"Mafalong City: Retro hit" User Privacy Agreement

We are committed to strict compliance with laws and regulations, and to provide you with safer and more reliable services in accordance with the following privacy principles:

I. Information we may collect
(1) Information not related to personal identity:
When you use our services, we may collect and aggregate information such as the user’s source path, access order, etc., such as the source path of each user who uses the service, browser software, and so on.

(2) Information about personal identity:
When you use the Services, we may collect and aggregate or request information about your personal identity, such as personal identification (including ID card, passport, driver’s license, etc.); birthday, birthplace, gender, hobbies, personal phone number, Facial features; network identity information (including system account number, IP address, email address and password, password, password protection answers, etc.); personal property information (transaction records, balances, coupons, game-based redemption codes, Bank card information, etc.; communication information; personal Internet access records and log information (including website browsing records, software usage records, click records, operation logs, etc.); device information (including device model, device MAC address, operating system type, device settings) ); software list unique device identification code (such as IMEI / androidID / IDFA / OPENUDID / GUID, SIM card IMSI information, etc. to describe the basic situation of personal equipment); location information (including itinerary information, accurate positioning information, accommodation) Information, latitude and longitude, etc.).

We collect your information primarily to make it easier and more satisfying for you and other users to use the service. Our goal is to provide all Internet users with a safe, exciting, fun and informative online experience. And this information helps us achieve this goal.

Second, how do we collect and use information?
(1) We will collect and obtain your information through the following channels:

  1. The information you provide. E.g:
    (1) Information you provide to us when you register for a service account or use the service;
    (2) The shared information that you provide to other parties through our services, and the information that you store when you use the service.
  2. Your information shared by other parties. That is, the shared information provided by you when other parties use our services.
  3. The information we obtained from you. Information we collect, aggregate, and record when you use our services, such as log information, location information, device information, and so on.

(2) COOKIES, log files and WEBBEACON
We or our third party partners may obtain and use your information through COOKIES and WEB BEACON and store this information as log information.

By using COOKIES, we provide users with a simple and personalized web experience. A COOKIES is a small amount of data that is sent from a web server to your browser and stored on your computer’s hard drive. We use COOKIES to benefit its users. For example, to make the virtual community login process faster, you can choose to have the username in a cookie. This way, the next time you want to log in to our service, it will be more convenient and faster. COOKIES can help us determine the pages and content you connect, the time you spend on a particular service, and the services you choose.

COOKIES allows us to serve you better and faster, and to make your experience on the service more personal. However, you should be able to control whether and how COOKIES is accepted by your browser. Please check the documentation that came with your browser for more information on this.

We and third party partners may collect and use your information through COOKIES and WEB BEACON and store such information.

We use our own COOKIES and WEBBEACON for the following purposes:
(1) Remember your identity. For example: COOKIES and WEB BEACON help us identify you as our registered user or save you with information about your preferences or other information;
(2) Analyze your use of our services. We can use COOKIES and WEB BEACON to find out what activities you use, or which services or services are most popular;
(3) Advertising optimization. COOKIES and WEB BEACON help us provide you with relevant ads based on your information rather than general advertising.

While using COOKIES and WEB BEACON for the above purposes, we may provide non-personally identifiable information collected through COOKIES and WEB BEACON to advertisers and other partners to analyze how you and other users use the service and use it for advertising services.

There may be COOKIES and WEB BEACON placed by advertisers and other partners on the service. These cookies and WEB BEACON may collect non-personally identifiable information about you to analyze how users use the services, to send you advertisements that may be of interest to you, or to evaluate the effectiveness of the advertising services. The collection and use of such information by these third-party cookies and WEB BEACON is not subject to this Privacy Policy, but is subject to its own personal information protection statement, and we are not responsible for third party COOKIES or WEB BEACON.

You can reject or manage COOKIES or WEB BEACON through a browser or user selection mechanism. However, please note that if you disable COOKIES or WEB BEACON, we may not be able to provide you with the best service experience, and some services may not work properly. At the same time, you will still receive ads, but these ads will be less relevant to you.

(3) We collect and use your information for the following purposes:

  1. Help you complete your registration
    In order for us to provide you with services, you need to provide basic registration information, such as mobile phone number, email address, etc., and create your username and password. In some individual services, if you only need to use basic services such as browsing, search, etc., you do not need to register as our user and provide the above information.

  2. Provide goods or services to you
    The information we collect and use is a necessary condition for providing services to you. In the absence of relevant information, we will not be able to provide you with the core content of the service, such as:

(1) In some service items, in order to facilitate the delivery of goods or services to you, you need to provide the consignee’s personal identification information, name, delivery address, postal code, consignee, contact number, payment status and other information. If you refuse to provide such information, we will not be able to complete the delivery service. If you order goods or services for others through our services, you will need to provide the above information for the actual orderer. Before providing us with the above information for the actual subscriber, you need to ensure that you have obtained your authorization.
(2) In order to display the order information of your account, we will collect the order information generated during the process of using our services to show you and facilitate the management of your order;
(3) When you contact us, we may save your communication/call record and content or the contact information you left to contact you or help you solve the problem, or record the solution to the problem and result.
(4) In order to confirm the status of the transaction and provide you with after-sales and dispute resolution services, we will collect your transaction, payment and logistics information related to the progress of the transaction through your trading objects, payment institutions, logistics companies, etc. selected by the exchange. Or share your transaction information with the above service providers.

  1. Push the message to you
    (1) Show and push goods or services for you. We may use your information, your browsing and search history, device information, location information, order information, extract your browsing, search preferences, behavioral habits, location information, etc., and based on feature tags via email, SMS or other Ways to send you marketing information, provide or promote the following goods and services of us or third parties:
    Our goods and services, including but not limited to: instant messaging services, online media services, interactive entertainment services, social networking services, payment services, internet search services, location and map services, applications and services, data management software and services, Online advertising services, internet finance and other social media, entertainment, online games, e-commerce, information and communication software and services (“Internet Services”);

Third-party goods and services, including but not limited to: Internet services, food and food, sports, music, movies, television, live performances and other arts and entertainment, books, magazines and other publications, clothing and accessories, jewelry, cosmetics, personal Health and hygiene, electronics, collectibles, household utensils, appliances, home décor and furnishings, pets, cars, hotels, transportation and travel, banking, insurance and financial services, points and rewards programs, and other things we think may be relevant to you Goods and services.
(2) Notify you. We may send you service-related notifications when necessary (for example, when we suspend a single service due to system maintenance, change, or terminate the provision of a single service).

If you do not wish to continue receiving messages from us, you can ask us to stop pushing. For example, according to the SMS Unsubscribe Guide, we will stop sending promotional messages, or set them on the mobile device, and no longer receive messages we push; However, except for the case where we send a message in accordance with the law or the service agreement of a single service.

4, to provide you with security
To ensure your authenticity and provide you with better security, you can provide us with sensitive personal information such as identification and facial features to complete real-name certification.

In addition to authentication, we may use your information for customer service, security, fraud monitoring, archiving, and backup purposes to ensure the security of the services we provide to you; we may use or integrate the information we collect about you. Information, as well as our partners’ access to information that you authorize or share in accordance with the law, to comprehensively determine your account and transaction risks, conduct authentication, detect and prevent security incidents, and take necessary records, audits, analysis, and disposal measures in accordance with the law.

  1. Improve our services
    We may use information collected through one service for our other services. For example, your information collected while you use one service may be used in another service to provide you with specific content or to show you information that is relevant to you, not generally pushed; we may let You participate in surveys of services to help us improve existing services or design new services; at the same time, we may use your information for software updates.

You understand and agree that after collecting your information, we will de-identify the data through technical means. The information that is identified will not identify you. In this case, we have the right to use it. Information, analysis of user databases and commercial use.

If we use your information for any other purpose not covered in this Privacy Policy, you will be asked for your consent in advance.

  1. Exceptions for authorization of consent
    According to relevant laws and regulations, collecting your information in the following situations does not require your authorized consent:

(1) related to national security and national defense security;
(2) related to public safety, public health, and major public interests;
(3) related to criminal investigation, prosecution, trial and execution of judgments;
(4) It is difficult to obtain your own consent to protect the material or other personal life rights and property rights of the information subject;
(5) The information collected is disclosed to the public by yourself;
(6) Collecting information from legally publicly disclosed information, such as legitimate news reports and government information disclosure;
(7) necessary to sign a contract according to your requirements;
(8) necessary for the safe and stable operation of the maintenance service, such as the failure to discover or dispose of the product or service;
(9) Required for legitimate news reporting;
(10) When an academic research institution conducts statistical or academic research based on public interest and provides academic research or description results, the information contained in the results is de-identified;
(11) Other circumstances as stipulated by laws and regulations.

  1. Information that we may share, transfer or disclose
    (1) Sharing
    We will not share your information with any third party outside of the company without your consent, except in the following cases:

  2. Provide us with our services. We may share your information with partners and other third parties to achieve the core functionality you need or to provide the services you need, such as providing the logistics operator with the corresponding order information;

  3. Maintain and improve our services. We may share your information with our partners and other third parties to help us provide you with more targeted and comprehensive services, such as communication service providers that send emails or push notifications on our behalf;

  4. Achieve the purposes described in Section 2 of the Privacy Policy, “How We Collect and Use Information”;

  5. Perform our obligations and exercise our rights in this Privacy Policy or other agreements we have with you;

  6. Share with third parties such as partners who entrust us to promote, but we will only provide these clients with information on the coverage and effectiveness of the promotion, and will not provide information that can identify you, such as name phone number or electronic Mailbox; or we aggregate this information so that it does not identify you personally. For example, we can tell the client how many people have seen their promotion information or purchase the client’s goods after seeing the information, or provide them with statistical information that does not identify themselves to help them understand their audience or customers.

  7. To the extent permitted by laws and regulations, in order to comply with the law, to protect us and our affiliates or partners, you or other users or the public interest, property or safety from damage, such as to prevent fraud and other illegal activities and reduce Credit risk, we may exchange information with other companies and organizations. However, this does not include information that is sold, rented, shared, or otherwise disclosed for profit, in violation of the promises made in this Privacy Policy.

  8. Assist in handling your disputes or disputes with others, in accordance with your legitimate needs;

  9. Provide your information at the request of your guardian;

  10. Provided under a single service agreement (including an electronic agreement signed online and the corresponding platform rules) or other legal documents signed with you;

  11. Provided based on academic research;

  12. Provided based on social public interests in accordance with laws and regulations
    We will only share your information for legitimate, legitimate, necessary, specific, and specific purposes. We will sign strict confidentiality agreements with companies, organizations and individuals with which we share information, and require them to process information in accordance with our instructions, this Privacy Policy and any other relevant confidentiality and security measures.

(2) Transfer

  1. As our business continues to grow, we may engage in mergers, acquisitions, asset transfers or similar transactions, and your information may be transferred as part of such transactions. We will require new companies and organizations that hold your information to continue to be bound by this Privacy Policy. Otherwise, we will require the company and organization to re-approve your consent.

  2. We will transfer your information to other parties after obtaining your explicit consent.

(3) Disclosure
We will only disclose your information if we comply with industry-standard security measures in the following circumstances:

  1. Disclose the information you specify in accordance with your needs and disclosure methods that you expressly agree to;

  2. In the event that your information must be provided in accordance with the requirements of laws and regulations, mandatory administrative enforcement or judicial requirements, we may disclose your information in accordance with the type of information requested and the method of disclosure. Subject to laws and regulations, when we receive the above request for disclosure, we will require the recipient to issue a corresponding legal document, such as a subpoena or investigation letter. We firmly believe that the information required to be provided by us should be as transparent as possible to the extent permitted by law. All requests are carefully reviewed to ensure they are legally based and are limited to data that law enforcement has legally acquired for specific investigation purposes.

How do we retain, store and protect information?
We retain your information only for the period necessary for the purposes described in this Privacy Policy and for the timeframe required by laws and regulations.
The information we collect and generate during our operations in the People’s Republic of China is stored in China.
We will take the following measures to protect your information:

(1) Data security technical measures
We use industry-standard security measures, including the establishment of reasonable system specifications and security technologies to prevent unauthorized access, modification, and loss of data. Network services use a variety of encryption technologies. For example, in some services, we will use encryption technology (such as SSL) to protect your information, encryption technology to encrypt your information, and isolation through isolation technology. In the use of information, such as information display, information correlation calculation, we will use a variety of data desensitization technology to enhance the security of information in use. Protect data with strict data access control and multiple authentication technologies to prevent data from being used in violation.

(2) Other security measures we have taken to protect information
We manage the storage and use of regulatory information by establishing data classification and grading systems, data security management practices, and data security development specifications.
We provide comprehensive security control of data through information contact confidentiality protocols, monitoring and auditing mechanisms.
Strengthen safety awareness. We also conduct security and privacy protection training courses to enhance employees’ awareness of the importance of protecting information.

(3) We only allow employees and partners who need to know this information to access your information, and set up strict access control and monitoring mechanisms for this purpose. We also require all personnel who may be exposed to your information to perform the appropriate confidentiality obligations. Failure to comply with these obligations may result in legal liability or suspension of our partnership with us.

(4) We will take all reasonable and feasible measures to ensure that irrelevant information is not collected.

(5) The Internet is not an absolutely secure environment, and the way in which e-mail, instant messaging, social software or other service software communicates with other users cannot determine whether it is completely encrypted. We recommend that you use complex passwords when using such tools, and Take care to protect your information.

(6) The Internet environment is not 100% secure and we will do our best to ensure or guarantee the security of any information you send to us. If our physical, technical, or administrative protective equipment is destroyed, resulting in unauthorized access, public disclosure, alteration, or destruction of information, resulting in damage to your legal rights, we will bear the corresponding legal responsibility.

(7) Disposal of security incidents
When communicating with third parties or purchasing goods and services through our services, you will inevitably disclose your information, such as contact information or postal address, to the counterparty or potential counterparty. Please protect your information and provide it to others only when necessary.

In order to cope with possible risks such as information leakage, damage and loss, we have developed a number of systems to clarify the classification and grading standards for security incidents and security vulnerabilities and the corresponding processing procedures. We have also established a special emergency response team for security incidents. In accordance with the requirements of security incident handling regulations, we initiated security plans for different security incidents, conducted stop loss, analysis, positioning, remedial measures, and related departments to trace and strike.

In the event of an unfortunate information security incident, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, and the advice you can take to prevent and reduce risks. , remedies for you, etc. At the same time, we will promptly inform you of the incident related situation by mail, letter, telephone, push notification, etc. When it is difficult to inform the information subject one by one, we will issue a notice in a reasonable and effective manner. At the same time, we will also report the handling of information security incidents in accordance with the requirements of the regulatory authorities.

Please understand that due to technical limitations and limitations of risk prevention, even if we have tried to strengthen security measures, we cannot always guarantee 100% security of information. You need to understand that the systems and communication networks that you use to access our services may be problematic due to circumstances beyond our control.

How to manage your information
(1) Access, update and deletion
We encourage you to update and modify your information to make it more accurate and effective. You can access your information through our services and complete or request modifications, additions and deletions based on how the information is managed. We will use appropriate technical means to ensure that you have access to, update and correct your information or other information provided in the use of our services.

When accessing, updating, correcting, and deleting the above information, we may ask you to authenticate to secure your information. For your information collected through COOKIES and WEB BEACON, we also describe the selection mechanism provided to you in Section 2 of the Privacy Policy, “COOKIES, Log Archives and WEB BEACON”.

(2) Publicity and sharing
Many of our services allow you to share your information not only with your social network, but also with all users who use the service, such as information you upload or post on the service, or upload or post to others. The information is responded to by uploading or posting your personal information via email or in a public area of ​​the service that is not visible to specific users, and includes location data and log information related to such information. As long as you do not delete the information you disclose or share, the information may remain in the public domain; even if you delete the shared information, the information may be cached, copied or stored independently by other users or third parties not under our control. Or be kept in the public domain by other users or such third parties. If you disclose or share information through the above channels, we will not disclose your information. Therefore, we remind you and ask you to carefully consider whether to disclose or share your information through the above channels.

(3) Cancellation
Your service account may be cancelled or deleted in accordance with the conditions stipulated in the service agreement of the individual service and the relevant national laws and regulations. After the account is logged out or deleted, all service data and data related to the account and related to the account will be deleted or processed according to the service agreement of the individual service.

(4) Change the scope of your authorization
You can always choose whether or not to disclose information. Some information is required to use the service, but most other information is provided by you. You can change the scope of your authorization to continue collecting information or withdraw your authorization by deleting information, turning off device features, and more.

When you withdraw your authorization, we are unable to continue to provide you with the service corresponding to the withdrawal of the authorization, and will not process your corresponding information. However, your decision to withdraw your authorization will not affect the processing of information previously based on your authorization.

(5) Tips on sensitive information
Certain information may be considered sensitive because of its particularity, such as your race, religion, personal health and medical information, as well as identification documents, personal biometric information, property information, whereabouts, information about minors, etc. .

Please note that content and information that you provide, upload, or post in the Service (such as photos or information about your social activities) may reveal your sensitive information. You need to carefully consider whether to use the service to disclose your sensitive information.

You agree that your sensitive information will be treated in accordance with the purposes and manner described in this Privacy Policy.

Third, third-party services
This service may be linked to social media or other services provided by third parties (including websites or other forms of services). include:

(1) You can share some content with other services using the “Share” button, or you can log in to our service using a third-party service. These features may collect your information (including your log information) and may be installed on your computer’s COOKIES to function properly;
(2) We provide you with links through advertisements or other means of our services to enable you to access third party services or websites;
(3) Other access to third party services.

These third-party social media or other services are operated by the relevant third parties. Your use of such third party social media services or other services, including any information you provide to such third parties, is subject to the third party’s own terms of service and information protection (not this Privacy Policy). You need to read the terms carefully. This Privacy Policy applies only to any information we collect and does not apply to any third party services or third party information usage rules, and we do not accept any responsibility for the use of the information provided by you by any third party.

Seven, age limit
We recommend that any minor who participates in an online activity should obtain prior consent from the parent or his or her legal guardian (hereinafter referred to as the “guardian”). We will protect the relevant information of minors in accordance with the relevant laws and regulations of the country.

Parents or guardians are encouraged to direct minors to use our services. We recommend that minors encourage their parents or guardians to read this Privacy Policy and advise minors to seek parental or guardian consent and guidance before submitting information.

Eight, notice and revision
We may revise the terms of this Privacy Policy as appropriate and such modifications form part of this Privacy Policy. For major changes, we will provide more noticeable notices, you may choose to stop using our services; in this case, if you continue to use our services, you agree to be subject to the revised Privacy Policy. constraint.

Any changes will put your satisfaction in the first place. We encourage you to review our Privacy Policy each time you use our services.

We may issue service-related announcements when necessary (for example, when we suspend a service due to system maintenance). You may not be able to cancel these announcements that are related to the service and that are not in the promotion.

Finally, you must be obligated to keep your account and password information confidential. In any case, please take care of it.

Online game user privacy protection and personal information utilization policy
[Note] According to the “Interim Measures for Online Game Management” and the “Mandatory Provisions for Formatting Agreements for Online Game Services” (hereinafter referred to as “Mandatory Provisions”) formulated by the Ministry of Culture, in order to protect online game users (hereinafter referred to as “users” ") The privacy and the regulation of the use of personal information of online game users, this policy is specifically formulated. Please read the following carefully (especially in bold underlined content). If the user does not agree to any of this policy, please do not register or use our services. If the user enters the registration process, the user has reached an agreement with us to voluntarily accept all the contents of this policy. Thereafter, the user must not make any form of defense without reading the contents of this policy.

Respecting the privacy of users is a basic policy of ours. “Privacy” refers to the personally identifiable information provided to us by us when we register our email account, including but not limited to the name in the user registration information, the valid personal identification number, contact information, and home address. We have been actively adopting reasonable measures such as technology and management to ensure the security and effectiveness of user accounts; we will use the collected information in good faith, take effective and necessary measures to protect your privacy, and use commercially reasonable security technologies. Measures to protect your privacy from unauthorized access, use or disclosure.

Special Note: This policy is only applicable to users who use our online game service. If this policy is inconsistent with the agreement of other similar terms of our company, the agreement of this policy shall prevail.

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值