Pet Record Privacy Policy

We are well aware of the importance of personal information to you, and we will adopt safe protection measures in accordance with laws and regulations to protect your personal information and privacy. In view of this, the tool open platform and service providers (hereinafter referred to as "we" or "company") have formulated this "Privacy Policy" (hereinafter referred to as "this policy/this privacy policy").
Before using this tool to open the platform and related services, please be sure to read and thoroughly understand this policy, and use this tool to open the platform and related services after confirming your full understanding and agreement. Once you start to use this tool to open the platform or related services, it means that you have fully understood and agreed to this policy.
We hope to explain to you through this Privacy Policy that when you use this tool to open the platform and related services, we will collect, use, store, share, transfer (if applicable) and protect your personal information in accordance with this Privacy Policy. Describe our processing of your personal information and the ways we provide you with access to, deletion, correction, withdrawal of consent and protection of this information. This Privacy Policy will help you understand the following:
1. How we collect and use personal information
2. How we use similar technologies such as cookies
3. How we share, transfer, and publicly disclose personal information
4. How we store personal information
5. How we protect the security of personal information
6. Manage your personal information
7. Terms of Use for Minors
8. Amendments and Notices of Privacy Policy

1. How we collect and use personal information
We will collect the information you actively provide when you use the service, and collect the information you generate in the process of using the function or accepting the service through automated means in the following ways:
(1) Registration, login and authentication
When you register and log in to the open platform of this tool and related services, you can create an account through your email address, and we will send a verification code to verify whether your identity is valid, and you can complete the relevant network identification information (such as password), This information is collected to help you complete your registration.
(2) Ensuring the safety of products, services and users
In order to help us better understand the operation of the open platform of this tool and related services, so as to ensure the safety of operation and provision of services, we may record network log information, as well as the frequency of using the software and related services, crash data, overall installation, usage situation, performance data, etc.
(3) Other purposes
We may conduct de-identified research, statistical analysis and prediction on the collected information to improve and enhance the services of the open platform of this tool, and to provide product or technical service support for user decision-making.
When we use the information for other purposes not specified in this policy, or use the information collected for a specific purpose for other purposes, we will ask for your prior consent.
(4) Personal information that is exempted from the collection and use of consent in accordance with the law
Please understand that in the following cases, according to laws and regulations and relevant national standards, we do not need your authorization and consent to collect and use your personal information:
(1) Those directly related to national security and national defense security;
(2) Those directly related to public safety, public health, and major public interests;
(3) Directly related to criminal investigation, prosecution, trial and execution of judgments;
(4) It is difficult to obtain the consent of the person in order to protect the life and property of the personal information subject or other individuals and other major legitimate rights and interests;
(5) Your personal information collected is disclosed to the public by you;
(6) Your personal information is collected from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels;
(7) Necessary to sign or perform a contract at your request;
(8) Necessary for maintaining the safe and stable operation of the open platform of this tool and related services, such as discovering and dealing with failures of the open platform of this tool and related services;
(9) Necessary for legitimate news reporting;
(10) When it is necessary for academic research institutions to carry out statistical or academic research based on public interests, and when providing the results of academic research or description to the outside world, the personal information contained in the results is de-identified;
(11) Other circumstances stipulated by laws and regulations.
You are specially reminded to note that if the information cannot identify you individually or in combination with other information, it does not belong to your personal information in the legal sense; when your information can identify you individually or in combination with other information or we When data that cannot be linked to any specific personal information is used in combination with other personal information about you, such information will be treated and protected as your personal information in accordance with this Privacy Policy during the combined use.

2. Use of Cookies and Similar Technologies
Cookies and similar technologies are commonly used technologies on the Internet. When you use this tool open platform and related services, we may use related technologies to send one or more cookies or anonymous identifiers to your device to collect and store information when you access and use this product. We promise not to use cookies for any other purpose than those described in this Privacy Policy. We use cookies and similar technologies primarily to achieve the following functions or services:
(1) Ensuring the safe and efficient operation of products and services
We may set cookies or anonymous identifiers for authentication and security, so that we can confirm whether you are using the login service safely, or whether you have encountered illegal acts such as theft or fraud. These technologies also help us improve the efficiency of our services and improve login and responsiveness.
(2) Helping you get an easier access experience
Using such technologies can help you avoid repeating the steps and processes of filling out your personal information and entering your search content (eg, recording your search history).
(3) Clearance of cookies
Most browsers provide users with the function of clearing browser cache data, and you can perform corresponding data clearing operations in the browser settings. If you clear it, you may not be able to use the services or corresponding functions provided by the company that rely on cookies due to these modifications.

3. How we store personal information
(1) Where the information is stored
In accordance with the provisions of laws and regulations, we store your personal information collected and generated during domestic operations in the territory of the People's Republic of China. At present, we will not transmit the above information overseas. If we transmit it overseas, we will follow relevant national regulations or seek your consent.
(2) Storage period
We only retain your personal information for the period necessary for the purpose of providing the open platform of this tool and related services. After the necessary period, we will delete or anonymize your personal information, unless otherwise provided by laws and regulations.

4. How do we share, transfer and publicly disclose personal information
(1) Sharing and transfer of personal information
We will not share or transfer your personal information to third parties unless you have given your prior authorization and consent, or the personal information shared or transferred is de-identified information, and the sharing third party cannot re-identify the natural person of such information main body.
1. Careful assessment and responsibility constraints of third-party subjects who share personal information
(1) With your consent, we will only share with third parties the information necessary to achieve the purpose. If a third party really needs to use personal information beyond the aforementioned authorized scope due to business needs, the third party will need to seek your consent again.
(2) For third parties with whom we share your personal information, these third parties will sign confidentiality agreements with us. At the same time, we will evaluate its data security capabilities and environment, and require third parties to handle such information with confidentiality and security measures no less than that required by this Privacy Policy.
2. Transfer of personal information in case of acquisition, merger or reorganization
As our business continues to develop, we may carry out mergers, acquisitions, and asset transfers, and your personal information may be transferred as a result. In the event of the aforementioned changes, we will continue to protect or require the successor of personal information to continue to protect your personal information in accordance with laws and regulations and the security standards not lower than that required by this Privacy Policy, otherwise we will require the successor to re-obtain your personal information. Your authorization agrees.
(2) Public disclosure of personal information
We will not disclose your information publicly unless we comply with national laws and regulations or obtain your consent. When we publicly disclose your personal information, we will adopt security protection measures that conform to industry standards. For example, we will disclose the necessary information about the relevant accounts when making a penalty announcement for illegal accounts and fraudulent behaviors.
(3) Personal information that is exempted from consent to sharing, transfer, and public disclosure in accordance with the law
Please understand that in the following cases, according to laws, regulations and national standards, we do not need your authorization and consent to share, transfer and publicly disclose your personal information:
(1) Those directly related to national security and national defense security;
(2) Those directly related to public safety, public health, and major public interests;
(3) Directly related to criminal investigation, prosecution, trial and execution of judgments;
(4) In order to protect your or other personal life, property and other major legitimate rights and interests, but it is difficult to obtain my consent;
(5) Your personal information disclosed to the public by yourself;
(6) Collecting personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels.

V. How do we share, transfer and publicly disclose personal information
(1) We attach great importance to the security of your personal information, and will strive to take reasonable security measures (including technical and management aspects) to protect your personal information and prevent the personal information you provide from being used improperly or without authorization. Accessed, publicly disclosed, used, modified, damaged, lost or disclosed.
(2) We will use reasonable and feasible means such as encryption technology and anonymization processing that are not inferior to those of the industry peers to protect your personal information, and use security protection mechanisms to prevent your personal information from being maliciously attacked.
(3) We will establish a special security department, security management system, and data security process to ensure the security of your personal information. We adopt strict data usage and access systems to ensure that only authorized personnel can access your personal information, and conduct security audits of data and technology in a timely manner.
(4) Although the above reasonable and effective measures have been taken and the standards required by relevant laws and regulations have been complied with, please understand that due to technical limitations and various malicious means that may exist, in the Internet industry, even if we do our best to strengthen security measures, and it is not always possible to guarantee that information is 100% secure, we will do our best to ensure the security of the personal information you provide to us. You know and understand that the systems and communication networks you use to access our services may have problems due to factors beyond our control. Therefore, we strongly recommend that you take active measures to protect the security of your personal information, including but not limited to using complex passwords, changing passwords regularly, and not disclosing your account password and other personal information to others.
(5) We will formulate an emergency response plan, and immediately activate the emergency plan when a user information security incident occurs, and strive to prevent the impact and consequences of such security incidents from expanding. In the event of a user information security incident (leakage, loss, etc.), we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, and you can voluntarily Recommendations for preventing and mitigating risks, remedies for you, etc. We will promptly notify you of the relevant information of the event in the form of push notifications, emails, letters, text messages, etc. When it is difficult to inform you one by one, we will publish announcements in a reasonable and effective way. At the same time, we will also report the handling of user information security incidents in accordance with the requirements of relevant regulatory authorities.
(6) We would like to remind you that the personal information protection measures provided in this Privacy Policy are only applicable to the open platform of this tool and related services. Once you leave this tool open platform and related services, browse or use other websites, services and content resources, we have no ability and obligation to protect any personal information you submit on software or websites other than this tool open platform and related services, No matter whether you log in, browse or use the above software or website or not based on the link or guidance of the open platform of this tool.

6. Personal Information Management
We attach great importance to the management of your personal information, and do our best to protect your rights to query, access, modify, delete, withdraw consent and authorization, cancel your account, and report complaints, so that you can protect your privacy. and information security.
If we stop operating, we will promptly stop the collection of your personal information, notify you of the cessation of operations in the form of one-by-one delivery or announcement, and delete or anonymize your personal information held.

7. Terms for minors
If you are a minor under the age of 18, before using this tool to open the platform and related services, you should read and agree to this Privacy Policy under the supervision and guidance of your parents or other guardians.
We protect the personal information of minors in accordance with the relevant national laws and regulations, and will only collect, use, store, share, transfer or disclose unidentified minors when permitted by law, express consent of parents or other guardians, or necessary to protect minors. Personal information of adults; if we become aware that personal information of minors has been collected without prior verifiable parental consent, we will seek to delete the information as soon as possible.
If you are the guardian of a minor, when you have questions about the personal information of the minor under your guardianship, please contact us through the contact information published in this privacy policy of the company.

8. Revisions and Notices of Privacy Policy
(1) In order to provide you with better services, this tool open platform and related services will be updated and changed from time to time, and we will revise this Privacy Policy in due course. Effective, we will not reduce your rights under this Privacy Policy currently in effect without your express consent.
(2) After this privacy policy is updated, we will issue an updated version on the open platform of this tool, and remind you of the updated content through the official website announcement or other appropriate means before the updated terms take effect, so that you can keep abreast of this privacy policy latest version.

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
电力电子变压器(PET)是一种新型的变压器,它利用电力电子技术来实现电能的高效传输和转换。PET仿真是对电力电子变压器进行模拟和分析的过程,通过计算机软件模拟出PET的工作原理和性能,并进行性能评估和优化。 PET仿真的主要目的是为了研究和改进PET的设计和控制方法。通过仿真,可以方便地观察和分析PET的电压、电流、功率等参数的变化,还可以检测PET在不同工况下的动态响应和稳态工作。因此,PET仿真对于优化PET的设计和提高其性能至关重要。 在进行PET仿真时,首先需要建立PET的数学模型。这个模型包括PET的拓扑结构、元件参数和控制策略等信息。建立好模型后,可以采用常用的电力电子仿真软件,如PSCAD、Simulink等进行仿真分析。通过输入不同的信号和工况参数,可以模拟PET在实际运行中的各种情况,从而评估其性能和稳定性。 通过PET仿真,可以得到PET的电压、电流、功率、效率等性能指标的仿真结果。这些结果可以用来指导PET的设计和调试,也可以用来进行PET与其他电力设备的协调工作。此外,还可以通过仿真分析PET的热耦合问题,提前发现并解决各种可能的故障和问题。 总之,电力电子变压器PET仿真是一种重要的工具,可以帮助我们更好地了解和优化PET的性能和工作状态。通过仿真,可以提高PET的设计效率和可靠性,为实际应用中的电力系统提供更加稳定和高效的电能传输。

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值