LOFTER for ipad —— 让兴趣,更有趣

点击下载 关闭
Privacy Policy
bitcoin pro 2020-04-14

Bitcoin Wallet Privacy Agreement

 

We understand the importance of personal information to you and will do our best to protect your personal information safe and reliable. We are committed to maintaining your trust in us, abide by the following principles, and protect your personal information: the principle of unanimity of power and responsibility, the principle of clear purpose, the principle of choice and consent, the principle of least sufficient use, the principle of ensuring safety, the principle of subject participation, the principle of transparency . At the same time, we promise that we will take corresponding security protection measures to protect your personal information in accordance with the industry's mature security standards.

 

Please read and understand this "Privacy Policy" carefully before using our products (or services).

 

1. How do we collect and use your personal information

 

Personal information refers to all kinds of information recorded in electronic or other ways that can identify the identity of a specific natural person or reflect the activities of a specific natural person, alone or in combination with other information.

 

We will only collect and use your personal information for the following purposes described in this policy:

 

(1) Provide you with online shopping services

 

1. Business function one: register as a user

 

In order to complete the account creation, you need to provide the following information: your name, email address, user name and password created.

 

During the registration process, if you provide the following additional information, it will help us provide you with a better service and experience: mobile phone number, job title, company, educational background. But if you do not provide this information, it will not affect the basic functions of using this service.

 

The above information you provide will continue to authorize us to use it during your use of this service. When you cancel your account, we will stop using and delete the above information.

 

The above information will be stored in Australia. For cross-border transmission, we will separately obtain your authorized consent.

 

2. Business function two: product display, personalized recommendation, sending promotional marketing information

 

(2) Carry out internal data analysis and research, and third-party SDK statistical services to improve our products or services [Note: Examples]

 

We collect data based on your interaction with us and the choices you make, including your privacy settings and the products and features you use. The data we collect may include SDK / API / JS code version, browser, Internet service provider, IP address, platform, time stamp, application identifier, application version, application distribution channel, independent device identifier, iOS advertising logo (IDFA), Android advertiser identifier, network card (MAC) address, International Mobile Equipment Identity (IMEI), device model, terminal manufacturer, terminal device operating system version, session start / stop time, language location, time zone and Network status (WiFi, etc.), hard disk, CPU and battery usage, etc.

 

When we want to use the information for other purposes not specified in this strategy, we will seek your consent in advance.

 

When we want to use information collected for a specific purpose for other purposes, we will ask for your consent in advance.

 

Second, how do we use cookies and similar technologies

 

(1) Cookie

 

To ensure the proper functioning of the website, we store small data files called cookies on your computer or mobile device. Cookies usually contain identifiers, site names, and some numbers and characters. With the help of cookies, the website can store data such as your preferences or products in the shopping basket.

 

We will not use cookies for any purpose other than those described in this policy. You can manage or delete cookies according to your preferences. You can clear all cookies saved on your computer. Most web browsers have a function to block cookies. However, if you do this, you will need to change user settings yourself each time you visit our website. To learn more about how to change your browser settings, please visit the following links: <Internet Explorer>, <GoogleChrome>, <Mozilla Firefox>, <Safari> and <Opera>.

 

(2) Web beacons and pixel tags

 

In addition to cookies, we also use other similar technologies such as web beacons and pixel tags on our websites. For example, the email we send you may contain a click URL that links to the content of our website. If you click the link, we will track the click to help us understand your product or service preferences and improve customer service. Web beacons are usually a transparent image embedded in a website or email. With the help of the pixel tag in the email, we can know whether the email is opened. If you do not want your activity to be tracked in this way, you can unsubscribe from our mailing list at any time.

 

(3) Do Not Track (Do Not Track)

 

Many web browsers are equipped with Do Not Track function, which can issue Do Not Track requests to websites. At present, major Internet standards organizations have not established policies to regulate how websites should respond to such requests. But if your browser has Do Not Track enabled, then all of our websites will respect your choice.

 

3. How do we share, transfer and publicly disclose your personal information

 

(1) Sharing

 

We will not share your personal information with any other companies, organizations and individuals, except for the following:

 

1. Sharing with explicit consent: After obtaining your explicit consent, we will share your personal information with other parties.

 

2. We may share your personal information externally in accordance with the provisions of laws and regulations, or in accordance with the compulsory requirements of the competent government department.

 

3. Sharing with our affiliated companies: Your personal information may be shared with our affiliated companies. We will only share the necessary personal information and are bound by the purpose stated in this privacy policy. If an affiliated company wants to change the purpose of processing personal information, it will seek your authorization and consent again.

 

4. Sharing with authorized partners: For the purposes stated in this privacy policy, some of our services will be provided by authorized partners. We may share some of your personal information with our partners to provide better customer service and user experience. For example, companies we hire to provide third-party data statistics and analysis services may need to collect and access personal data for data statistics and analysis. In this case, these companies must comply with our data privacy and security requirements. We will only share your personal information for legal, legitimate, necessary, specific and clear purposes, and only share the personal information necessary to provide services.

 

For companies, organizations and individuals with whom we share personal information, we will sign strict confidentiality agreements with them and require them to process personal information in accordance with our instructions, this privacy policy and any other related confidentiality and security measures.

 

(2) Transfer

 

We will not transfer your personal information to any company, organization or individual, except for the following:

 

1. Transfer with explicit consent: After obtaining your explicit consent, we will transfer your personal information to other parties;

 

2. When it involves mergers, acquisitions or bankruptcy liquidation, if it involves the transfer of personal information, we will require new companies and organizations that hold your personal information to continue to be bound by this privacy policy, otherwise we will require that company or organization Ask you for authorization again.

 

(3) Public disclosure

 

We will only publicly disclose your personal information in the following situations:

 

1. After obtaining your explicit consent;

 

2. Disclosure based on law: In the case of laws, legal procedures, litigation or mandatory requirements of government authorities, we may disclose your personal information publicly.

 

4. How do we protect your personal information

 

(1) We have used security protection measures that comply with industry standards to protect the personal information you provide and prevent data from unauthorized access, public disclosure, use, modification, damage, or loss. We will take all reasonable and feasible measures to protect your personal information. For example, when exchanging data (such as credit card information) between your browser and the "service" is protected by SSL encryption; we also provide https secure browsing to our website; we will use encryption technology to ensure the confidentiality of data; we will Use trusted protection mechanisms to prevent malicious attacks on data; we will deploy access control mechanisms to ensure that only authorized personnel can access personal information; and we will organize security and privacy protection training courses to strengthen the importance of employees for the protection of personal information understanding.

 

(2) We will take all reasonable and feasible measures to ensure that irrelevant personal information is not collected. We will only retain your personal information for the period required to achieve the purpose stated in the cost policy, unless the retention period needs to be extended or permitted by law.

 

(3) The Internet is not an absolutely secure environment, and e-mail, instant messaging, and communication with other users are not encrypted. We strongly recommend that you do not send personal information through such methods. Please use a complex password to help us keep your account safe.

 

(4) The Internet environment is not 100% secure. We will do our best to ensure or guarantee the security of any information you send to us. If our physical, technical, or management and protection facilities are damaged, resulting in unauthorized access to information, public disclosure, tampering, or destruction, resulting in damage to your legitimate rights and interests, we will assume corresponding legal responsibility.

 

(E) After an unfortunate personal information security incident, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, you can independently prevent and Risk reduction recommendations, remedies for you, etc. We will promptly inform you of the relevant circumstances of the incident by mail, letter, telephone, push notification, etc., and when it is difficult to inform the personal information subject one by one, we will adopt a reasonable and effective way to release the announcement.

 

At the same time, we will also proactively report the handling of personal information security incidents in accordance with the requirements of regulatory authorities.

 

5. Your rights

 

In accordance with relevant Australian laws, regulations, standards, and common practices in other countries and regions, we guarantee that you exercise the following rights in your personal information:

 

(1) Access to your personal information

 

You have the right to access your personal information, except for exceptions provided by laws and regulations. If you want to exercise data access rights, you can access it yourself in the following ways:

 

Account Information-If you wish to access or edit the profile information and payment information in your account, change your password, add security information or close your account, etc., you can perform such operations by visiting us.

 

Search Information-You can access or clear your search history, view and modify interests, and manage other data in us.

 

If you are unable to access this personal information through the above link, you can always contact us using our web form. We will respond to your request for access within 30 days.

 

As for other personal information generated during the use of our products or services, as long as we do not need too much investment, we will provide you.

 

(2) Correct your personal information

 

When you find that the personal information we process about you is wrong, you have the right to ask us to make corrections. You can apply for correction by the methods listed in "(1) Access to your personal information".

 

If you are unable to correct this personal information through the above link, you can always contact us using our web form, and we will respond to your request for correction within 30 days.

 

(3) Delete your personal information

 

In the following situations, you can submit a request to us to delete personal information:

 

1. If our handling of personal information violates laws and regulations;

 

2. If we collect and use your personal information without your consent;

 

3. If our handling of personal information violates the agreement with you;

 

4. If you no longer use our products or services, or you cancel your account;

 

5. If we no longer provide products or services for you.

 

If we decide to respond to your deletion request, we will also notify the entity that obtained your personal information from us and request that it be deleted in a timely manner, unless otherwise stipulated by laws and regulations, or these entities obtain your independent authorization.

 

When you delete information from our service, we may not immediately delete the corresponding information in the backup system, but will delete this information when the backup is updated.

 

(4) Change the scope of your authorized consent

 

Each business function requires some basic personal information to complete (see "Part 1" of this strategy). For the collection and use of additional collected personal information, you can give or withdraw your authorized consent at any time.

 

When you withdraw your consent, we will no longer process the corresponding personal information. However, your decision to withdraw your consent will not affect the processing of personal information previously carried out based on your authorization.

 

(5) The personal information subject cancels the account

 

You can cancel the previously registered account at any time. After canceling the account, we will stop providing products or services for you and delete your personal information according to your requirements, unless otherwise stipulated by laws and regulations.

 

(6) Personal information subject obtains a copy of personal information

 

You have the right to obtain a copy of your personal information,

 

Under the premise of technical feasibility, such as data interface matching, we can also directly transfer a copy of your personal information to a third party you specify according to your requirements.

 

(7) Automatic decision-making of constrained information system

 

In some business functions, we may only make decisions based on non-manual automatic decision-making mechanisms including information systems, algorithms, etc. If these decisions significantly affect your legal rights, you have the right to ask us to explain, and we will also provide appropriate relief.

 

(8) Respond to your above request

 

To ensure safety, you may need to provide a written request or prove your identity in other ways. We may ask you to verify your identity before processing your request.

 

We will respond within thirty days.

 

For your reasonable request, we will not charge a fee in principle, but for repeated requests that exceed the reasonable limit, we will charge a certain cost as appropriate. For those that are unreasonably repetitive, require too many technical means (for example, need to develop new systems or fundamentally change existing practices), pose a risk to the legitimate rights and interests of others or are very impractical (for example, involving information stored on backup tapes) We may refuse the request.

 

In the following situations, as required by laws and regulations, we will not be able to respond to your request:

 

1. Related to national security and national defense security;

 

2. Related to public safety, public health, and major public interests;

 

3. Related to criminal investigation, prosecution and trial;

 

4. There is sufficient evidence that you have subjective maliciousness or abuse of rights;

 

5. Responding to your request will result in serious damage to the legal rights of you or other individuals and organizations.

 

6. How do we handle children's personal information

 

Our products, websites and services are mainly for adults. Without the consent of parents or guardians, children may not create their own user accounts.

 

For the collection of children's personal information with parental consent, we will only use or publicly disclose this information when permitted by law, with the explicit consent of the parent or guardian, or as necessary to protect the child.

 

Although local laws and customs define children differently, we treat anyone under 14 years old as a child.

 

If we find that we have collected children s personal information without prior verifiable parental consent, we will try to delete the relevant data as soon as possible.

 

7. How your personal information is transferred globally

 

In principle, the personal information we collect and generate in Australia will be stored in Australia.

 

Since we provide products or services through resources and servers throughout the world, this means that, after obtaining your authorized consent, your personal information may be transferred to the overseas jurisdiction of the country where you use the products or services, or Received interviews from these jurisdictions.

 

Such jurisdictions may have different data protection laws, or even no relevant laws. In such cases, we will ensure that your personal information is adequately protected in Australia. For example, we will ask for your consent to transfer personal information across borders, or implement security measures such as de-identification of data before cross-border data transfer.

 

8. How to update this privacy policy

 

We may adjust or change this privacy policy in due course. Any updates to this privacy policy will be posted on our website with the time of the update. Except for the mandatory provisions of laws, regulations or regulatory provisions, adjustments or changes The content will be effective 7 days after notification or announcement. If you continue to use any of the services we provide or visit our related websites after the privacy policy is adjusted or changed, we believe that this means that you have fully read, understood and accepted the revised privacy policy and are bound by it.


推荐文章
评论(0)
联系我们|招贤纳士|移动客户端|风格模板|官方博客|侵权投诉 Reporting Infringements|未成年人有害信息举报 0571-89852053|涉企举报专区
网易公司版权所有 ©1997-2024  浙公网安备 33010802010186号 浙ICP备16011220号-11 增值电信业务经营许可证:浙B2-20160599
网络文化经营许可证: 浙网文[2022]1208-054号 自营经营者信息 工业和信息化部备案管理系统网站 12318全国文化市场举报网站
网信算备330108093980202220015号 网信算备330108093980204230011号
分享到
转载我的主页