9177

Privacy Policy

Privacy Policy for the app

This policy only applies to 9177 Platform products or services.Last revision date: December 5, 2020.This policy will help you understand the following:

How do we collect and use your user information

How do we use cookies and similar technologies

How do we share, transfer and publicly disclose your user information

How can we protect your user information

How do we deal with children’s personal information

How is your user information stored and transferred globally

How to update this policy

We fully understand the importance of user information to you, and will do our best to protect your user information security and reliability.We are committed to maintaining your trust in us and protect your user information by adhering to the following principles: the principle of consistent authority and responsibility, the principle of clarity of purpose, the principle of optional consent, the principle of least sufficient, the principle of ensuring safety, the principle of principal participation, the principle of openness and transparency, etc.At the same time, we promise that we will take appropriate security measures to protect your user information in accordance with the industry’s mature security standards.

Please read and understand this Privacy Policy carefully before using our products or services.

How do we collect and use your user information

(1) Information collected and used by us during your use of our products or services

We will only be out of business functions are described in this policy, collect user information, and use you collect user information to provide you with products or services, you have the right to choose whether to provide this information, but in most cases, if you don’t, we might not be able to provide the corresponding services to you, also is unable to respond to the problem you encountered:

When you use our service, allowing you to provide us with or we collect the necessary information to provide you with service, including: cell phone number, email address, identity basic information (including name, nationality, sex, occupation, address, contact information), bank account or credit card information, billing information and equipment information, etc.

The user information we collect will be used to provide you with payment, transfer, query, authentication and other functions.

The information provided by you will continue to be authorized for the duration of your use of the Service.When you stop using the Push service, we will stop using and delete the above information.

We guarantee that the collected user information will be de-identified or anonymized in accordance with the law. The information that cannot be used alone or combined with other information to identify the individual of a natural person does not belong to personal information in the legal sense.If we combine non-personal Information with other information to identify you personally, or use it in combination with your personal information, we will treat and protect such information as your personal information in accordance with this Privacy Policy during the combined use.

In order to better operate and improve our technology and services, or due to the change of business strategy, when we offer the user in the product or service information collection, use, processing is beyond the scope of the or to collect user information used in this privacy policy does not contain other purposes, or when we will be based on specific purpose collected information for other purposes, we will get the user information within a reasonable time after or before handling user information to inform you that agreed with your authorization.

(2) exceptions to the authorization

Please understand that, in accordance with laws, regulations and relevant national standards, we do not need your authorization to collect and use your user information under the following circumstances:

  1. Those directly related to national security and national defense security; 
  2. Those directly related to public safety, public health and major public interests; 
  3. Those directly related to criminal investigation, prosecution, trial and execution of judgment; 
  4. For the purpose of safeguarding your or other personal life, property and other significant legitimate rights and interests, but it is difficult to obtain consent; 
  5. The user information collected by you is disclosed to the public by you;
  6. Your user information collected from legally disclosed information, such as legitimate news reports, government information disclosure and other channels; 
  7. Necessary to sign or perform the contract according to your requirements; 
  8. Necessary to maintain the safe and stable operation of the software and related services, such as finding and disposing the faults of the software and related services;
  9. The control of personal information is necessary for the news agency to carry out lawful news reporting; 
  10. When it is necessary for an academic research institution to carry out statistics or academic research in the public interest and provide the results of academic research or description to the outside world, the personal information contained in the results shall be de-labeled.
  11. Other circumstances prescribed by laws and regulations.

How do we use cookies and similar technologies

(1) Cookie

To ensure the proper operation of the website, we will store a small data file named Cookie on your computer or mobile device.Cookies typically contain an identifier, a site name, and some numbers and characters.With cookies, websites can store your access preferences.

We do not use cookies for any purpose other than those stated in this Policy.You can manage or delete cookies according to your preferences.You can clear all cookies saved on your computer, and most Web browsers have features that block cookies.But if you do, you will need to personally change user Settings every time you visit our site.

(2) Website beacons and pixel labels

In addition to cookies, we also use website beacons and pixel tags and other similar technologies on our websites.For example, the E-mail we send you may contain click urls that link to the content of our website.

If you click on this link, we will track that click to help us understand your product or service preferences and improve customer service.A website beacon is usually a transparent image embedded in a website or email.With the help of the pixel tag in the email, we can tell whether the email has been opened or not.If you do not want your activities to be tracked in this way, you can always unsubscribe from our mailing list.

(3) Do Not Track

Many Web browsers have Do Not Track, which publishes Do Not Track requests to web sites.The major Internet standards bodies have yet to establish policies governing how websites should respond to such requests.However, if Do Not Track is enabled in your browser, all of our sites will respect your choice.

 

How do we share, transfer and publicly disclose your user information

(1) Sharing

We will not share your user information with any other company, organization or individual, except:

  1. Sharing with Express Consent: With your express consent, we will share your user information with other parties.
  2. We may share your user information in accordance with laws and regulations or mandatory requirements of government authorities.

(2) Assignment

We will not transfer your user information to any company, organization or individual, except:

  1. Transfer with express consent: After obtaining your express consent, we will transfer your user information to other parties;
  2. In the event of a merger, acquisition or bankruptcy liquidation, if the transfer of user information is involved, we will require the new company or organization holding your user information to continue to be bound by this Privacy policy, or we will require the company or organization to seek authorization from you again.

(3) Public disclosure

We will only publicly disclose your User information if:

  1. After obtaining your express consent;
  2. Legally based disclosure: We may publicly disclose your user information under laws, legal procedures, lawsuits or mandatory requirements of government authorities.

(4) Exceptions to prior authorization and consent when sharing, transferring or publicly disclosing information

Please understand that, in accordance with laws, regulations and relevant national standards, we do not need your authorization to share, transfer or publicly disclose your user information under the following circumstances:

  1. Those directly related to national security and national defense security; 
  2. Those directly related to public safety, public health and major public interests; 
  3. Those directly related to criminal investigation, prosecution, trial and execution of judgment; 
  4. For the purpose of safeguarding your or other personal life, property and other significant legitimate rights and interests, but it is difficult to obtain consent; 
  5. Information you disclose to the public by yourself; 
  6. It is collected from legally disclosed information, such as legitimate news reports, government information disclosure, etc.

    How can we protect your user information

(1) We have used industry-standard security measures to protect the user information provided by you from unauthorized access, public disclosure, use, modification, damage or loss of the data.We will take all reasonably practicable steps to protect your user information.For example, it is protected by SSL encryption when exchanging data between your browser and the Service;We also provide HTTPS secure browsing for websites.We will use encryption to ensure the confidentiality of our data;We will use trusted protection against malicious attacks on our data;We will deploy access control mechanisms to ensure that only authorized personnel have access to user information;And we will hold security and privacy protection training courses to enhance employees’ awareness of the importance of protecting user information.

(2) We will take all reasonably practicable measures to ensure that irrelevant user information is not collected.We will retain your user information only for as long as it is necessary for the purposes stated in our cost policy, unless the retention period is extended or permitted by law.

(3) The Internet is not an absolutely secure environment, and E-mail, instant messaging and communication with other users are not encrypted. We strongly recommend that you do not send user information by such means.

(4) The Internet environment is not 100% secure, and we will try our best to ensure the security of any information you send to us.Even if we make great efforts and take all reasonable and necessary measures, it is still possible to prevent your user information from being illegally accessed, illegally stolen, illegally tampered with or destroyed, resulting in damage to your legitimate rights and interests. Please understand the above risks of information network and bear them voluntarily.

(5) In the event of an unfortunate user information security incident, we will inform you in a timely manner in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the measures we have taken or will take to deal with it, the suggestions you can take to prevent and reduce the risk independently, the remedial measures for you, etc.We will timely inform you of the relevant information of the event by email, letter, phone call, push notification and other means. If it is difficult to inform the information subject of the user one by one, we will take a reasonable and effective way to publish the announcement.At the same time, we will also, in accordance with the requirements of regulatory authorities, take the initiative to report the disposal of user information security incidents.

Your rights

In accordance with relevant laws, regulations and standards, as well as common practices in other countries and regions, we guarantee that you exercise the following rights with respect to your user information:

(1) Access to your user information

You have the right to access your user information, except for exceptions provided by laws and regulations.

We will provide you with any additional user information that you may generate while using our products or services, as long as we do not require excessive investment.

(2) Correct your user information

You have the right to ask us to correct any errors we have made in your user information.

(3) Delete your user information

You may request us to delete user information in the following situations:

  1. If our handling of user information violates laws and regulations;
  2. If we collect and use your user information without your consent;
  3. If we deal with user information in violation of our agreement with you;
  4. If you no longer use our products or services, or you cancel your account;
  5. If we no longer provide you with products or services.

We will evaluate your deletion request and take appropriate steps to process it if it meets the requirements.When you make a delete request to us, we may require you to authenticate to protect the security of your account.When you delete information from our services, due to applicable laws and security technologies, we may not immediately remove the relevant information from the backup system, and we will securely store your information until the backup can be cleaned up or anonymized.

(4) Change the scope of your authorization and consent

Each business function requires some basic user information to complete (see “Part 1” of this policy).You may give or withdraw your authorized consent to the collection and use of user information at any time.

When you withdraw your consent, we will no longer process the user information.Please also note that your revocation of authorization may result in certain consequences, for example, we may not be able to continue to provide you with the corresponding services or specific functions, but your decision to withdraw your consent will not affect the user information processing previously carried out based on your authorization.

How is your user information stored and transferred globally

In principle, the user information collected and generated by us will only be retained by us for the period required for the purposes and purposes stated in this Policy and for the minimum period specified by laws and regulations. After such period of retention, we will delete or anonymize your user information in accordance with the requirements of applicable laws and regulations.Unless otherwise stipulated by laws and regulations, or for the purpose of public interest, scientific historical research, etc., or otherwise authorized by you, we may need to retain relevant data for a longer period of time.

Because we provide products or services through our worldwide resources and servers, this means that, with your authorized consent, your user information may be transferred to or accessed from foreign jurisdictions in the country/territory in which you use the products or services.

Such jurisdictions may have different data protection laws or even no laws.In such cases, we will ensure that your user information is adequately and equally protected within the People’s Republic of China.For example, we may ask for your consent to the cross-border transfer of user information, or implement security measures such as data de-identification prior to cross-border data transfer.

How to update this policy

Our privacy policy is subject to change.We will not reduce your rights under this Privacy Policy without your express consent.We will post any changes to this policy on this page.

We will also provide more significant notice of major changes.Material changes referred to in this Policy include, but are not limited to:

  1. Significant changes have taken place in our service model.Such as the purpose of processing user information, the type of user information processed, and the way of using user information;
  2. We have undergone significant changes in ownership structure, organizational structure, etc.Such as business adjustment, bankruptcy mergers and acquisitions caused by the change of owners;
  3. The main objects of user information sharing, transfer or public disclosure change;
  4. Your rights to participate in user information processing and the way you exercise them have changed significantly;
  5. We are responsible for dealing with changes in the responsible departments, contact information and complaint channels of users’ information security;
  6. When the user information security impact assessment report indicates high risk.