is very important to us. We know the importance of personal information to you. We will take corresponding security protection measures according to the requirements of laws and regulations, and try our best to protect your personal information safe and controllable. In view of this, the service provider (or "we") formulates this Privacy Policy (hereinafter referred to as "this policy / this Privacy Policy") and reminds you that:
This policy is applicable to all products and services provided by our company, including but not limited to applications and web pages applicable to computers and mobile intelligent terminals, software development kit (SDK) and application programming interface (API) for third-party websites and applications, as well as continuous innovation and development services. If you have a separate privacy policy for using one or more services provided by our company, the privacy policy corresponding to such services will constitute a complete privacy policy together with this privacy policy.
In particular, this policy does not apply to services provided to you by other third parties. To ensure a smooth product experience, you may receive content or web links from third parties. Please choose carefully whether you want to access links, content, products and services provided by third parties. Before submitting personal information to third parties, please read these third party privacy policies carefully.
In order to realize the sharing and wechat login functions, we use mobtech's sharesdk product. For the privacy policy of this product, please refer to: https://www.mob.com/about/policy
Before using our products or services, please carefully read and thoroughly understand this policy, especially the terms marked by bold / bold underline. You should focus on reading, and start using after confirming full understanding and agreement. If you have any questions, comments or suggestions on the content of this policy, you can contact us through various contact ways provided by our company.
Part I definition
Our company: refers to ant Jiujiu browser technology development center (domain name is www.myie9.com )Website and client software.
Service provider: [ant Jiujiu browser technology development center].
Affiliated company: refers to the affiliated company of ant Jiujiu browser technology development center.
Children: refers to minors under the age of 14.
Personal information refers to all kinds of information recorded by electronic or other means that can identify the identity of a specific natural person or reflect the activities of a specific natural person, either alone or in combination with other information.
Personal sensitive information: refers to personal information including ID card number, personal biometric identification information, bank account number, property information, whereabouts, transaction information, children information, etc. (we will mark specific personal sensitive information in bold in this Privacy Policy).
Personal information deletion: refers to the behavior of removing personal information from the system involved in the realization of daily business functions, so that it can not be retrieved and accessed.
Part II privacy policy
This privacy policy section will help you understand the following:
1、 How do we collect and use your personal information
2、 How do we use cookies and similar technologies
3、 How can we share, transfer and publicly disclose your personal information
4、 How do we protect your personal information
5、 How do you manage your personal information
6、 How do we process children's personal information
7、 How is your personal information transferred globally
8、 How to update this privacy policy
9、 How to contact us

1、 How do we collect and use your information
You understand and agree that:
1. We are committed to create a variety of products and services to meet your needs. As there are many kinds of products and services we provide to you, and there are differences in the specific product / service range selected by different users, accordingly, various functions and the types and scope of personal information collected and used will be different. Please refer to the specific product / service function;
2. In order to bring you a better product and service experience, we are constantly striving to improve our technology. As a result, we may introduce new or optimized functions from time to time. We may need to collect and use new personal information or change the purpose or way of using personal information. In this regard, we will update this policy, pop-up window, page tips and other ways to explain to you the purpose, scope and use of the corresponding information, and provide you with the way to choose your own consent, and collect and use it after obtaining your express consent. In the process, if you have any questions, opinions or suggestions, you can contact us through the contact information provided in Article 9 "how to contact us", and we will answer for you as soon as possible.
(1) Help you become our user
1. Registration services
In order to help you become our users, so that we can provide user services for you. You need to provide a mobile phone number to create a user name and password (or verification code) to become our registered user.
If you only need to use basic services such as browsing and searching, you do not need to register as our user and provide the above information.
2. Third party authorized login
To facilitate your login account, you can also log in through third party accounts (including Taobao, Alipay, micro-blog, WeChat, QQ). In order to achieve the above purpose, you understand and agree that we will obtain and collect your third-party account information from a third party, such as nickname, avatar and other information that you agree to grant in the authorization interface.
3. Additional services
You can choose to further improve the product account information, you can provide us with your avatar, nickname, gender to get more personalized additional services. If you provide a valid and valid mobile phone number, Taobao account and Alipay account binding, you can find the account number and password more conveniently when you encounter the account number of the account lost and forgotten password. However, if you do not provide this information, it will not affect your use of the basic services provided by this product.
4. Account authentication service
When you use the functions or services that can only be provided by identity authentication, such as the live broadcast service provided by the third party embedded in the form of SDK, the current free card verification, and the tax withholding service of activity reward withdrawal, according to relevant laws and regulations, you may need to provide your name, ID card number and telephone number to verify your true identity. This information belongs to personal sensitive information, you can refuse to provide it, but you may not be able to obtain relevant services, but it will not affect the normal use of other functions and services.
(2) To provide you with browsing and search services
1. Web browsing
In the process of using our service, in order to identify the abnormal status of the account, understand the adaptability of the product, provide you with page display and search results more suitable for your needs. At the same time, based on the basic operation requirements such as web file caching, downloading, log storage, we need to obtain your public area read-write permission, and may automatically collect your usage and store it as a network log Information, including:
Device information: we will receive and record the information about the device you use (including the device model, operating system version, device settings, unique device identifier, device environment and other software and hardware feature information), equipment location information (including your authorized GPS location, WLAN access point, Bluetooth and Base station and other sensor information).
Service log information: when you use the products or services provided by us, we will automatically collect your detailed usage of our services and save them as service logs, including browsing, clicking, searching, collecting, paying attention to sharing information, publishing information, as well as IP address, browser type, telecom operator, language used, date and time of visit.
Please note that the individual device information and service log information cannot identify the identity of a specific natural person. If we combine this kind of non personal information with other information to identify a specific natural person, or combine it with personal information, during the period of combined use, such non personal information will be regarded as personal information. Unless authorized by you or otherwise regulated by laws and regulations, such information will be anonymous and de identified.
In order to provide you with more convenient and personalized information display, search and push services, we will extract your preferred features according to your device information and service log information, and produce indirect crowd portraits based on feature tags for display, push information and possible commercial advertisements.
In addition, we will continue to improve and optimize the above functions to use your above information.

2. Information browsing
We may recommend more interesting information to you. To achieve this function, we may use information about the location of your device. Location permission involves personal sensitive information. If you refuse to provide it, we will not recommend information to you based on your location information, and it will not affect the normal use of other services that do not need location permission. We will show and recommend the local information of your region based on the city corresponding to the IP address. If you don't like the information we push for you, you can close the message at any time / dynamically adjust the channel you are interested in / add or cancel following the author / select "not interested in the message", we will adjust the recommendation strategy based on your feedback.
The above-mentioned information collected and used by us has been de identified. Data analysis only corresponds to specific codes that cannot be directly related to your identity, and will not be associated with your real identity.
3. Search
When you use the search service, your search keywords are collected. In order to provide efficient search service, some search keywords and service log information will be temporarily stored in your local storage device, and can show you the content of search results and search history.
When you use the scan QR code search and voice search functions, we need to obtain the system's camera / album reading rights and microphone recording rights to support the provision of the above functions. We will collect the above information if and only if you click the QR code scanning / voice search portal, or in other ways that can be provided in the future. If you refuse to collect the above information, please turn off the camera / album reading permission, microphone recording permission function or do not call up the corresponding function, but this will also make you unable to do so Access to relevant services.
(3) To provide you with information release and interactive services
1. Content upload and release
(1) When you use the functions of content publishing, comments, questions and answers, we will collect the information content you choose to publish, and display your nickname, avatar, and published content (text, video and audio). When you use the function of uploading pictures and publishing audio and video, we will ask you to authorize the rights of camera, photo album and microphone. If you refuse to provide authorization, you will not be able to use the relevant functions, but it will not affect your normal use of other functions.
(2) When you interact with third-party services based on location, we will ask you to authorize location permission and collect location information related to the service. If you refuse to provide accurate geographic location information, you will not be able to use this function, but it will not affect your normal use of other functions.
(3) Please note that the information you publish may involve your or others' personal information or even personal sensitive information. For example, when you publish, you choose to upload pictures containing personal information. Please be more careful to consider whether to share or even publicly share relevant information when using our services. If the personal information of children is involved in the information you publish publicly, you need to obtain the authorization of the guardian of the child concerned before publishing. In the above circumstances, children or guardians have the right to contact us through the channels in Article 9 of this policy to request correction or deletion of the contents involving children's personal information.
2. Information exchange and interaction
(1) Communication and interaction with other users: you take the initiative to pay attention to the account, channel, activity, topic, etc. that you are interested in and generate interaction (when following, browsing, commenting, private message, collecting, liking or sharing content), we will collect the account you follow and show you the content of your notice account. When you add / invite friends, we may request your address book permission, get your friends' contact information and help you send add / invite messages. If you refuse to provide, it will not affect your normal function, but you will not be able to invite your good friends through your mobile phone number.
(2) Participating in operation activities: it will launch operation activities for newly launched services and functions from time to time. If you participate in relevant operation activities, we will collect, including but not limited to your identity information and contact information through the operation activity interface, so as to get in touch with you, verify your award qualification, and issue operation awards to you. If you do not participate in the relevant operation activities, you do not need to provide the above information. If you participate in the operation activities but refuse to provide, you will not be able to obtain the relevant rewards.
(4) Customer service and problem solving
Contact us through customer service consultation and other ways: when you contact us, we will collect the consultation content provided by you and your contact information (account number, address, email address, correspondence / call record and content or other contact information left by you), so as to contact you or help you solve problems, or record the solutions and results of related problems.
(5) Provide technical docking support for you
When you use the applet, in order to provide docking and other technical support, we need to obtain the necessary personal information, device information and log information from the applet developer and technical service provider. When you use the applet service, your information will be subject to the privacy policy of the app developer and technical service provider. It is recommended that you read and confirm your understanding of the relevant agreement before accepting the relevant service

(6) Provide security for you
1. Browsing and downloading security
The content or execution program of some websites may cause damage to your mobile phone, operating system or browser. Therefore, when you surf the Internet, the browser will read the content of the program file trying to execute, analyze whether the file will infringe the user's mobile phone, and upload it to the cloud security data center for security detection of the website information in the web page.
The browser will send the URL you visited (including the URL in the page, and the personal information in the URL will be filtered out) / the downloaded link, the link in the page, the page title and DNS resolution record of the website address to the cloud security data center to judge the security of the website you visit and intercept the malicious web page for you.
If the web page you requested is judged by cloud security data center to be malicious / violate the relevant provisions of laws and regulations, UC browser will automatically prompt you and block the information.
Some products and services contain unique application numbers. When you install, activate, update, uninstall or access related products and services, the system will send this number and installation related information (such as operating system type and application version number) to us. We will analyze such information in order to prevent, detect and investigate fraud, endangering account security or other violations of our agreement, or to achieve the purpose of your visit.
2. Operation safety
In order to improve the security of services provided by us, our affiliated companies and partners, protect the personal and property safety of you or other users or the public from infringement, better prevent phishing websites, fraud, network vulnerabilities, computer viruses, network attacks, network intrusion and other security risks, and more accurately identify violations of laws and regulations or our relevant agreement rules, We may use or integrate your member information, equipment information, service log information and the information authorized by you or shared by our affiliated companies and partners according to the law to comprehensively judge your account and transaction risks, conduct identity verification, detect and prevent security incidents, and take necessary recording, auditing, analysis and disposal measures according to law.
(7) Others
1. If the information you provide contains personal information of other users, you need to ensure that you have obtained legal authorization before providing such personal information to us.
2. If we use the information for other purposes not specified in this policy, or use the information collected for a specific purpose for other purposes, or if we take the initiative to obtain your personal information from a third party, we will obtain your prior consent.
If we indirectly obtain your information from a third party, we will explicitly require the third party to collect personal information after obtaining your consent in accordance with the law, and inform you of the content of the shared information. In addition, if sensitive information is involved, it is required to obtain your explicit confirmation before providing it to us, and require the third party to make an action on the legality and compliance of the source of personal information We promise that if the third party violates the law, we will clearly require the other party to bear the corresponding legal responsibility; at the same time, our professional security team will strengthen the security of personal information (including sensitive information reporting, sensitive information encryption storage, access control, etc.). We will use no less than our own user personal information protection means and measures to protect indirectly obtained personal information.
3. Exceptions to authorization
You fully understand and agree that we do not need your authorized consent to collect and use your personal information under the following circumstances, and we may not respond to your requests for correction / modification, deletion, cancellation, withdrawal of consent or request for information:
(1) Related to national security and national defense security;
(2) Related to public safety, public health and major public interests;
(3) Related to judicial or administrative law enforcement such as criminal investigation, prosecution, trial and execution of judgments;
(4) In order to protect your or other personal life, property and other major legitimate rights and interests, but it is difficult to obtain my consent;
(5) Personal information that you disclose to the public by yourself;
(6) Collecting personal information from legally disclosed information, such as legal news reports, government information disclosure and other channels.
(7) It is necessary to sign and perform relevant agreements or other written documents with you;
(8) It is necessary to maintain the safe and stable operation of the products and / or services provided, such as the detection and disposal of failures of products and / or services;
(9) Necessary for legal news reporting;
(10) When it is necessary for an academic research institution to carry out statistical or academic research based on public interest and provide the results of academic research or description to the public, the personal information contained in the results is de identified;
(11) Other circumstances stipulated by laws and regulations.
Please be aware that, according to applicable laws, if we take technical and other necessary measures to process personal information so that the data receiver cannot re identify a specific individual and cannot be recovered, or we may conduct dematerialized research, statistical analysis and prediction of the collected information to improve our content and layout and provide products or services for business decision-making Support, and improve our products and services (including using anonymous data for machine learning or model algorithm training), the use of such processed data does not need to be notified to you and your consent.

4. If we stop operating our products or services, we will stop collecting your personal information in a timely manner. We will notify you of the suspension in the form of delivery or announcement one by one, and delete or anonymize the personal information related to the closed business held by us.
2、 How do we use cookies and similar technologies
(1) Cookie
In order to ensure the normal operation of UC browser platform, provide you with an easier access experience, and recommend content that you may be interested in, we will store cookies and flash on your computer or mobile device Cookies, or other local storage provided by the browser (or associated application) that usually contains identifiers, site names, and some numbers and characters (collectively referred to as "cookies"). With cookies, websites can store data such as your preferences.
If your browser or browser add-on services allow, you can modify the acceptance of cookies or reject our cookies. For details, see AboutCookies.org 。 However, if you do, you may not be able to enjoy a better service experience, and in some cases may affect your safe access to our website, and you may need to change user settings every time you visit our website.
(2) Cookie like technology
In addition to cookies, we will also use website beacons, pixel tags, etags and other similar technologies.
For example, the email we send you may contain an address link to the content of our website. If you click on the link, we will track the click to help us understand your product or service preference, so that we can actively improve the customer service experience. Website beacon is usually a transparent image embedded in a website or email. With the help of pixel tags in e-mail, we can know whether the e-mail is opened or not. If you do not want your activities to be tracked in this way, you can unsubscribe from our mailing list at any time.
Etag (entity tag) is the HTTP protocol header transmitted behind the Internet browser and Internet server, which can replace cookie. Etag can help us avoid unnecessary server load, improve service efficiency, and save resources and energy. At the same time, we may record your identity through Etag, so that we can have a deeper understanding and improvement of our products or services. Most browsers provide users with the function of clearing the browser cache data. You can clear the corresponding data in the browser settings function. However, please note that if Etag is disabled, you may not be able to enjoy a relatively better product or service experience.

3、 How can we share, transfer and publicly disclose your personal information
(1) Share
We will not share your personal information with companies, organizations and individuals other than service providers, except in the following cases:
1. Sharing under legal circumstances: we may share your personal information with the public in accordance with the provisions of laws and regulations, the needs of litigation and dispute resolution, or the requirements put forward by administrative and judicial organs according to law.
2. Share with explicit consent: with your explicit consent, we will share your personal information with others.
3. Sharing with affiliated companies: in order to facilitate us to provide products and services to you based on the platform account, recommend information that you may be interested in, identify abnormal member accounts, and protect the personal and property safety of affiliated companies or other users or the public from infringement, your personal information may be shared with our affiliated companies and / or their designated service providers. We will only share the necessary personal information and be bound by the purpose stated in this privacy policy. If we share your personal sensitive information or the affiliated company changes the use and processing purpose of personal information, we will seek your authorization again.
4. Sharing with authorized partners: we may entrust authorized partners to provide you with certain services or perform functions on our behalf. We will only share your information for the legitimate, legitimate, necessary, specific and explicit purposes stated in this privacy policy. Authorized partners can only access the information they need to perform their duties and shall not use this information for any other purpose 。
At present, our authorized partners include the following types:
(1) Authorized partners of content, advertising and analysis services. Content and advertising may be provided to you by our related parties, third parties, or jointly with software service providers, intelligent device providers, and system service providers (hereinafter referred to as "service providers"). Unless we get your permission, we will not share your personal identity information with partners who provide content, advertising and analysis services. We will entrust these partners to process the information related to content, advertising coverage and effectiveness, but will not provide your personal identity information. We will share the demarcated personal information with these service providers, and form an indirect crowd portrait based on comprehensive statistics and algorithm for feature and preference analysis, instead of identifying you personally. Such partners may combine the above information with other data that they legally obtain in order to implement our commissioned content, advertising services or decision recommendations.
(2) Suppliers, service providers and other partners. We send information to vendors, service providers, and other partners who support our business, including technical infrastructure services that we are commissioned to provide, analyze how our services are used, measure the effectiveness of advertising and services, provide customer service, facilitate payment, or conduct academic research and research.
We will carry out strict security inspection on the application program interface (API) and software tool development kit (SDK) for the authorized partner to obtain relevant information, and agree with the authorized partner on strict data protection measures, so that the authorized partner can process personal information in accordance with our entrusted purpose, service description, this privacy policy and any other relevant confidentiality and security measures.
(2) Assignment
We will not transfer your personal information to any company, organization or individual except:
(1) Transfer with explicit consent: after obtaining your explicit consent, we will transfer your personal information to other parties;
(2) In case of merger, acquisition or bankruptcy liquidation of the product service provider, or other situations involving merger, acquisition or bankruptcy liquidation, if the transfer of personal information is involved, we will require the new company or organization holding your personal information to continue to be bound by this policy. Otherwise, we will require the company, organization and individual to seek your authorization and consent again.
(3) Public disclosure
We will only disclose your personal information in the following circumstances:
(1) With your explicit consent or based on your active choice, we may disclose your personal information publicly;
(2) If we determine that you have violated laws and regulations or seriously violated the relevant agreement rules of this product, or in order to protect the personal and property safety of users of the product and its affiliated companies or the public from infringement, we may disclose personal information about you, including relevant violations, and The product has taken measures against you.
(4) Exception of prior authorization for sharing, transferring and public disclosure of personal information

In the following circumstances, your authorization and consent are not required to share, transfer and publicly disclose your personal information:
1. Related to national security and national defense security;
2. Related to public safety, public health and major public interests;
3. Related to criminal investigation, prosecution, trial and execution of judgments;
4. In order to protect your or other personal life, property and other major legitimate rights and interests, but it is difficult to obtain my consent;
5. Personal information that you disclose to the public by yourself;
6. Collecting personal information from legally disclosed information, such as legal news reports, government information disclosure and other channels.
According to the law, sharing and transferring the personal information that has been demarcated, and ensuring that the data receiver can not recover and re identify the subject of personal information, does not belong to the external sharing, transfer and public disclosure of personal information. The storage and processing of such data will not need to notify you and obtain your consent.
4、 How can we protect your personal information
(1) We have taken reasonable and feasible security measures in line with industry standards to protect your information from unauthorized access, public disclosure, use, modification, damage or loss. For example, when exchanging data between your browser and server, it is protected by SSL protocol encryption; at the same time, we provide secure browsing mode of HTTPS protocol for the website; we will use encryption technology to improve the security of personal information; we will use trusted protection mechanism to prevent personal information from being attacked maliciously; we will deploy access control mechanism to ensure that there are only authorized persons In addition, we will organize security and privacy protection training courses to enhance employees' awareness of the importance of protecting personal information.
(2) We have an advanced data security management system with data as the core and around the data life cycle, which improves the security of the whole system from the aspects of organization construction, system design, personnel management, product technology, etc.
(3) We will take reasonable and feasible measures to avoid collecting irrelevant personal information. We will only retain your personal information for the period required to achieve the purpose stated in this policy, unless there is a mandatory retention requirement by law. Our criteria for judging the aforesaid period include:
1. Ensure the safety and quality of our services for you;
2. Do you agree to a longer retention period;
3. Whether there is any other special agreement on the retention period.
After your personal information exceeds the retention period, we will delete your personal information or make it anonymous according to the requirements of applicable laws.

(4) The Internet is not an absolutely safe environment. When using the services provided by our company, we strongly recommend that you do not use the communication methods not recommended by our platform to send your information. You can connect and share with each other through our services. When you create communication, transaction or sharing through our services, you can choose the object of communication or sharing, as the third party who can see your contact information, exchange information or sharing content and other relevant information.
Please note that the information you voluntarily share or even publicly share when using our services may involve personal information or even sensitive personal information of you or others. Please be more careful to consider whether to share or even publicly share relevant information when using our services.
Please use complex password to help us ensure the security of your account. We will try our best to ensure the security of any information you send to us. If our physical, technical or management protection facilities are damaged, resulting in unauthorized access, public disclosure, tampering or destruction of information, resulting in damage to your legitimate rights and interests, we will bear corresponding legal liabilities.
(5) We will update and publish the security risk and personal information security impact assessment report from time to time, which you can obtain through our announcement.
(6) After an unfortunate personal information security incident occurs, we will inform you of the basic information and possible impact of the security incident, the disposal measures we have taken or will take, the suggestions that you can independently prevent and reduce the risk, and the remedial measures for you, etc. We will inform you of the relevant information by e-mail, letter, telephone, push notification and so on. When it is difficult to inform the personal information subject one by one, we will take a reasonable and effective way to release an announcement.
At the same time, we will report the disposal of personal information security incidents in accordance with the requirements of regulatory authorities.
(7) Personal information storage area: domestic and foreign (personal account information is in China, equipment usage statistics and crash information are stored abroad). Storage life: 1 year. Overdue: deleted.
5、 How do you manage your personal information
You can access and manage your personal information in the following ways:
(1) Access to your personal information
(1) You have the right to access your personal information, except for exceptions provided by laws and regulations. You can access your personal information through the following ways:
Account information - if you want to access or edit the basic personal information in your account, you can do this by logging in to your account.
Clear data - you can log in to your account and clear the video, novel browsing records, input records, cookies, account password, history and cache files by clearing data under settings.
(2) If you are unable to access such personal information through the above path, you can contact us through customer service at any time. We will reply to your request within 15 days.
(3) Other personal information generated by you in the course of using our products or services will be provided to you in accordance with the relevant arrangements in section (7) of this article in response to your above request.
(2) Correct or supplement your personal information
When you find that our personal information about you is wrong, you have the right to ask us to make corrections or supplements. You may apply for correction or supplement in the manner specified in "(1) access to your personal information".

(3) Delete your personal information
(1) You can delete part of your personal information in the way listed in "(a) access to your personal information".
(2) You can request us to delete personal information in the following situations:
1. If we deal with personal information in violation of laws and regulations;
2. If we collect and use your personal information without your explicit consent;
3. If our handling of personal information seriously violates the agreement with you;
4. If you no longer use our products or services, or you take the initiative to cancel your account;
5. If we never give you a product or service.
(3) If we decide to respond to your request for deletion, we will also inform the subject who obtained your personal information from us and ask them to delete it in time, unless otherwise stipulated by laws and regulations or with your independent authorization.
(4) When you delete information from our services, we may not delete the corresponding information from the backup system immediately, but will delete it when the backup is updated.
(4) Change the scope of your authorized consent
Each business function requires some basic personal information (see "part II" of this Privacy Policy). In addition, you can revoke some authorization by unbinding, modifying personal settings, deleting relevant information, etc., or you can revoke authorization by deleting account number or contacting us by email.
When you withdraw your consent, we will no longer process the corresponding personal information. However, your decision to withdraw your consent will not affect the previous processing of personal information based on your authorization.
(5) Personal information subject cancels account
(1) You can submit an account cancellation application on the "account cancellation" page.
(2) After you cancel your account voluntarily, we will stop providing you with products or services, delete your personal information or make it anonymous according to the requirements of applicable laws.
(6) Automatic decision making of constraint information system
In some business functions, we may only make decisions based on non manual automatic decision-making mechanisms including information systems and algorithms. If our users make a significant infringement of our public interest, we will also have the right to make a complaint under the premise that our users do not have the right to make a complaint under the premise that we do not infringe upon our public interests.
(7) Respond to your above request
(1) For security, you may need to provide a written request or other means to prove your identity. We may ask you to verify your identity before processing your request.
(2) We will respond within 15 days. If you are not satisfied, you can also make a complaint through the customer service contact information specified in Article 9 of this privacy policy.

(3) In principle, we will not charge you for your reasonable request, but we will charge a certain cost for repeated requests beyond the reasonable limit. We may reject requests that are groundless, require excessive technical means (e.g., need to develop new systems or fundamentally change existing practices), pose risks to the legitimate rights and interests of others, or are highly impractical.
(4) We will not be able to respond to your request under the following circumstances:
1. Related to national security and national defense security;
2. Related to public safety, public health and major public interests;
3. Related to criminal investigation, prosecution, trial and execution of judgments;
4. There is sufficient evidence to show that the subject of personal information has subjective malice or abuse of rights;
5. Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals and organizations;
6. Involving trade secrets.
6、 How do we process children's personal information
Children are not allowed to create their own user accounts without the consent of their guardians. If you are a child, we ask your guardian to read this privacy policy carefully and use our services or provide us with information with your guardian's consent.
We will only use, share, transfer or disclose the child's personal information when using our products or services with the consent of the guardian, as permitted by laws and regulations, with the explicit consent of the guardian or necessary for the protection of the child.
7、 How is your personal information transferred globally
Personal information collected and generated in the course of our operations in the people's Republic of China is stored in China, except for the following circumstances:
1. There are clear provisions in laws and regulations;
2. Obtain your explicit authorization;
3. You conduct cross-border transactions through the Internet.
In the above circumstances, we will ensure that your personal information is adequately protected in accordance with this privacy policy.

8、 How to update this privacy policy
Our privacy policy may change. Unless there are other mandatory provisions in laws, regulations or regulatory provisions, the adjusted or changed contents shall take effect 7 days after being notified or published. If you continue to use any of our services or visit our related websites or applications after the privacy policy adjustment or change, we believe that this means that you have fully read, understood and accepted the revised privacy policy and are bound by it.
(1) We will not limit your rights under this privacy policy without your explicit consent. Any changes to the privacy policy will be posted on a dedicated page (ant browser website - bottom - Privacy Policy).
(2) For major changes, we will also provide more significant notice (including we will notify you through our website, and even provide you with pop-up tips).
Major changes referred to in this policy include but are not limited to:
1. Our service model has changed significantly. For example, the purpose of personal information processing, the type of personal information processing, the use of personal information, etc;
2. We have made significant changes in control and so on. Such as the change of owners caused by merger and reorganization, etc;
3. The main objects of personal information sharing, transfer or public disclosure have changed;
4. Significant changes have taken place in your right to participate in the processing of personal information and the way in which you exercise it;
5. When the Department responsible for handling personal information security, contact information and complaint channels change;
6. When the personal information security impact assessment report indicates that there is a high risk.
9、 How to contact us
You can contact us in the following ways and we will reply to your request within 15 days:
(1) If you have any questions, comments or suggestions on the content of this policy, you can contact us via email by clicking me;
(2) Registered address: 1707, 14th floor, building 8, No.9 courtyard, West Street, Huilongguan town, Changping District, Beijing
(3) If you are not satisfied with our reply, especially if you think that our personal information processing behavior has damaged your legitimate rights and interests, you can also seek solutions by bringing a lawsuit to the court with jurisdiction in the place where the defendant is domiciled.

版权声明:本文著作权归原作者所有,欢迎分享本文,谢谢支持!
转载请注明:Privacy Policy | 文档
分类:隐私 标签:

评论已关闭!