Polar bear fishing Privacy Policy

This game (hereinafter referred to as "we") is fully aware of the importance of personal information to you, and will do its best to protect the security and reliability of your personal information. We are committed to maintaining your trust in us by protecting your personal information by adhering to the following principles:
The principle of consistency of power and responsibility, the principle of clear purpose, the principle of choice and consent, the principle of least sufficiency, the principle of ensuring safety, the principle of subject participation, the principle of openness and transparency, etc. At the same time, we promise to take appropriate security measures to protect your personal information in accordance with the industry's mature security standards.
Please read and understand this Privacy Policy carefully before using our products (or services).

1. How we collect and use your personal information
Personal information refers to all kinds of information recorded electronically or in other ways that can identify the identity of a specific natural person or reflect the activities of a specific natural person alone or in combination with other information.
We will only collect and use your personal information for the following purposes as described in this policy:
(1) To provide you with online shopping services
1. Business function 1: Register as a user
To complete account creation, you will need to provide the following information: your name, email address, created username and password.
During the registration process, if you provide the following additional information, it will help us provide you with a better service and experience: mobile phone number, job title, company, educational background. However, if you do not provide this information, it will not affect the use of the basic functions of this service.
The above information you provide will continue to authorize us to use it during your use of the Service. When you close your account, we will stop using and delete the above information.
The above information will be stored in the territory of the People's Republic of China. For cross-border transfers, we will obtain your authorization and consent separately.
2. Business function two: product display, personalized recommendation, and sending promotional marketing information.
(slightly)
(2) Conduct internal data analysis research, third-party SDK statistical services, and improve our products or services
We collect data based on your interactions with us and the choices you make, including your privacy settings and the products and features you use. The data we collect may include SDK/API/JS code version, browser, internet service provider, IP address, platform, timestamp, app identifier, app version, app distribution channel, unique device identifier, iOS advertising identifier IDFA, Android Advertiser Identifier, Network Card (MAC) Address, International Mobile Equipment Identity (IMEI), Device Model, Terminal Manufacturer, Terminal Device OS Version, Session Start/Stop Time, Language Location, Time Zone, Network Status (WiFi etc.), hard drive, CPU and battery usage etc.
When we want to use the information for other purposes not specified in this policy, we will ask for your prior consent.
When we want to use information collected for a specific purpose for other purposes, we will ask for your prior consent.

2. How we use cookies and similar technologies
(1) Cookies
To ensure the proper functioning of the website, we store small data files called cookies on your computer or mobile device. Cookies usually contain an identifier, a site name, and some numbers and characters. With the help of cookies, websites can store data such as your preferences or the items in your shopping basket.
We will not use cookies for any purpose other than those described in this policy. You can manage or delete cookies according to your preferences. You can clear all cookies saved on your computer, and most web browsers have a cookie blocking feature. However, if you do this, you will need to personally change your user settings every time you visit our website.
(2) Web beacons and pixel tags
In addition to cookies, we also use other similar technologies on our website, such as web beacons and pixel tags. For example, an email we send you may contain a click URL linking to the content of our website. If you click on the link, we will track the click to help us understand your product or service preferences and improve customer service. Web beacons are usually transparent images embedded in websites or emails. With the help of pixel tags in emails, we can tell if an email has been opened. If you do not wish to have your activity tracked in this way, you can unsubscribe from our mailing list at any time.
(3) Do not track
Many web browsers have a Do Not Track feature that makes Do Not Track requests to websites. Currently, no major Internet standards organization has developed a policy governing how websites should respond to such requests. However, if your browser has Do Not Track enabled, then all of our sites will respect your choice.

3. How we share, transfer and publicly disclose your personal information
(1) Share
We will not share your personal information with any other companies, organizations and individuals, except in the following cases:
1. Sharing with explicit consent: After obtaining your explicit consent, we will share your personal information with other parties.
2. We may share your personal information externally in accordance with laws and regulations or the mandatory requirements of government departments.
3. Sharing with our affiliates: Your personal information may be shared with our affiliates. We will only share personal information that is necessary and for the purposes described in this Privacy Policy. If the affiliate wants to change the purpose of processing personal information, it will seek your authorization again.
Must comply with our data privacy and security requirements. We will only share your personal information for lawful, legitimate, necessary, specific and explicit purposes, and only personal information necessary to provide services.
For companies, organizations and individuals with whom we share personal information, we will enter into strict non-disclosure agreements with them, requiring them to process personal information in accordance with our instructions, this Privacy Policy and any other relevant confidentiality and security measures.
(2) Transfer
We will not transfer your personal information to any companies, organizations and individuals, except in the following cases:
1. Explicit consent to transfer: After obtaining your explicit consent, we will transfer your personal information to other parties;
2. In the event of merger, acquisition or bankruptcy liquidation, if the transfer of personal information is involved, we will require the new company and organization holding your personal information to continue to be bound by this Privacy Policy, otherwise we will require the company or organization to continue to be bound by this Privacy Policy. subject to this Privacy Policy. Request your authorization again.
(3) Public disclosure
We will only publicly disclose your personal information in the following circumstances:
1. After obtaining your explicit consent;
2. Legal disclosure: We may publicly disclose your personal information in accordance with laws, legal procedures, lawsuits or mandatory requirements of government agencies.

4. How we protect your personal information
(1) We have used industry standard security measures to protect the personal information you provide to prevent unauthorized access, public disclosure, use, modification, damage or loss of the data. We will take all reasonably practicable steps to protect your personal information. For example, when data (such as credit card information) is exchanged between your browser and the service
SSL encryption protection; we also provide https secure browsing on our website; we will use encryption technology to ensure the confidentiality of data; we will use trusted protection mechanisms to prevent malicious attacks on data; we will deploy access control mechanisms , to ensure that only authorized personnel can access personal information; we will conduct security and privacy protection training courses to enhance employees' awareness of the importance of protecting personal information.
(2) We will take all reasonably practicable measures to ensure that irrelevant personal information is not collected. We will only retain your personal information for as long as is necessary to achieve the purposes described in this policy, unless extended retention periods are required or permitted by law.
(3) The Internet is not an absolutely secure environment, and emails, instant messaging and communications with other users are not encrypted. We strongly recommend that you do not send personal information in this way. Please use a complex password to help us keep your account secure.
(4) The internet environment is not 100% secure and we will do our best to ensure or guarantee the security of any information you send to us. If our physical, technical or management protection facilities are damaged, resulting in unauthorized access, public disclosure, tampering or destruction of information, resulting in damage to your legitimate rights and interests, we will bear the corresponding legal responsibility.
(5) In the event of an unfortunate personal information security incident, we will promptly notify you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, and you can provide you with preventive measures and recommendations to reduce risks, remedial measures, etc. We will promptly notify you of the relevant information of the event by email, telephone, push notification, etc. When it is difficult for the subject of personal information to inform them one by one, we will publish announcements in a reasonable and effective manner.
At the same time, we will also take the initiative to report the handling of personal information security incidents in accordance with the requirements of regulatory authorities.

V. YOUR RIGHTS
In accordance with relevant Chinese laws, regulations, standards and common practices in other countries and regions, we guarantee that you exercise the following rights over your personal information:
(1) Access to your personal information
You have the right to access your personal information, subject to exceptions provided by laws and regulations. If you want to exercise your data access rights, you can do so yourself by:
Account Information - You can access if you wish to access or edit your profile information and payment information in your account, change your password, add security information or close your account.
Search Information - Here you can access or clear your search history, view and modify interests, and manage other data.
If you are unable to access this personal information via the link above, you can contact us at any time using our web form and we will respond to your request for access within 30 days.
We will provide you with other personal information generated during the use of our products or services, as long as we do not require excessive investment.
(2) Correction of your personal information
When you find that the personal information we process about you is inaccurate, you have the right to ask us to correct it. You can apply for correction through the methods listed in "(1) Access to your personal information".
If you are unable to correct this personal information via the link above, you can contact us at any time and we will respond to your request for correction within 30 days.
(3) Delete your personal information
You can ask us to delete personal information in the following circumstances:
1. If our processing of personal information violates laws and regulations;
2. If we collect and use your personal information without your consent;
3. If our processing of personal information violates our agreement with you;
4. If you no longer use our products or services, or you cancel your account;
5. If we no longer provide you with products or services.
If we decide to respond to your deletion request, we will also notify entities that have obtained your personal information from us and require it to be deleted promptly, unless otherwise required by laws and regulations, or those entities obtain your independent authorization.
When you delete information from our services, we may not delete the corresponding information from the backup system immediately, but we will delete the information when the backup is updated.
6. Change the scope of your authorization and consent
Each business function requires some basic personal information (see "Part 1" of this policy). You may give or withdraw your consent at any time for the collection and use of additionally collected personal information.
When you withdraw your consent, we will no longer process the corresponding personal information. However, your decision to withdraw consent will not affect previous processing of personal information based on your authorization.
7. The personal information subject cancels the account
You can cancel your previously registered account at any time.
After canceling your account, we will stop providing you with products or services, and delete your personal information according to your request, unless otherwise provided by laws and regulations.
8. The personal information subject obtains a copy of the personal information
You have the right to obtain a copy of your personal information.
Under the premise of technical feasibility such as data interface matching, we can also directly transmit a copy of your personal information to a third party designated by you according to your request.
9. Constraint information system to automatically make decisions
In some business functions, we may only make decisions based on non-human automated decision-making mechanisms, including information systems, algorithms, etc. If these decisions significantly affect your legitimate rights and interests, you have the right to ask us to explain and we will provide appropriate remedies.
10. Respond to your above request
For security reasons, you may be required to provide a written request or otherwise prove your identity. We may ask you to verify your identity before processing your request.
We will reply within thirty days.
For your reasonable request, in principle, we do not charge a fee, but for repeated requests beyond a reasonable limit, we will charge a fee at our discretion. For those that are unnecessary duplications that require excessive technical means (eg, require the development of new systems or fundamental changes that violate existing practices), pose a risk to the legitimate rights and interests of others, or are highly impractical (eg, involve backup storage information on tape). requests, we may refuse.
In the following cases, we will not be able to respond to your request as required by laws and regulations:
1. Related to national security and national defense security;
(2) Related to public security, public health, or major public interests;
3. Related to criminal investigation, prosecution and trial;
4. There is sufficient evidence to show that you have subjective malice or abuse of rights;
5. Responding to your request will seriously damage the legitimate rights and interests of you or other individuals or organizations.
VI. HOW WE PROCESS CHILDREN'S PERSONAL INFORMATION
Our products, websites and services are primarily aimed at adults. Children may not create their own user accounts without parental or guardian consent.
For the collection of children's personal information with parental consent, we will only use or publicly disclose such information as permitted by law, expressly consented by a parent or guardian, or necessary to protect the child.
Although local laws and customs define children differently, we consider anyone under the age of 14 to be a child.
If we become aware that we have collected personal information from a child without first obtaining verifiable parental consent, we will attempt to delete the relevant data as soon as possible.
7. How your personal information is transferred globally
The personal information we collect and generate in the People's Republic of China will be stored in the People's Republic of China in principle.
Because we provide products or services through resources and servers around the world, this means that with your authorization and consent, your personal information may be transferred to jurisdictions other than the country/region where you use the products or services, or subject to access from these jurisdictions.
Such jurisdictions may have different data protection laws or even no relevant laws. In this case, we will ensure that your personal information is fully and equally protected within the territory of the People's Republic of China. For example, we may ask for your consent to transfer personal information across borders, or implement security measures such as data de-identification prior to cross-border data transfers.
8. How to update this Privacy PolicyWe may adjust or change this Privacy Policy from time to time, and any updates to this Privacy Policy will be posted on our website by marking the time of the update. The content is effective 7 days after notification or publication. If you continue to use any services we provide or visit our related websites after the privacy policy is adjusted or changed, we believe that you have fully read, understood and accepted the revised privacy policy and are bound by it.

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值