美文网首页
Paste and Copy Privacy Policy

Paste and Copy Privacy Policy

作者: jongjoy | 来源:发表于2021-06-18 10:50 被阅读0次

    Paste and Copy App Privacy Policy
    1. How we collect and use your personal information

    When you use our products and/or services, we need/may need to collect and use your personal information, including the following two types:

    In order to provide you with the basic functions of our products and/or services, you must authorize us to collect and use the necessary information. If you refuse to provide the corresponding information, you will not be able to use our products and/or services normally;

    In order to provide you with other features of our products and/or services, you have chosen to authorize us to collect and use information. If you refuse to provide it, you will not be able to use the relevant additional functions or achieve the functional effects we intend to achieve, but it will not affect your normal use of the basic functions of our products and/or services.

    You understand and agree:

    1. We are committed to creating various products and services to meet your needs. Because we provide you with a wide range of products and services and specific products/services that different users choose to use, the scope of specific products/services is different. Additional features and the type and scope of personal information collected and used will vary. Please refer to specific product/service features;

    2. In order to bring you a better product and service experience, we will continue to work hard to improve technology, and we may launch new or optimized functions from time to time, and may need to collect and use new personal information or make changes. Or how to use personal information. In this regard, we will separately explain to you the purpose, scope and use of the corresponding information by updating this policy, pop-up windows, page prompts, etc., and provide you with a way to choose consent, and obtain your explicit consent to the collection and use. During this process, if you have any questions, comments or suggestions, you can contact us through the various contact methods we provide, and we will reply to you as soon as possible.

    We will implement the following functions of this policy to collect and use your personal information:

    (1) Help you become our user

    In order to comply with the requirements of laws and regulations, when you register as our user, you need to provide your phone number to create an account for this product. For services that require an account for this product, we may verify your user identity based on the above information provided by you to ensure that we are providing services to you.

    When using this product, in order to maintain your basic information and improve the service experience, you can improve the network identification information (for example, avatar, user name and login password, etc.).

    Authorized login: We may share your account information (avatar, nickname and other information shared by you) with third parties with your consent so that you can easily register or log in to third-party accounts. In addition, we may obtain your account information from a third party based on your authorization and bind it to your product account so that you can log in directly to use our products and/or services, or to achieve inter-account correlation Interoperability of rights. We will use your relevant information within the scope of the agreement and agreement reached with the third party.

    (2) Provide you with product or service information display

    During your use of our service, in order to understand the applicability of the product, identify the abnormal status of the account and provide you with page display and search results more suitable for your needs, we may ask you to provide or automatically collect your usage and use it Stored as web log information, including:

    1.2.1 Device information: We will receive and record the device-related information you use (including device model, operating system version, device settings, unique device identifiers, etc.) based on your specific operations during software installation and use. Mobile devices, etc.). . Software and hardware function information, such as application and other software information), information related to device location (including your authorized GPS location and sensor information, such as WLAN access points, Bluetooth, and base stations).

    1.2.2 Service log information: When you use our website or products or services provided by customers, we will automatically collect your detailed usage of our services and save it as a service log. Including browse, click to view, search query, favorite, share, download and IP address, telecom operator, language used, access date and time.

    Please note that separate device information, log information, and location information are information that cannot identify a specific natural person. If we combine this non-personal information with other information to identify a specific natural person, or combine it with personal information, unless you obtain the right to use, this non-personal information will be considered during the combined use. Is personal information. Authorize or unless otherwise required by laws and regulations, we will anonymize and de-identify such information. In order to provide you with information display, search and push services that are more convenient and more in line with your personal needs, we will extract your preference characteristics based on your device information, location information and service log information, and label portraits, display and push based on the characteristics information.

    In addition, we will also use your above-mentioned information in order to continuously improve and optimize the above-mentioned functions.

    (3) Provide you with the function of editing diary

    In order to provide a better diary editing experience, you may need to obtain an album or recording function. We will save it in the cloud for storage, but will not share the diary with third parties.

    2. Information storage

    2.1 Where to store information

    We will store the personal information of users collected in China in accordance with laws and regulations.

    We currently do not transfer or store your personal information across borders. In the future, if cross-border transmission or storage is required, we will inform you of the purpose, purpose, recipient, security assurance measures and security risks of the information going abroad, and obtain your consent.

    3. Information Security

    3.1 Safety protection measures

    We strive to provide guarantees for user information security to prevent information leakage, loss, improper use, unauthorized access and disclosure, etc. We use various security protection measures to ensure that the protection of users' personal information is at a reasonable level. Security includes technical protection means, management system control, security system protection and many other aspects. In addition, we have also passed the national network security level protection (level three) assessment and filing.

    We adopt industry-leading technological protection measures. The technical methods we use include but are not limited to firewalls, encryption (such as SSL), de-identification or anonymization, access control measures, etc. In addition, we will continue to enhance the security of the software installed on the device. For example, we will complete part of the information encryption work locally on your device to consolidate secure transmission; we will learn about the application information installed on your device and the information about the running process to prevent malicious programs (such as viruses and Trojan horses) .

    We have established special management systems, procedures and organizations to ensure the security of personal information. For example, we strictly limit the scope of people who can access information and require them to comply with confidentiality obligations and conduct audits. Those who violate their obligations will be punished in accordance with regulations. We will also review management systems, processes and organizations to prevent unauthorized persons from accessing, using or divulging user information.

    3.2 Security incident handling measures

    In the event of personal information leakage, damage, loss and other security incidents, we will initiate emergency plans to prevent the expansion of security incidents. After a security incident occurs, we will immediately notify you of the basic situation of the security incident, the disposal measures and remedial measures we will take or have already taken, and our response suggestions to you in the form of push notifications, emails, etc. If it is difficult to notify one by one, we will issue a warning through announcements and other means.

    4. How we use information

    We strictly abide by laws and regulations and agreements with users, and use the collected information to provide you with better services in accordance with privacy protection guidelines.

    4.1 Information Use Rules

    We will use the collected information according to the following rules:

    1) We will provide you with various functions and services based on the collected information, including providing corresponding books, book recommendations and other services

    2) We will use cookies and related technologies to collect your account, search history, browsing history, location information and other features in order to provide you with personalized services, including indirect demographic portraits based on the feature tags of the corresponding account, and Provide you with more accurate and personalized services and content, show you relevant advertisements or other promotional content, optimize personalized service experience, evaluate and improve the effects of our advertising and other promotional activities;

    3) We will analyze the operation of our products according to the frequency of your use of this product, fault information, performance information, etc., to ensure the safety of services, optimize our products and improve our service quality. We will not combine the information stored in the analysis software with the personally identifiable information provided by you.

    4.2 Methods of obtaining consent after informing the purpose of the change

    We will use the collected information for the purposes covered by this privacy protection guide. If we use your personal information when collecting information and outside the scope of direct or reasonable contact, we will notify you again and obtain your explicit consent before using your personal information

    5. External regulations

    Currently, we will share information with our product partners so that they can send users information about their products and services. When we share your information, we will urge alliance members, partners or other trusted third-party suppliers and service companies and agents to abide by the privacy policy, and require them to take relevant confidentiality and security measures to deal with the above information. We will use related technologies to locate your actual location. These technologies include IP addresses, GPS, and sensor technologies that provide relevant information (such as WLAN access points, Bluetooth, and base stations). We only collect your geographic location at that time, but will not associate your location information at various times to determine your whereabouts.

    We will not publicly disclose the personal information it collects. If it is necessary to make a public disclosure, we will inform you of the purpose of this public disclosure, the type of information disclosed and the sensitive information that may be involved, and obtain your explicit consent.

    Contact email jongjoyapp@hotmail.com

    相关文章

      网友评论

          本文标题:Paste and Copy Privacy Policy

          本文链接:https://www.haomeiwen.com/subject/qcjkyltx.html