Account Manager privacy agreement

【Account Manager】

(hereinafter referred to as "we") )We fully understand the importance of personal information to you and will do our best to protect your personal information safe and reliable. We are committed to maintaining your trust in US and abide by the following principles to protect your personal information: the principle of consistent rights and responsibilities, the principle of clear purpose, the principle of choice and consent, the principle of minimum adequacy, the principle of ensuring security, the principle of subject participation, the principle of openness and transparency, etc. At the same time, we promise that we will take corresponding security protection measures to protect your personal information according to the mature security standards in the industry.
Please read and understand this privacy policy carefully before using our products (or services).
1、 How do we collect and use your personal information
Personal information refers to all kinds of information recorded electronically or in other ways that can identify the identity of a specific natural person or reflect the activities of a specific natural person alone or in combination with other information.
We will collect and use your personal information only for the following purposes described in this policy:
(1) Carry out internal data analysis and research, third-party SDK statistical services, and improve our products or services
We collect data based on your interaction with us and your choices, including your privacy settings and the products and features you use. The data we collect may include SDK / API / JS code version, browser, Internet service provider, IP address, platform, timestamp, application identifier, application version, application distribution channel, independent device identifier, Android advertiser identifier Network card (MAC) address, international mobile device identification code (IMEI), device model, terminal manufacturer, terminal device operating system version, session start / stop time, language location, time zone and network status (WiFi, etc.), hard disk, CPU and battery usage, etc.
2、 How do we use cookies and similar technologies
(1) Cookies
To ensure the normal operation of the website, we will store a small data file named cookie on your computer or mobile device. Cookies usually contain identifiers, site names, and numbers and characters. With cookies, websites can store data such as your preferences or goods in the shopping basket.
We will not use cookies for any purpose other than those stated in this policy. You can manage or delete cookies according to your preferences. You can clear all cookies saved on your computer. Most web browsers have the function of blocking cookies. However, if you do, you will need to change the user settings each time you visit our website.
(2) Website beacons and pixel Tags
In addition to cookies, we will also use other similar technologies such as website beacons and pixel labels on the website. For example, the email we send you may contain a click URL that links to the content of our website. If you click this link, we will track this click to help us understand your product or service preferences and improve customer service. A website beacon is usually a transparent image embedded in a website or e-mail. With the help of pixel labels in e-mail, we can know whether the e-mail is opened or not. If you don't want your activities to be tracked in this way, you can unsubscribe from our mailing list at any time.
(3) Do not track
Many web browsers are equipped with do not track function, which can publish do not track requests to websites. At present, the major Internet standards organizations have not established relevant policies to specify how websites should respond to such requests. However, if your browser enables do not track, all our websites will respect your choice.
3、 How do we share, transfer and publicly disclose your personal information
(1) Share
We will not share your personal information with any other company, organization or individual, except for the following circumstances:
1. Share with explicit consent: after obtaining your explicit consent, we will share your personal information with other parties.
2. We may share your personal information in accordance with laws and regulations or the mandatory requirements of the competent government departments.
3. Share with our affiliates: your personal information may be shared with our affiliates. We will only share necessary personal information and are bound by the purposes stated in this privacy policy. If the affiliated company wants to change the purpose of processing personal information, it will ask for your authorization and consent again.
4. Share with authorized partners: some of our services will be provided by authorized partners only for the purposes stated in this privacy policy. We may share some of your personal information with our partners to provide better customer service and user experience. For example, companies we hire to provide third-party data statistics and analysis services may need to collect and access personal data for data statistics and analysis. In this case, these companies must comply with our data privacy and security requirements. We will only share your personal information for legal, legitimate, necessary, specific and clear purposes, and will only share the personal information necessary to provide services.
For companies, organizations and individuals with whom we share personal information, we will sign a strict confidentiality agreement and require them to handle personal information in accordance with our instructions, this Privacy Policy and any other relevant confidentiality and security measures.
(2) Transfer
We will not transfer your personal information to any company, organization or individual, except for the following circumstances:
1. Transfer with explicit consent: after obtaining your explicit consent, we will transfer your personal information to other parties;
2. In case of merger, acquisition or bankruptcy liquidation, if personal information transfer is involved, we will require the new company or organization holding your personal information to continue to be bound by this privacy policy, otherwise we will require the company or organization to ask you for authorization and consent again.
(3) Public disclosure
We will only publicly disclose your personal information under the following circumstances:
1. With your express consent;
2. Legal based disclosure: we may publicly disclose your personal information when required by law, legal proceedings, litigation or mandatory requirements of government authorities.
4、 How do we protect your personal information
(1) We have used industry standard security measures to protect your personal information from unauthorized access, public disclosure, use, modification, damage or loss. We will take all reasonable and feasible measures to protect your personal information. For example, exchange data between your browser and the service (such as credit card information) is protected by SSL encryption; we also provide HTTPS secure browsing mode for our website; we will use encryption technology to ensure the confidentiality of data; we will use trusted protection mechanism to prevent data from malicious attacks; we will deploy access control mechanism to ensure that only authorized personnel can access personal information; and we will hold security And privacy protection training courses to enhance employees' awareness of the importance of protecting personal information.
(2) We will take all reasonable and feasible measures to ensure that irrelevant personal information is not collected. We will only retain your personal information for the period required to achieve the purpose stated in the cost policy, unless the retention period needs to be extended or permitted by law.
(3) The Internet is not an absolutely secure environment, and e-mail, instant messaging and communication with other users are not encrypted. We strongly recommend that you do not send personal information in this way. Please use a complex password to help us ensure the security of your account.
(4) The Internet environment is not 100% secure. We will try our best to ensure or guarantee the security of any information you send us. If our physical, technical or management protection facilities are damaged, resulting in unauthorized access, public disclosure, tampering or destruction of information, and damage to your legitimate rights and interests, we will bear corresponding legal responsibilities.
(5) After an unfortunate personal information security incident occurs, we will timely inform you of the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, the suggestions you can independently prevent and reduce the risk, and the remedial measures for you in accordance with the requirements of laws and regulations. We will timely send the relevant information of the incident to you by email, letter, telephone When it is difficult to inform the personal information subject one by one by means of push notification, we will take a reasonable and effective way to publish the announcement.
At the same time, we will actively report the disposal of personal information security incidents in accordance with the requirements of regulatory authorities.
5、 How do we handle children's personal information
Our products, websites and services are mainly for adults. Children cannot create their own user accounts without the consent of their parents or guardians.
For the collection of children's personal information with the consent of parents, we will only use or publicly disclose this information when permitted by law, expressly agreed by parents or guardians or necessary to protect children.
Although local laws and customs define children differently, we regard anyone under the age of 14 as a child.
If we find that we have collected the personal information of children without the prior consent of verifiable parents, we will try to delete the relevant data as soon as possible.
6、 How does your personal information move around the world
In principle, the personal information we collect and generate in the people's Republic of China will be stored in the people's Republic of China.
As we provide products or services through resources and servers all over the world, this means that after obtaining your authorization and consent, your personal information may be transferred to or accessed from overseas jurisdictions in the countries / regions where you use the products or services.
Such jurisdictions may have different data protection laws or even no relevant laws. In such cases, we will ensure that your personal information is adequately and equally protected in the people's Republic of China. For example, we will request your consent to the cross-border transfer of personal information, or implement security measures such as data De identification before cross-border data transfer.
7、 How is this Privacy Policy updated
We may adjust or change this privacy policy from time to time. Any update of this privacy policy will be published on our website by marking the update time. Unless otherwise mandatory by laws, regulations or regulatory provisions, the adjusted or changed content will take effect 7 days after notification or publication. If you continue to use any of our services or visit our relevant websites after the adjustment or change of the privacy policy, we believe that it means that you have fully read, understood and accepted the revised privacy policy and are bound by it.

Account Manager privacy agreement的更多相关文章

  1. 基于Andoird 4.2.2的Account Manager源代码分析学习:AccountManagerService系统服务的添加

    从启动说起 Android系统加载时,首先启动init进程,该进程会启动Zygote进程.Zygote进程执行/system/bin/app_process程序.app_process程序在执行中,通 ...

  2. 基于Andoird 4.2.2的Account Manager源代码分析学习:创建选定类型的系统帐号

    AccountManager.addAccount() public AccountManagerFuture<Bundle> addAccount(final String accoun ...

  3. privacy policy 隐私政策

    privacy policy 隐私政策 privacy agreement css layout & ssr page flex & center & fonts demo h ...

  4. System Error Codes

    很明显,以下的文字来自微软MSDN 链接http://msdn.microsoft.com/en-us/library/windows/desktop/ms681382(v=vs.85).aspx M ...

  5. winerror.h中的内容(可以查看last error对应)

    /************************************************************************* ** winerror.h -- error co ...

  6. Windows Error Codes

    http://www.briandunning.com/error-codes/?source=Windows Windows Error Codes List All Error Codes | S ...

  7. P6 Professional Installation and Configuration Guide (Microsoft SQL Server Database) 16 R1

    P6 Professional Installation and Configuration Guide (Microsoft SQL Server Database) 16 R1       May ...

  8. 简单bat语法

    一.简单批处理内部命令简介 1.Echo 命令 打开回显或关闭请求回显功能,或显示消息.如果没有任何参数,echo 命令将显示当前回显设置. 语法 echo [{on off}] [message] ...

  9. windows快捷命令修炼

    Description Windows Key combination Open/Close the Start Menu Windows key Open the Action center. Wi ...

  10. IT业常见职位英语缩写全攻略及详解

    现在中国人流行起英文名字,连职位也跟着作秀,什么CEO.COO.CFO.CTO.CIO啦,那CEO.COO.CFO.CTO.CIO到底是什么意思呢?总被这些概念搞晕,这可不是搞IT的应该犯的错误哦,好 ...

随机推荐

  1. MQ 消息队列 比较

    为什么需要消息队列 削峰 业务系统在超高并发场景中,由于后端服务来不及同步处理过多.过快的请求,可能导致请求堵塞,严重时可能由于高负荷拖垮Web服务器. 为了能支持最高峰流量,我们通常采取短平快的方式 ...

  2. j-link "the connected j-link is defective"问题的解决

    出现这个原因是 J-link和J-link的驱动不匹配,比如J-link的固件太老,J-link驱动太新.因此要解决的话,要不就是换不同版本的J-link驱动,要不就是换J-Link或升级J-link ...

  3. 好消息!微信小程序开发环境自带vConsole

    背景介绍 事情是这样子的,我们在开发小程序的时候,需要在真机上把相关的日志打出来以便进行问题定位和回溯,于是在编程界就有个今天这个新闻.------ 好消息!广东某男子发现微信小程序开发环境自带vCo ...

  4. video多视频轮播Swiper 播放视频不轮播不循环

    在实际工作中经常会遇到swiper轮播多个视频,播放视频不轮播不循环 loop:true下问题: (1)slides前后会复制若干个slide,成一个环路,不会复制绑定在dom上@click事件, 解 ...

  5. Uncaught ReferenceError: Cannot access 'constantRouterMap' before initialization

    这个问题可以在 main.js 中,调整 import  store from '@/store 和  import router from @/router 的先后顺序进行解决 router 在 s ...

  6. 轻量级CI/CD发布部署环境搭建及使用_01_基本介绍

    轻量级CI/CD发布部署环境搭建及使用_01_基本介绍 授人以鱼不如授人以渔,如果说的别人都没明白,说明自己实际也不是太明白 最终实现效果如图 1,选择相应环境下的项目,执行构建 注: web:vue ...

  7. Integer使用==比较的问题

    Integer使用==比较的问题 new一个对象 public Integer(int value) { this.value = value; } 自动装箱 public static Intege ...

  8. C# WCF实现聊天室功能

    1.WCF是什么 Windows Communication Foundation(WCF)是由微软开发的一系列支持数据通信的应用程序框架 看这篇文章之前,可以先看我的另一篇文章,初步了解一下WCF: ...

  9. 手机在线编程软件Anycodes

    下载地址:http://ys-f.ys168.com/608949803/V6gUhjk3V382275HM63/%E6%89%8B%E6%9C%BA%E7%BC%96%E7%A8%8B%E8%BD% ...

  10. 基于TDSQL-C对OOM问题进行优化

    OOM是实例使用内存超过实例规格内存上限导致进程被kill,实例存在秒级的不可用.MySQL的内存管理比较复杂,内存监控需要开启performance schema查询(默认关闭),会带来额外的内存消 ...