美文网首页
Personal Information Protection

Personal Information Protection

作者: 流浪的小朋友 | 来源:发表于2018-10-06 00:25 被阅读0次

    1. You are fully aware that we do not require your authorization to collect and use personal information in the following situations.

    1.1 related to national security and national defense security;

    1.2 related to public safety, public health, and major public interests;

    1.3 related to criminal investigation, prosecution, trial and execution of judgments;

    1.4 It is difficult to obtain the consent of the person for the purpose of maintaining the material and legal rights of the personal information subject or other individuals;

    1.5 The personal information collected is disclosed by the main body of personal information to the public;

    1.6 Your personal information collected from legally disclosed information, such as legitimate news reports, government information disclosure, etc.;

    1.7 necessary to sign a contract according to your requirements;

    1.8 for the maintenance of faults in the products and / or services provided;

    1.9 Required for legitimate news reporting;

    1.10 When an academic research institution conducts statistical or academic research based on public interest and provides academic research or description results, the personal information contained in the results is de-identified;

    1.11 Other circumstances as stipulated by laws and regulations.

    2. Device permission call

    2.1 We may call some of your device permissions, you may choose to turn off some or all of the permissions in the device's settings feature, and refuse to collect the corresponding personal information. In different devices using the iOS system, the permission display mode and the shutdown mode may be

    Different, please contact the equipment and system developer for details.

    3. The rules for the use of personal information, the user's information is an important part of our business, we will not resell it to others. We use your personal information only in accordance with the following rules.

    3.1 When we want to use your personal information for other purposes not covered by this policy, or for information collected for a specific purpose for other purposes, you will be asked in advance by your initiative to check the form. agree.

    4. Shared information

    4.1 How we share, we do not share your personal information with any company, organization or individual, except in the following cases:

    4.1.1 Obtain your express consent or authorization.

    4.1.2 Sharing under statutory circumstances: We may share your personal information in accordance with laws and regulations, litigation dispute resolution needs, or in accordance with the requirements of the administrative and judicial authorities.

    4.1.3 Only by sharing your personal information can you provide the services you need.

    4.1.4 Share your personal information with affiliates. However, we only share the necessary personal information and are bound by the purposes stated in this Privacy Policy.

    4.1.5 Share some of your personal information with third parties such as partners to ensure the smooth completion of the services provided to you.

    4.2 You can share, you can connect with others, social networks and share with each other through our services. When you create communication, trading or sharing through our services, you can choose to communicate or share with others as a third party who can see your location, itinerary information, contact information, exchange information or share content. . Anyone can view or access this information while using and not using our platform services. Please choose carefully and take responsibility for yourself.

    6 Information protection measures

    6.1 We have taken reasonable and practicable security measures to protect the personal information you provide and prevent unauthorized access, public disclosure, use, modification, damage or loss of personal information. We use data transfer encryption to improve the security of personal information; we use trusted protection mechanisms to protect our personal information from malicious attacks; we deploy access control mechanisms to ensure that only authorized personnel have access to personal information; Security and privacy protection training courses will be held to enhance employees' awareness of the importance of protecting personal information.

    相关文章

      网友评论

          本文标题:Personal Information Protection

          本文链接:https://www.haomeiwen.com/subject/wpycaftx.html