激情毛片无码区_少妇无码爆乳AV专区_无码专区中文字幕无野区_av资源手机在线观看

軟件移動(dòng)客戶端 隱私協(xié)議
2023-09-27 17:22:23


  Privacy policy

  Xuzhou Yongkang Electronic Technology Co., LTD. (hereinafter referred to as "We") knows the importance of personal information to you, and will do our best to protect your personal information safe and reliable, we are committed to maintaining your trust in us, abide by the following principles, to protect your personal information: The principle of consistency of power and responsibility, the principle of clear purpose, the principle of optional consent, the principle of minimum sufficient, the principle of ensuring safety, the principle of subject participation, the principle of openness and transparency, etc. At the same time, we promise that we will take appropriate security measures to protect your personal information according to the industry's mature security solutions. In view of this, we hereby formulate this User Privacy Policy (hereinafter referred to as "This Policy/Privacy Policy") and remind you that:

  This policy applies to YonkerCare products or services (the "Application")

  Before using the products or services of this application, please carefully read and thoroughly understand this policy, and use the relevant products or services after confirming that you fully understand and agree. Once you start using the products or services of the App, you fully understand and agree to this Policy. If you have any questions, comments or suggestions on the contents of this Policy, you may contact us through the various contact information provided by this App.

  This Privacy Policy section will help you understand the following:

  I. How we collect and use your personal information;

  2. How we use cookies and similar technologies;

  Iii. How we share, transfer and publicly disclose your personal information;

  Iv. How we protect your personal information;

  5. How you manage your personal information;

  Vi. How we handle minors' personal information;

  Vii. How your personal information is transferred globally;

  Viii. How to update this Privacy Policy;

  Nine, how to contact us;

  1. How do we collect and use your personal information

  Personal information refers to all kinds of information recorded electronically or otherwise that can identify the identity of a specific natural person or reflect the activities of a specific natural person individually or in combination with other information. We will collect and use your personal information for the following purposes as stated in this Policy:

  1. Help you become our users

  In order to create an account so that we can provide you with services, you need to provide the following information: your email address and other information. When you register, provide us with the email address used for registration (for receiving the verification code), and we will send the verification code to verify your identity. You can modify and add your nickname, gender, profile picture and other information as part of your "Account Information". We collect the above information for the purpose of providing you with account services, protecting your account security and preventing security risks.

  During use, if you provide the following additional information to complete your personal information, it will help us to provide you with better service and experience: your occupation, commonly used software, commonly used equipment and other information. However, if you do not provide such information, it will not affect the basic functions of using the application products or services.

  The above information provided by you will continue to authorize us to use the Service for the duration of your use. When you voluntarily apply to cancel your account, we will anonymize or delete your personal information as soon as possible in accordance with applicable laws and regulations.

  2. Provide services to you

  2.1 The information you provide to us

  The relevant personal information, such as email, that you provide to us when you register an account or use our services;

  The shared information you provide to other parties through our services and the information you store when you use our services. Before providing the aforesaid personal information of such other party to the App, you shall ensure that you have obtained the authorized consent of such party.

  2.2 Information we collect during your use of the Service

  In order to provide you with page display and search results that better meet your needs, understand the suitability of products, and identify abnormal status of accounts, we will collect and associate information about the services you use and the way you use them, including:

  2.2.1 Device Information:

  To ensure the secure running of applications and services, we collect your device model, device name, device unique identifier, login IP address, product version, and mobile network information.

  Our products are developed based on DCloud uni-app(5+App/Wap2App). During the operation of the application, we need to collect your device unique identifier (IMEI/androidID/IDFA, SIM card IMSI information) to provide statistical analysis services. And through application startup data and exception error log analysis to improve performance and user experience, to provide better services for users.

  Our product integrates a push SDK. During application running, the unique identification code (IMEI/androidID/IDFA, MAC, OAID information) of your device needs to be collected in order to generate the user ID. Besides, by obtaining the information of application list (installation list), it is convenient for the service provider to adjust the push link. Help each other to activate the closed SDK push process.

  2. 2. 2 According to the specific rights granted by you during software installation and use:

  (1) Read photos or take photos permission

  For example: When you change your profile picture information, post feedback, post comments, we will ask you for photo album or camera permissions.

  On some models, the album access permission is displayed as "read the contents of the memory card".

  If you refuse to grant permission to provide photo album or camera, you will not be able to use the corresponding functions, but it will not affect your normal use of other functions of the app.

  (2) Obtain location permission

  For example, when you use Bluetooth to add device functions, we will ask you to obtain location permission, so as to better scan your surrounding Bluetooth devices.

  If you refuse to authorize the location permission, it will affect whether the APP can retrieve the surrounding Bluetooth devices, and the devices cannot be added, so that subsequent control operations cannot be carried out.

  (3) Third-party SDK integrated with this application and corresponding permissions

  glide library (package name: com.bumptech.glide) : It is used to load images nativly. External memory needs to be read and written.

  TBS tencent browsing service (package name: com. Tencent. SMTT) : user webview shows the URL and the HTML page.

  (4) Huawei push service

  Company: Huawei Technologies Co., LTD

  Information acquisition: network location information, network type, mobile phone number, SIM card status, IMEI, MAC address, WiFi information, external storage, network type, network status

  Usage purpose: Push

  (5) the OPPO push

  Company: Guangdong Huantai Technology Co., LTD

  Information acquisition: message push permission, operating system version number, application information, device identifier (such as IMEI, SIM and IMSI, mobile country code and oppo Android device's mobile network number), MAC address, mobile operator, language used, system Settings system, device and application data

  Usage purpose: Push

  (6) Allies to share the SDK

  Personal information: device identifier (Android ID/hardware Serial number/IMEI, IMSI/Serial/IDFA IDFV/OpenUDID/SIM ICCID), MAC address, operation process

  Purpose: Statistical analysis

  Usage scenario: It can be used when users use the App to help improve user experience

  Partners subject: Beijing, China informed sharp technology co., LTD., and their Allies with xin (Beijing) technology co., LTD., zhejiang alibaba cloud computing co., LTD., Beijing associating yuan letter Internet data technology co., LTD

  Collection method: SDK collection

  (7) wechat SDK

  Personal information: device identifier (Android ID/hardware Serial number/IMEI, IMSI/Serial/IDFA IDFV/OpenUDID/SIM ICCID), MAC address, WLAN access point

  Usage Purpose: Support wechat login and sharing

  Usage scenario: the user to use when using WeChat login or share

  Partner subject: Shenzhen Tencent Computer System Co., LTD

  Collection method: SDK collection

  (8) FacebookSDK

  When using the Facebook SDK, if the automatic event recording function is not disabled, the system automatically records and collects some events in the application. For more information about what information is collected and how to disable automatic event logging, see Automatic Event Logging Application.

  Collection method: Share the SDK

  (9) Youmeng SDK

  Our products integrate Youmeng +SDK (including Taobao sdk, Youmeng game statistics sdk, etc. Taobao sdk and Youmeng game statistics sdk provide technical services for Youmeng +). Friends au + SDK need to collect your device Mac address, the only equipment identification number (IMEI/ANDROID_ID/OAID/IDFA/OPENUDID/GUID, SIM card IMSI information) statistical analysis to provide services, provide basis for cheating. Personal information collection types: equipment information (IMEI/MAC/ANDROID_ID/OAID/IDFA/OpenUDID/GUID/SIM card IMSI, etc.) and external storage state and installed APP information.

  (10) Youmeng Mobile Statistics SDK

  Use their Allies mobile statistical service users on the use of the function module behavior, to improve service quality, mobile product breakdown statistics, error, no response, and so on and so forth to improve the quality of the product. Requires external storage status, last network location information, network type, SIM card serial number, network service carrier, IMEI, MAC address, ANDROID_ID, OAID, IP address, WiFi information, OpenUDID. (their Allies statistics in order to ensure the precision of push and the accuracy of the statistics, au SDK to silence/background and the acquisition of the MAC address and the frequent external storage, this function as friend push SDK, Allies statistical + service development and use of the SDK and their Allies).

  (11) Friendleague message push SDK

  In order to timely provide you with service notifications such as website messages, private messages and function use, we use message PUSH SDK. For example, if you use Xiaomi, Meizu, Huawei, OPPO, VIVO and Apple phones, Push SDK of the above-mentioned mobile phone manufacturers we access needs to obtain the unique identification information of your mobile phone terminal. In addition, your mobile phone model, system type, system version and device screen size parameters may be collected for APP push service. If you do not wish to receive such notice or information, can be set in the terminal equipment in the closed information to and within the APP "my" - "Settings" - "privacy Settings" close the notification; (their Allies push to ensure the timeliness and accuracy of push message will not be regularly since the launch of arousal and app, this function as friend au push SDK and their Allies + service development and use. In order to ensure the accuracy of push and statistics, the sdk of Youmeng will silently/in the background and frequently obtain MAC addresses and external storage. This function includes Youmeng push sdk, Youmeng statistics sdk and Youmeng + service development and use).

  2. 2. 3 Log information

  When you use the services provided by our website or client, we will automatically collect your detailed usage of our services and save it as the relevant network log. Examples include the content of your search query, Idiv address, type of browser, carrier, language used, date and time of access, and history of the web pages you visited.

  Note that individual device information and log information cannot identify the identity of a specific natural person. If we use such non-personal information in combination with other information to identify a specific natural person, or use it in combination with personal information, such non-personal information will be regarded as personal information during the period of combined use, and we will anonymize and de-identify such personal information unless authorized by you or otherwise provided by laws and regulations.

  When you contact us, we may save your communication/call records and contents or the contact information you left, so that we can contact you or help you solve the problem, or record the solution and results of related problems.

  3. Exceptions to authorized consent

  According to relevant laws and regulations, it is not necessary to obtain your authorization and consent to collect your personal information under the following circumstances:

  3.1 Related to national security and national defense security;

  3.2 Those related to public safety, public health or major public interests;

  3.3 Those related to the investigation, prosecution, trial and enforcement of judgments of crimes;

  3.4 In order to protect the life, property and other major legal rights and interests of the subject of personal information or other individuals, but it is difficult to get your consent;

  3.5 The personal information collected is disclosed to the public by yourself;

  3. 6 from legitimate public disclosure of information in the collection of personal information, such as legal news reports, the government information publicity channels;

  3.7 Necessary for signing the contract according to your requirements;

  3.8 Necessary for maintaining the safe and stable operation of the provided services, such as discovering or service faults;

  3.9 Necessary for legitimate news reporting;

  3.10 When an academic research institution conducts statistics or academic research in the public interest and provides the results of academic research or description to the public, it de-identifies the personal information contained in the results;

  3.11 Other circumstances stipulated by laws and regulations.

  If we stop operating the application service, we will continue to collect your personal information in time to stop the activity, will cease to operate the notice in the form of each delivery or announcement to inform you that to delete or personal information held by anonymous.

  Second, how do we use cookies and similar technologies

  1.Cookie

  To ensure the normal operation of our website and make your visit easier, we store small data files called cookies on your computer or mobile device. Cookies typically contain an identifier, a site name, and some numbers and characters. With cookies, websites can store your preferences and other data.

  2. Website beacons and pixel tags

  In addition to cookies, we use other similar technologies such as website beacons and pixel tags on our website. For example, the email/text message we send to you may contain an address link to the content of our website. If you click on the link, we will track the click to help us understand your product or service preferences so that we can proactively improve the customer service experience. A website beacon is usually a transparent image embedded in a website or email. With the help of the pixel tags in the E-mail, we can know if the E-mail was opened. If you do not want your activity to be tracked in this way, you can unsubscribe from our mailing list at any time.

  Iii. How do we share, transfer and publicly disclose your personal information

  Step 1 Share

  We will not share your personal information with companies, organizations and individuals other than the service providers of this application, except in the following cases:

  1.1 Sharing with Express Consent: With your express consent, we will share your personal information with other parties.

  1.2 Sharing under legal circumstances: We may share your personal information in accordance with laws and regulations, litigation dispute resolution requirements, or requirements of administrative and judicial authorities in accordance with the law.

  1.3 share with authorized partner: only to achieve the purpose of this privacy policy statement, some of our services will be provided by us and authorized partners. We may share some of your personal information with our partners to provide better customer service and user experience. Such as arranging partners to provide services. We will only share your personal information for legal, legitimate, necessary, specific and explicit purposes, and only share personal information necessary for the provision of services. Our partners have no right to use shared personal information for other purposes unrelated to the products or services.

  At present, our authorized partners include the following types:

  1.3.1 Authorized partners for advertising and analysis services. Unless we get your permission, we will not share your personally identifiable information (referring to the information that can identify you, such as your name or email address, mobile phone number, through which you can be contacted or identified) with our partners who provide advertising and analysis services. We provide these partners with information about the reach and effectiveness of their advertising and do not provide your personally identifiable information, or we aggregate this information so that it does not identify you personally. For example, we may tell advertisers how effective their ads are, or how many people saw their ads or installed apps after seeing them, or provide those partners with non-personally identifiable statistics (e.g. "Male, 25-29 years old, Located in Beijing ") to help them understand their audience or customers.

  1.3.2 Suppliers, service providers and other partners. We send information to vendors, service providers and other partners who support our business by providing technology infrastructure services, analyzing how our services are used, measuring the effectiveness of advertising and services, providing customer service, facilitating payments or conducting academic research and surveys.

  Step 2 Transfer

  We will not transfer your personal information to any company, organization or individual except in the following cases:

  2.1 Transfer with Express consent: After obtaining your express consent, we will transfer your personal information to other parties;

  2.2 In the case of merger, acquisition or bankruptcy liquidation, or other circumstances involving merger, acquisition or bankruptcy liquidation, if personal information transfer is involved, we will require the new company or organization holding your personal information to continue to be bound by this policy, otherwise we will require the company, organization or individual to seek authorization from you again.

  3. Public disclosure

  We will publicly disclose your personal information under the following circumstances:

  3.1 We may publicly disclose your personal information with your express consent or at your choice;

  3.2 If we determine that you have violated laws and regulations or seriously violated the agreement rules of the App, or to protect the personal and property safety of the App and its affiliated users or the public, we may disclose your personal information in accordance with laws and regulations or the agreement rules of the App with your consent, Including relevant violations and the actions the App has taken against you.

  4. Exceptions to prior authorization for sharing, transferring and publicly disclosing personal information

  Under the following circumstances, the sharing, transfer and public disclosure of your personal information do not require prior authorization from you:

  4.1 Those related to national security and national defense security;

  4.2 Those related to public safety, public health and major public interests;

  4.3 Those related to criminal investigation, prosecution, trial and execution of judgment;

  4.4 To protect your or other individuals' life, property and other major legal rights and interests, but it is difficult to get the consent of the person;

  4.5 Personal information disclosed by you to the public;

  4.6 Collecting personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels.

  According to the law, the sharing and transfer of de-identified personal information and ensuring that the data receiver cannot recover and re-identify the subject of personal information does not constitute the sharing, transfer and public disclosure of personal information, and the preservation and processing of such data will not require further notice to you and your consent.

  Iv. How do we protect your personal information

  1. We have adopted reasonable and feasible security protection measures in line with general solutions in the industry to protect the security of your personal information and prevent unauthorized access, public disclosure, use, modification, damage or loss of personal information. For example, when exchanging data (such as credit card information) between your browser and the server, it is protected by SSL (Secure Socket Layer) protocol encryption (that is, HTTPS protocol); We will use encryption to make personal information more secure; We will use trusted protection mechanisms to prevent malicious attacks on personal information; We will deploy access control mechanisms to ensure that only authorized personnel have access to personal information; And we will organize security and privacy training courses to enhance employees' awareness of the importance of protecting personal information.

  2. We have an industry-advanced data security management system centered on data life cycle, which enhances the security of the whole system from the aspects of organization construction, system design, personnel management, product technology and so on.

  3. We will take reasonable and practicable measures to avoid collecting irrelevant personal information. We will only retain your personal information for as long as necessary to achieve the purposes stated in the Cost Policy, unless it is necessary to extend the retention period or permitted by law.

  4. The Internet is not an absolutely safe environment, and we strongly recommend that you do not send personal information by means of communication other than those recommended by this App. You can connect and share with each other through our service. When you create communication, transaction or sharing through our services, you can choose the object of communication, transaction or sharing as the third party that can see your transaction content, contact information, exchange information or share information.

  If you find that your personal information, especially your account or password, has been leaked, please contact the App customer service immediately, so that we can take corresponding measures according to your application.

  Please note that the information you voluntarily share or even publicly share when using our services may involve your or others' personal information or even personal sensitive information, such as the pictures containing personal information you choose to upload in the post feed or in the group chat, circle and other public places. Please consider more carefully whether to share or even publicly share relevant information when using our services.

  Please use a complex password to help us keep your account secure. We will do our best to ensure the security of any information you send us. At the same time, we will also report the handling of personal information security incidents in accordance with the requirements of regulatory authorities.

  5. How do you manage your personal information

  You can access and manage your personal information in the following ways:

  1. Access your personal information

  You have the right to access your personal information, except for the exceptions provided by laws and regulations. You can access your personal information by yourself in the following ways:

  Profile - If you want to access or edit your gender, occupation, company, and other information in your profile, you can do so by logging in to your account through "My".

  2. Correct or supplement your personal information

  When you find that there is an error in your personal information processed by us, you have the right to request us to make a correction or supplement. You may apply for corrections or supplements in the manner set out in "(I) Access to Your Personal Information" in this section.

  3. Delete your personal information

  You may delete some of your personal information in the way set forth in "(I) Accessing Your Personal Information" of this article.

  Under the following circumstances, you may request us to delete your personal information:

  3.1 If we process personal information in violation of laws and regulations;

  3.2 If we collect or use your personal information without your express consent;

  3.3 If our behavior of processing personal information seriously violates the agreement with you;

  3.4 If you no longer use our products or services;

  3.5 If we permanently cease to provide you with products or services.

  If we decide to respond to your deletion request, we will also notify the subject who has obtained your personal information from us at the same time, as far as possible, and require them to delete it in a timely manner, unless otherwise required by laws and regulations, or unless such subject is independently authorized by you.

  When you delete information from our services, we may not immediately delete the corresponding information from the backup system, but we will delete the information when the backup is updated.

  4. Change the scope of your authorization

  Every business can require some basic personal information to complete (see "Article 1" of this Privacy policy). In addition, for the collection and use of additional personal information, you can contact the App customer service to apply for granting or withdrawing your authorization.

  After you withdraw your consent, we will no longer process the corresponding personal information. However, your decision to withdraw your consent will not affect the processing of personal information previously conducted based on your authorization.

  5. Constrain automatic decision-making of information system

  In some business functions, we may make decisions based solely on non-human automatic decision mechanisms, including information systems, algorithms, etc. If these decisions significantly affect your legitimate rights and interests, you have the right to ask us to make an explanation, and we will provide the method of appeal on the premise of not infringing on the application's trade secrets, other users' rights and interests, and social and public interests.

  6. Respond to your request

  For security purposes, you may need to provide a written request or otherwise prove your identity. We may ask you to verify your identity before processing your request.

  We will give a reply within 30 days. If you are not satisfied, you can also make a complaint through the customer service of this application.

  For your reasonable request, we do not charge fees in principle, but for repeated requests, beyond the reasonable limit, we will charge a certain cost according to the situation. We may reject requests that are unnecessarily repetitive, require too much technology (for example, the development of new systems or fundamental changes to existing practices), pose a risk to the legitimate interests of others, or are highly impractical.

  Under the following circumstances, according to the requirements of laws and regulations, we will not be able to respond to your request:

  6.1 Those related to national security and national defense security;

  6.2 Those related to public safety, public health and major public interests;

  6.3 Those related to criminal investigation, prosecution, trial and enforcement of judgments;

  6.4 There is sufficient evidence that the subject of personal information has subjective malice or abuse of rights;

  6.5 Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals and organizations;

  6.6 Trade secrets involved.

  If you cannot access such personal information through the above path, you can contact us at any time through the customer service of the app. We will respond to your request for access within 30 days.

  For other personal information generated during your use of our products or services, we will provide it to you in accordance with the relevant arrangements in "(7) Responding to your above Requests" of this Article.

  Vi. How do we handle minors' personal information

  Minors are not allowed to create their own user accounts without parental or guardian consent. If you are a minor, we suggest that you ask your parents or guardians to read this Privacy Policy carefully and use our services or provide us with information with the consent of your parents or guardians.

  We will only use, share, transfer or disclose personal information of minors that is collected with the consent of parents or guardians to use our products or services, as permitted by law and regulations, as expressly agreed by parents or guardians, or as necessary to protect minors.

  Vii. How can your personal information be transferred globally

  Personal information collected and generated by our operations within the territory of the People's Republic of China shall be stored within the territory of the People's Republic of China, except under the following circumstances:

  7.1 Laws and regulations have clear provisions;

  7.2 Obtain your express authorization;

  7.3 Your personal initiative such as cross-border live broadcasting/Posting updates via the Internet.

  In view of the above circumstances, we will ensure adequate protection of your personal information in accordance with this Privacy Policy.

  Viii. How to update this Privacy Policy

  Our privacy policy is subject to change.

  We do not restrict your rights under this Privacy Policy without your express consent. For major changes, we will provide significant notice (including we will notify you through the app publicity and the app official account notification and even provide you with SMS/email tips).

  Material changes referred to in this Policy include, but are not limited to:

  8.1 Major changes have taken place in our service model. Such as the purpose of personal information processing, the type of personal information processing, personal information use, etc.;

  8.2 We have experienced significant changes in control, etc. Such as merger and reorganization caused by the owner change, etc.;

  8.3 The main object of personal information sharing, transfer or public disclosure has changed;

  8.4 Your rights to participate in personal information processing and the way in which you exercise them have changed significantly;

  8.5 When the department responsible for handling personal information security, contact information and complaint channels change;

  8.6 When the personal information security impact assessment report indicates that there is high risk. We will also keep older versions of this Privacy Policy on file for your reference.

  Nine, How to contact us

  9.1 If you have any questions, comments or suggestions about this policy, you can contact us through the mini program customer service and "My" - "Contact customer service" in the APP;

  9.2 If you find that personal information may be leaked, you can report it through the feedback of the application;

  Company name: Xuzhou Yongkang Electronic Technology Co., LTD

  Office address: 12th Floor, Zhimin Building, Mingyang Plaza, 20 Zhenxing Avenue, Jiawang District, Xuzhou City, Jiangsu Province

  Contact number: 4009602005

  Email: jq@yonker.cn

  Effective date: March 1. 2023

  Last updated: February 15. 2023


相關(guān)推薦
友情鏈接: 青之也 血氧儀 移動(dòng)端APP下載1 移動(dòng)端APP下載2 PC端應(yīng)用程序下載