Authing 隱私政策 / Authing Privacy Policy

Authing 隱私政策

本版更新日期:2021 年 12 月 10 日

歡迎使用北京蒸汽記憶科技有限公司(下稱" Authing ")提供的產品和服務! Authing (或簡稱"我們")深知個人信息對您的重要性,我們一向莊嚴承諾保護使用我們的產品和服務(以下統稱" Authing 服務")之用戶(以下統稱"用戶"或"您")的個人信息及隱私安全。您在使用 Authing 服務時,我們可能會收集和使用您的相關個人信息(或簡稱"個人信息")。 《 Authing 隱私政策》(以下簡稱"本政策")適用于我們提供的 Authing 服務, 未滿十八周歲的用戶,請在法定監護人的陪同下閱讀本政策,并特別注意未成年人使用條款。特別地,如果您是未滿 14 周歲的兒童,還應請您的監護人仔細閱讀本政策,經監護人同意后,您方可使用 Authing 服務。 我們希望通過本政策向您說明我們在收集和使用您相關個人信息時對應的處理規則,以及我們為您提供的訪問、更正、刪除和保護這些個人信息的方式,以便更好的保障您的權益。

適用范圍:(a)在您使用 Authing 服務,或訪問 Authing 服務相關的網頁時, Authing 自動接收并記錄的您的瀏覽器和計算機上的信息,包括但不限于您的 IP 地址、瀏覽器的類型、使用的語言、訪問日期和時間、軟硬件特征信息及您需求的網頁記錄等數據;(b) Authing 通過合法途徑從商業伙伴處取得的用戶個人數據。

您了解并同意,以下信息不適用本隱私權政策:(a)在使用 Authing 服務提供的搜索服務時輸入的關鍵字信息;(b) Authing 收集到的您在 Authing 服務發布的有關信息數據,包括但不限于參與活動、成交信息及評價詳情;(c)違反法律規定或違反 Authing 服務規則行為及 Authing 已對您采取的措施。

本政策將幫助您了解以下內容:

一、我們如何收集和使用您的個人信息

二、我們如何使用 Cookies 或同類技術

三、我們可能共享、轉讓和披露的個人信息

四、我們如何保留、儲存和保護您的個人信息安全

五、如何管理您的個人信息

六、第三方服務

七、未成年人保護

八、通知和修訂

九、法律適用與管轄

十、如何聯系我們

【特別提示】請您在使用 Authing 服務前,仔細閱讀(未成年人請在監護人陪同下閱讀)并了解本政策(特別是加粗或下劃線標注的內容),以做出適當選擇。一旦您使用或在我們更新本政策后繼續使用我們的產品或服務,即意味著您同意本政策并同意我們按照本政策處理您的相關個人信息。

本政策適用于 Authing 服務,如與 Authing 與您之間的《專業服務合同》同類條款之約定存在不一致的,以本政策為準。如我們提供的某一單項服務不適用本政策的,該服務中會以適當方式明示排除適用本政策。

一、我們如何收集和使用您的個人信息

我們收集您的個人信息主要是為了您和其他用戶能夠更容易和更滿意地使用 Authing 服務。而這些個人信息有助于我們實現這一目標。

(一)我們將通過以下途徑收集和獲得您的個人信息:

1、您提供的個人信息。

(1)您在注冊 Authing 服務的帳號或使用 Authing 服務時,向我們提供的個人信息,包括您的手機號碼,并且您可以自愿選擇填寫您的昵稱、頭像、性別、年齡、學歷、學校、身份證號碼、收件人姓名、收件人聯系方式、收貨地址基本信息。如果您僅需使用瀏覽、了解 Authing ,您不需要注冊賬戶及提供上述信息。如果您不提供這些信息,并不會影響您使用 Authing 的基本功能;

(2)您通過 Authing 服務向其他方提供的共享個人信息,以及您使用 Authing 服務時所儲存的個人信息。

請注意,如您在 Authing 服務中其他用戶可見的公開區域內上傳或發布的個人信息中、您對其他人上傳或發布的信息作出的回應中公開您的個人信息,該等個人信息可能會被他人收集并加以使用,只要您不刪除您所公開或共享的個人信息,有關個人信息可能一直留存在公眾領域;即使您刪除共享個人信息,有關個人信息仍可能由其他用戶或不受我們控制的第三方獨立地緩存、復制或儲存,或由其他用戶或該等第三方在公眾領域保存。如您將個人信息通過上述渠道公開或共享,由此造成您的個人信息泄露,我們不承擔責任。因此,我們提醒并請您慎重考慮是否通過上述渠道公開或共享您的個人信息。當您發現他人不正當地收集或使用您的個人信息時,您可以通過本政策第九條【如何聯系我們】約定的聯系方式聯絡我們。

2、其他方分享的您的個人信息。亦即其他方使用 Authing 服務時所提供有關您的共享個人信息。

3、我們獲取的您的個人信息。您在使用 Authing 服務時,我們收集、匯總、記錄的個人信息。

(二)我們會出于以下目的,收集和使用您以下類型的個人信息:

1、幫助您完成注冊、登錄及注銷

為便于我們為您提供完整的 Authing 服務,您需要提供基本注冊或登錄個人信息,包括使用手機號碼注冊登錄或提供第三方賬號登錄 Authing 。如果您僅需使用瀏覽、查詢、搜索等基本服務,您不需要注冊成為 Authing 用戶及提供上述個人信息。

2、客服與售后

依照相關法律法規規定及監管要求,或當您與我們聯系時,我們的客服或售后可能會需要您提供真實身份信息(姓名、身份證)和賬號信息以核驗您的身份,以便幫助您問題,或記錄相關問題的處理方案及結果。

請注意,您的身份信息屬于個人敏感信息,請您謹慎提供,如果拒絕提供您將可能無法獲得相關服務,但不影響其他功能與服務的正常使用。

3、維護基礎功能的正常運行

在您使用我們服務過程中,為識別賬號異常狀態、了解產品適配性,向您提供瀏覽、搜索、注冊/登錄、查看和編輯個人資料、購買服務/產品、支付的服務,維護基礎功能的正常運行,我們可能會自動收集、儲存關于您使用的服務以及使用方式的信息并將這些信息進行關聯,這些信息包括:

(1)日志信息:當您使用我們的服務時,我們可能會自動收集您對我們服務的詳細使用情況,作為有關網絡日志保存。日志信息包括您的登錄賬號、搜索查詢內容、IP 地址、瀏覽器的類型、電信運營商、網絡環境、使用的語言、訪問日期和時間及您訪問的網頁瀏覽記錄、Push 打開記錄、崩潰記錄、停留時長、刷新記錄、發布記錄、關注、訂閱、收藏及分享。

(2)設備信息:我們可能會根據您在軟件安裝及使用中授予的具體權限,接收并記錄您所使用的設備相關信息(包括設備標識符( IMEI / MAC / OPEN UDID )、Serial、SIM 卡 IMSI 識別碼、設備機型、操作系統及版本、客戶端版本、設備分辨率、包名、設備設置、進程及軟件列表、Android ID、IDFA、UUID、軟硬件特征信息)、設備所在位置相關信息(包括 IP 地址、GPS 位置以及能夠提供相關個人信息的 WLAN 接入點、藍牙和基站傳感器信息)。

同時為了收集上述基本的個人設備信息,我們將會申請訪問您的設備信息的權限,我們收集這些信息是為了向您提供我們基本服務和基礎功能,如您拒絕提供上述權限將可能導致您無法使用我們的產品與服務。

請注意,單獨的設備信息、日志信息是無法識別特定自然人身份的個人信息。如果我們將這類非個人信息與其他個人信息結合用于識別特定自然人身份,或者將其與個人信息結合使用,則在結合使用期間,這類非個人信息將被視為個人信息,除取得您授權或法律法規另有規定外,我們會將該類個人信息做匿名化、去標識化處理。這些信息在結合使用期間,將作為您的個人信息按照本隱私政策處理與保護。

4、向您提供商品或服務

(1)個人信息的分享與發布:您在使用 Authing 服務時、上傳和/或發布個人信息以及進行相關行為時,我們將收集您上傳、發布或形成的個人信息,并有權展示您的昵稱、頭像和發布內容。

(2)商品或服務交付:當您在我們的商品或服務中訂購具體商品或服務時,我們會通過系統為您生成購買該商品或服務的訂單。為便于向您交付您在 Authing 購買的商品或服務,您可能需提供收貨人個人身份信息、姓名、購買者主體及相關信息、訂購人、聯系電話、支付狀態信息。如果您拒絕提供此類個人信息,我們將無法完成相關交付服務。如您通過 Authing 服務為其他人訂購商品或服務,您需要提供該實際訂購人的前述個人信息。向我們提供該實際訂購人的前述個人信息之前,您需確保您已經取得其授權同意。

在您使用 Authing 服務時, Authing 將會收集、儲存您上傳的圖片、語音信息,我們的相關識別程序會對這些數據進行處理分析。

(3)為完成訂單支付、交付商品或服務、確認交易狀態及為您提供售后與爭議解決服務,我們會通過您基于交易所選擇的交易對象、支付機構、物流公司等收集與交易進度相關的您的賬號、訂單、交易、支付、物流信息,或將您的交易信息共享給上述服務提供者。

(4)訂單管理:為展示您的賬戶的訂單信息及保障您的售后權益, Authing 會收集您在使用 Authing 過程中產生的訂單信息、交易和消費記錄用于向您展示及便于您對訂單進行管理。

(5)客服與售后服務:當您聯系我們的客服或使用其他用戶響應功能時(包括提出售中售后申請、個人信息保護投訴或建議、其他客戶投訴和需求),我們可能需要您提供必要的個人信息以匹配并核驗您的用戶身份,以便保障您的賬號與系統安全。我們可能還會保存您的聯系方式(您與我們聯系時使用的或您向我們主動提供的其他聯系方式)、您與我們的通信/通話記錄和內容、與您需求相關聯的其他必要信息,以便與您聯系或幫助您解決問題,或記錄相關問題的處理方案及結果。

5、我們通過間接方式收集到的您的個人信息:

我們可能從管理關聯方、第三方合作伙伴獲取您授權共享的相關個人信息。我們可能從第三方獲取您授權共享的賬戶信息(頭像、昵稱、登錄時間)并在您同意本政策后將您的第三方賬戶與您的 Authing 服務賬戶綁定,使您可以通過第三方賬戶直接登錄并使用我們的產品與/或服務。我們將在符合相關法律法規規定,并依據與關聯方或第三方合作伙伴的約定、確信其提供的個人信息來源合法的前提下,收集并使用您的這些個人信息。

6、向您發送通知

我們可能在必需時(例如當我們由于系統維護而暫停某一單項服務、變更、終止提供某一單項服務時)向您發出與服務有關的通知。

如您不希望繼續接收我們推送的消息,您可要求我們停止推送,例如:根據短信退訂指引要求我們停止發送推廣短信,或在移動端設備中進行設置,不再接收我們推送的消息;但我們依法律規定或服務協議約定發送消息的情形除外。

7、為您提供安全保障

為提高您使用我們及合作伙伴提供服務的安全性,保護您或其他用戶或公眾的人身財產安全免遭侵害,更好地預防釣魚網站、欺詐、網絡漏洞、計算機病毒、網絡攻擊、網絡侵入等安全風險,更準確地識別違反法律法規或 Authing 服務相關協議規則的情況,我們可能會收集、使用或整合您的賬戶信息、交易信息、設備信息、日志信息以及我們關聯公司、合作伙伴取得您授權或依據法律共享的個人信息,來綜合判斷您賬戶及交易風險、進行身份驗證、檢測及防范安全事件,并依法采取必要的記錄、審計、分析、處置措施。

8、其他

您了解并同意,在收集您的個人信息后,我們可能通過技術手段對數據進行去標識化處理,去標識化處理的信息將無法識別您的身份,在此情況下我們有權使用已經去標識化的信息,對用戶數據庫進行分析并予以商業化的利用,而無需另行獲得您的同意。

請您注意,如果我們要將您的個人信息用于本政策中未載明的其他用途或額外收集未提及的其他個人信息,我們會另行事先請您同意(確認同意的方式:勾選、彈窗、站內信、郵件、短信方式)。一旦您同意,該等額外用途將視為本政策的一部分,該等額外個人信息也將適用本政策。

如果我們要將您的個人信息用于本政策中未載明的其他用途或額外收集未提及的其他個人信息,我們會依法通過頁面提示、交互流程、網站公告或其他方式另行征得您的同意。在此過程中,您可通過本政策第九條【如何聯系我們】約定的聯系方式聯絡我們。

9、征得授權同意的例外

根據相關法律法規規定,以下情形中收集您的個人信息無需征得您的授權同意:

(1)與個人信息控制者履行法律法規規定的義務相關的;

(2)與國家安全、國防安全直接相關的;

(3)與公共安全、公共衛生、重大公共利益直接相關的;

(4)與刑事偵查、起訴、審判和判決執行等直接相關的;

(5)出于維護個人信息主體或其他個人的生命、財產等重大合法權益但又很難得到本人授權同意的;

(6)所涉及的個人信息是個人信息主體自行向社會公眾公開的;

(7)根據個人信息主體要求簽訂和履行合同所必需的;

(8)從合法公開披露的信息中收集個人信息的,如合法的新聞報道、政府信息公開等渠道;

(9)維護所提供產品或服務的安全穩定運行所必需的,如發現、處置產品或服務的故障;

10、您理解并同意, Authing 服務可能需要您在您的設備中開啟特定的訪問權限,以實現這些權限所涉及個人信息的收集和使用:

(1)如我們訪問您的攝像頭,是為了使您可以使用攝像頭進行掃碼、拍攝,用于實現登錄、使用"拍照"功能支付、圖片評論、拍照取詞、拍照翻譯及上傳頭像;

(2)如我們訪問您的相冊,是為了使您可以實現您設備中的照片、圖片或視頻的取用與上傳、發表評論/分享、使用相冊中的圖片上傳頭像;

(3)如我們訪問您的存儲,是為了使您可以實現裁剪頭像圖片、崩潰日志查詢等功能;

(4)如我們訪問您的麥克風,是為了使您可以實現語音翻譯功能、語音評論、與客服實現語音交互以及語音教學交互功能,在這些功能中我們會收集您的錄音內容以識別您的具體需求。

(5)如我們訪問您的瀏覽器,是為了使您可以實現“自動登錄”等功能,在這些功能中我們將收集您瀏覽器的相關數據以識別具體需求。

當您需要關閉該功能時,大多數移動設備都會支持您的這項需求,具體方法請參考或聯系您移動設備的服務商或生產商。請您注意,您開啟任一權限即代表您授權我們可以收集和使用相關個人信息來為您提供對應服務,您一旦關閉任一權限即代表您取消了授權,我們將不再基于對應權限繼續收集和使用相關個人信息,也無法為您提供該權限所對應的服務。但是,您關閉權限的決定不會影響您使用已授權其他權限的功能,以及此前基于您的授權所進行的個人信息收集及使用。

11、有關個人敏感信息的提示

以上由您提供或我們收集您的個人信息中,可能包含您的個人敏感信息,包括銀行賬號、交易和消費記錄、虛擬財產信息、系統賬號、郵箱地址及其有關的密碼、電話號碼、網頁瀏覽記錄、位置信息。請您謹慎并留意個人敏感信息,您同意您的個人敏感信息我們可以按本政策所述的目的和方式來處理。

二、我們如何使用 Cookies 或同類技術

(一) Cookies

我們或我們的第三方合作伙伴可能通過 Cookies 獲取和使用您的個人信息,并將該等個人信息儲存為日志信息。

通過使用 Cookies ,我們向您提供簡單易行并富個性化的網絡體驗。一個 Cookies 是少量的數據,它們從一個網絡服務器送至您的瀏覽器并存在計算機硬盤上。我們使用 Cookies 是為了讓您可以受益。比如,為使得 Authing 的登錄過程更快捷,您可以選擇把用戶名存在一個 Cookies 中。這樣下次當您要登錄 Authing 的服務時能更加方便快捷。Cookies 能幫助我們確定您連接的頁面和內容,您在 Authing 特定服務上花費的時間和您所選擇的 Authing 服務。

Cookies 使得我們能更好、更快地為您服務,并且使您在 Authing 服務上的經歷更富個性化。然而,您應該能夠控制 Cookies 是否以及怎樣被你的瀏覽器接受。請查閱您的瀏覽器附帶的文件以獲得更多這方面的信息。

我們和第三方合作伙伴可能通過 Cookies 收集和使用您的個人信息,并將該等個人信息儲存。

我們使用自己的 Cookies ,可能用于以下用途:

(1)記住您的身份。Cookies 有助于我們辨認您作為我們的注冊用戶的身份,或保存您向我們提供有關您的喜好或其他個人信息;

(2)分析您使用我們服務的情況。我們可利用 Cookies 來了解您使用 Authing 服務進行什么活動、或哪些服務或服務最受歡迎;

(3)廣告優化。 Cookies 有助于我們根據您的個人信息,向您提供與您相關的廣告而非進行普遍的廣告投放。

我們為上述目的使用 Cookies 的同時,可能將通過 Cookies 收集的非個人身份信息匯總提供給廣告商和其他伙伴,用于分析您和其他用戶如何使用 Authing 服務并用于廣告服務。

Authing 服務上可能會有廣告商和其他合作方放置的 Cookies 。這些 Cookies 可能會收集與您相關的非個人身份信息,以用于分析用戶如何使用該等服務、向您發送您可能感興趣的廣告,或用于評估廣告服務的效果。這些第三方 Cookies 收集和使用該等個人信息不受本政策約束,而是受到其自身的個人信息保護聲明約束,我們不對第三方的 Cookies 承擔責任。

您可以通過瀏覽器或用戶選擇機制拒絕或管理 Cookies 。但請您注意,如果您停用 Cookies ,我們有可能無法為您提供最佳的服務體驗,某些服務也可能無法正常使用。同時,您仍然將收到廣告,只是這些廣告與您的相關性會降低。

(二)網站信標和像素標簽

除 Cookies 外,我們還會在網站上使用網站信標和像素標簽等其他同類技術。例如,我們向您發送的電子郵件可能含有鏈接至我們網站內容的地址鏈接,如果您點擊該鏈接,我們則會跟蹤此次點擊,幫助我們了解您的產品或服務偏好以便于我們主動改善客戶服務體驗。網站信標通常是一種嵌入到網站或電子郵件中的透明圖像。借助于電子郵件中的像素標簽,我們能夠獲知電子郵件是否被打開。如果您不希望自己的活動以這種方式被追蹤,則可以隨時從我們的寄信名單中退訂。

三、我們可能共享、轉讓或披露的個人信息

(一)共享

您同意我們依據本政策向我們的關聯方或相關法人團體、與我們合作的一些商業合作伙伴(合稱"信息接收方")共享您的個人信息。我們將積極幫助您了解信息接收方對個人信息的存儲、使用等情況,以及您享有的訪問、更正、刪除、注銷賬戶等權利。除以下情形外,未經您同意,我們不會與我們及我們的信息接收方之外的任何第三方共享您的個人信息:

1、向您提供我們的服務。我們可能向信息接收方共享您的個人信息,以實現您需要的核心功能或提供您需要的服務;

2、維護和改善我們的服務。我們可能向信息接收方共享您的個人信息,以幫助我們為您提供更有針對性、更完善的服務,例如:代表我們發出電子郵件或推送通知的通訊服務提供商;

3、實現本政策第一條"我們如何收集和使用您的個人信息"部分所述目的;

4、履行我們在本政策或我們與您達成的其他協議中的義務和行使我們的權利;

5、向委托我們進行推廣的信息接收方共享,目的是為了使該等委托方了解推廣的覆蓋面和有效性。比如我們可以告知該委托方有多少人看了他們的推廣信息或在看到這些信息后購買了委托方的商品,或者向他們提供不能識別個人身份的統計信息,幫助他們了解其受眾或顧客。

6、在法律法規允許的范圍內,為了遵守法律、維護我們及我們的關聯方或合作伙伴、您或其他 Authing 用戶或社會公眾利益、財產或安全免遭損害,比如為防止欺詐等違法活動和減少信用風險,我們可能與其他公司和組織交換個人信息。不過,這并不包括違反本政策中所作的承諾而為獲利目的出售、出租、共享或以其它方式披露的個人信息。

7、應您合法需求,協助處理您與他人的糾紛或爭議;

8、應您的監護人合法要求而提供您的個人信息;

9、根據與您簽署的服務協議(包括在線簽署的電子協議以及相應的平臺規則)或其他的法律文件約定所提供;

10、基于學術研究而提供;

11、基于符合法律法規的社會公共利益而提供。

我們僅會出于合法、正當、必要、特定、明確的目的共享您的個人信息。對我們與之共享個人信息的公司、組織和個人,我們會與其簽署嚴格的保密協定,要求他們按照我們的說明、本政策以及其他任何相關的保密和安全措施來處理個人信息。

(二)轉讓

1、隨著我們業務的持續發展,我們有可能進行合并、收購、資產轉讓或類似的交易,而您的個人信息有可能作為此類交易的一部分而被轉移。我們會要求新的持有您個人信息的公司、組織繼續受本政策的約束,否則,我們將要求該公司、組織重新向您征求授權同意。

2、在獲得您的明確同意后,我們會向其他方轉讓您的個人信息。

(三)披露

我們僅會在以下情況下,且采取符合業界標準的安全防護措施的前提下,才會披露您的個人信息:

1、根據您的需求,在您明確同意的披露方式下披露您所指定的個人信息;

2、根據法律、法規的要求、強制性的行政執法或司法要求所必須提供您個人信息的情況下,我們可能會依據所要求的個人信息類型和披露方式披露您的個人信息。在符合法律法規的前提下,當我們收到上述披露個人信息的請求時,我們會要求接收方必須出具與之相應的法律文件,如傳票或調查函。我們堅信,對于要求我們提供的個人信息,應該在法律允許的范圍內盡可能保持透明。我們對所有的請求都進行了慎重的審查,以確保其具備合法依據,且僅限于執法部門因特定調查目的且有合法權利獲取的數據。

(四)共享、轉讓、披露個人信息時事先征得授權同意的例外

以下情形中,共享、轉讓、公開披露您的個人信息無需事先征得您的授權同意:

1、與個人信息控制者履行法律法規規定的義務相關的;

2、與國家安全、國防安全有關的;

3、與公共安全、公共衛生、重大公共利益有關的;

4、與刑事偵查、起訴、審判和判決執行等司法或行政執法有關的;

5、出于維護您或其他個人的生命、財產等重大合法權益但又很難得到本人同意的;

6、您自行向社會公眾公開的個人信息;

7、從合法公開披露的信息中收集個人信息的,如合法的新聞報道、政府信息公開等渠道。

根據法律規定,共享、轉讓經去標識化處理的個人信息,且確保數據接收方無法復原并重新識別個人信息主體的,不屬于個人信息的對外共享、轉讓及公開披露行為,對此類數據的保存及處理將無需另行向您通知并征得您的同意。

四、我們如何保留、儲存和保護您的個人信息安全

(一)我們僅在本政策所述目的所必需期間和法律法規及監管規定的時限內保存您的個人信息, Authing 判斷前述期限的標準包括:

1、完成與您相關的交易目的、維護相應交易及業務記錄、應對您可能的查詢或投訴;

2、保證 Authing 為您提供服務的安全和質量;

3、您是否同意更長的留存期間;

4、是否存在保留期限的其他特別約定。

在您的個人信息超出保留期間后, Authing 會根據適用法律的要求刪除您的個人信息,或使其匿名化處理(如您為未成年人,在您的個人信息超出保留期間后, Authing 會按照相關法律法規要求對您的個人信息進行相應處理)。如因特殊情形無法按照相關要求刪除的,平臺將對該部分事項向您進行說明。

如我們終止服務或運營,我們將及時停止繼續收集您個人信息的活動,同時會遵守相關法律法規要求提前向您通知,并在終止服務或運營后對您的個人信息進行刪除或匿名化處理,法律法規或監管部門另有規定的除外。

(二)我們在中華人民共和國境內運營中收集和產生的個人信息,存儲在中國境內。以下情形除外:

1、法律法規有明確規定;

2、獲得您的授權同意;

3、您使用的產品、服務涉及跨境,我們需要向境外提供您的個人信息的。

針對以上情形,我們會確保依據本政策及國家法律法規要求對您的個人信息提供足夠的保護。

(三)我們非常重視個人信息安全,指定了特定人員,并采取一切合理可行的措施,保護您的個人信息:

1、數據安全技術措施

我們會采用符合業界標準的安全防護措施,包括建立合理的制度規范、安全技術來防止您的個人信息遭到未經授權的訪問使用、修改,避免數據的損壞或丟失。網絡服務采取了多種加密技術,例如在某些服務中,我們將利用加密技術來保護您的個人信息,采取加密技術對您的個人信息進行加密保存,并通過隔離技術進行隔離。在個人信息使用時,例如個人信息展示、個人信息關聯計算,我們會采用多種數據脫敏技術增強個人信息在使用中的安全性。采用嚴格的數據訪問權限控制和多重身份認證技術保護個人信息,避免數據被違規使用。

2、我們為保護個人信息采取的其他安全措施

(1)我們通過建立數據分類分級制度、數據安全管理規范、數據安全開發規范來管理規范個人信息的存儲和使用。

(2)我們通過個人信息接觸者保密協議、監控和審計機制來對數據進行全面安全控制。

(3)我們還會舉辦安全和隱私保護培訓課程,加強員工對于保護個人信息重要性的認識和安全意識。

(4)我們僅允許有必要知曉這些個人信息的我們及我們關聯方的員工、合作伙伴訪問您的個人信息,并為此設置了嚴格的訪問權限控制和監控機制。我們同時要求可能接觸到您的個人信息的所有人員履行相應的保密義務。如果未能履行這些義務,可能會被追究法律責任或被中止與我們的合作關系。

3、互聯網并非絕對安全的環境,而且電子郵件、即時通訊、社交軟件或其他服務軟件等與其他用戶的交流方式無法確定是否完全加密,我們建議您使用此類工具時請使用復雜密碼,并注意保護您的個人信息安全。

4、我們將盡力確保或擔保您發送給我們的任何個人信息的安全性。如果我們的物理、技術、或管理防護設施遭到破壞,導致個人信息被非授權訪問、公開披露、篡改、或毀壞,導致您的合法權益受損,我們將承擔相應的法律責任。

(四)安全事件處置

在不幸發生個人信息安全事件后,我們將按照法律法規的要求,及時向您告知:安全事件的基本情況和可能的影響、我們已采取或將要采取的處置措施、您可自主防范和降低風險的建議、對您的補救措施等。我們同時將及時將事件相關情況以郵件、信函、短信、電話、推送通知等方式告知您,難以逐一告知個人信息主體時,我們會采取合理、有效的方式發布公告。同時,我們還將按照監管部門要求,主動上報個人信息安全事件的處置情況。

請您理解,由于技術的限制以及風險防范的局限,即便我們已經盡量加強安全措施,也無法始終保證個人信息百分之百的安全。您需要了解,您接入 Authing 服務所用的系統和通訊網絡,有可能因我們可控范圍外的情況而發生問題。

五、如何管理您的個人信息

我們鼓勵您更新和修改您的個人信息以使其更準確有效,也請您理解,您更正、刪除、撤回授權或停止使用 Authing 服務的決定,并不影響我們此前基于您的授權而開展的個人信息處理。

您可以通過以下方式來管理您的個人信息:

(一)訪問您的個人信息

1、賬戶個人信息:如果您希望訪問您的賬戶中的個人基本個人信息(包括頭像、昵稱、生日、公司、地址等),您可以登錄賬號通過"個人中心"進行訪問。

2、訂單個人信息:您可以在"控制臺-費用管理-訂單信息"查看您的所有訂單狀態。

(二)更正您的個人信息

如果您希望更正您的賬戶中的個人基本個人信息(包括頭像、昵稱、手機號等),您可以登錄賬號在"個人中心"進行修改。

(三)刪除您的個人信息

您可以通過"(一)訪問、更正您的個人信息"中列明的方式自主刪除您的部分個人信息。在部分個人信息刪除時,我們可能會要求您進行身份驗證,以保障個人信息安全。

在以下情形中,您可以向我們提出刪除個人信息的請求:

1、如果我們處理個人信息的行為違反法律法規;

2、如果我們收集、使用您的個人信息,卻未征得您的授權同意;

3、如果我們處理個人信息的行為嚴重違反了與您的約定;

4、如果我們不再為您提供 Authing 服務。

若我們決定響應您的刪除請求,我們還將同時盡可能通知從我們處獲得您的個人信息的實體,要求其及時刪除,除非法律法規另有規定,或這些實體獲得您的獨立授權。

(四)改變您授權同意的范圍

您總是可以選擇是否披露個人信息。有些個人信息是使用 Authing 服務所必需的,但大多數其他個人信息的提供是由您決定的。您可以通過"本條(一)訪問、更正您的個人信息"中列明的方式"刪除個人信息、關閉設備功能或注銷賬號等方式改變您授權我們繼續收集個人信息的范圍或通過本政策第九條【如何聯系我們】約定的聯系方式聯絡我們撤回您的授權,一般情況下,我們將在十五天內予以回復。

(五)注銷您的賬號

如果您不再使用 Authing 服務,在符合服務協議約定條件及國家相關法律法規規定的情況下,您可以通過登錄" Authing "-"個人中心"-"安全等級"-"賬號注銷"所示的流程或本政策第九條【如何聯系我們】約定的聯系方式聯絡我們注銷您的賬號,一般情況下,我們將在十五個工作日內為您注銷賬號,屆時我們將停止為您提供 Authing 服務。當您的帳號注銷或被刪除后,與該帳號相關的 Authing 服務項下的全部服務資料和數據將被刪除或匿名化處理,但法律法規另有規定的除外。

(六)獲取個人信息副本:您可以通過郵箱 sales@authing.com 服務渠道聯系我們并且告知我們您想要獲取您的個人信息副本,一般情況下,我們將在收到您的問題之日起十五天內予以回復。

(七)響應您的上述請求

為保障安全,您可能需要提供書面請求,或以其他方式證明您的身份。我們可能會先要求您驗證自己的身份,然后再處理您的請求。對于您合理的請求,我們原則上不收取費用,但對多次重復、超出合理限度的請求,我們將視情收取一定成本費用。對于那些無端重復、需要過多技術手段(例如,需要開發新系統或從根本上改變現行慣例)、給他人合法權益帶來風險或者非常不切實際(例如,涉及備份磁帶上存放的信息)的請求,我們可能會予以拒絕。

在以下情形中,我們將無法響應您的請求:

1、與我們履行法律法規規定的義務相關的;

2、與國家安全、國防安全直接相關的;

3、與公共安全、公共衛生、重大公共利益直接相關的;

4、與刑事偵查、起訴、審判和執行判決等直接相關的;

5、我們有充分證據表明您存在主觀惡意或濫用權利的;

6、出于維護您或其他個人的生命、財產等重大合法權益但又很難得到本人同意的;

7、響應您的請求將導致您或其他個人、組織的合法權益受到嚴重損害的;

8、涉及商業秘密的。

六、第三方服務

Authing 服務可能鏈接至第三方提供的社交媒體或其他服務(包括網站或其他服務形式)。包括:

(一)您可利用"分享"鍵將某些 Authing 服務內容分享到第三方服務,或您將第三方服務內容分享到 Authing 。這些功能可能會收集您的信息(包括您的日志信息),并可能在您的電腦裝置 Cookies,從而正常運行上述功能;

(二)我們通過廣告或我們服務的其他方式向您提供鏈接,使您可以鏈接至第三方的服務或網站;

(三)其他接入第三方服務的情形。為實現本政策中聲明的目的,我們可能會接入第三方服務商提供的 SDK 或其他類似的應用程序,并將我們依照本政策收集的您的某些信息共享給該等第三方服務商,以便提供更好的客戶服務和用戶體驗。目前,我們接入的第三方服務商主要包括以下幾種類型:

(1)用于廣告相關服務,包括廣告展示、廣告數據監測/統計等;

(2)用于消息推送功能,包括手機廠商 Push 推送、特定事件提醒等;

(3)用于支付相關服務,包括訂單支付、交易行為核驗、收入結算、支付信息匯總統計等;

(4)用于在您同意的情況下獲取設備位置權限、搜集設備信息和日志信息等;

(5)用于第三方授權服務,包括第三方帳號登陸、將有關內容分享至第三方產品等;

(6)用于支持產品功能模塊,包括在線直播、視頻播放、語音識別、智能客服、內容存儲等;

我們接入的部分第三方 SDK 或類似應用程序可能會收集您的個人信息,如您在我們的服務中使用這類由第三方提供的服務時,您同意將由其直接收集和處理您的信息。我們會評估這類第三方服務收集個人信息的合法性、正當性、必要性,要求該等第三方對您的個人信息采取保護措施,并嚴格遵守相關法律法規與監管要求。您也可以選擇通過本政策"如何聯系我們"章節所列的反饋渠道聯系我們,我們會盡快為您作出解答。

如上所述服務由相關的第三方負責運營。您使用該等第三方服務(包括您向該等第三方提供的任何個人信息),須受第三方自己的服務條款及個人信息保護聲明(而非本政策)約束,您需要仔細閱讀其條款。我們僅會出于正當、必要、特定的目的共享您的信息。我們會要求他們履行相關保密義務并采取相應的安全措施。

七、未成年人保護

如您為未滿 18 周歲的未成年人的,請務必讓您的監護人仔細閱讀本政策,并在征得您的監護人同意的前提下使用我們的服務或向我們提供個人信息。我們將根據國家相關法律法規的規定保護未成年人的相關個人信息。如監護人發現相關未成年人個人信息為未成年人自行填寫,需要進行修改或刪除處理的,請隨時與我們聯系。

特別地,若您是 14 周歲以下的兒童,請您通知您的監護人,并在您使用 Authing 服務、提交個人信息之前,尋求其同意和指導。

八、通知和修訂

我們可能適時修改本政策的條款,該等修改構成本政策的一部分。對于重大變更,我們會提供更顯著的通知,您如果不同意該等變更,可以選擇停止使用 Authing 服務;如您仍然繼續使用 Authing 服務的,即表示同意受經修訂的本政策的約束。

我們鼓勵您在每次使用 Authing 服務時都查閱我們的隱私政策。

我們可能在必需時(例如當我們由于系統維護而暫停某一項服務時)發出與服務有關的公告。您可能無法取消這些與服務有關、性質不屬于推廣的公告。

最后,您必須對您的賬號和密碼信息負有保密義務。任何情況下,請小心妥善保管。

九、法律適用與管轄

如果出現糾紛,雙方協商一致解決;如果雙方無法通過協商解決爭端,則雙方同意由中國國際經濟貿易仲裁委員會(簡稱" CIETAC ")根據 CIETAC 有效的仲裁規則以及適用法律在中國北京進行仲裁,仲裁語言為中文,并由3名仲裁員進行審理。

十、如何聯系我們

北京蒸汽記憶科技有限公司的聯系地址為:北京市朝陽區北辰世紀中心 B 座 16 層。我們將按照本政策保護您的個人信息。

我們指定了個人信息保護專門人員,如您有關于個人信息安全的投訴和舉報,或您對本政策、您的個人信息的相關事宜有任何問題、意見或建議,以及有關本政策或 Authing 的隱私措施的問題,請與我們聯系:電話:400-6197-031;郵箱地址: sales@authing.com 。

一般情況下,我們將在收到您的問題、意見或建議之日起十五天內予以回復。

Authing Privacy Policy

Update date: December 10, 2021

Welcome to use the products and services provided by Beijing Steamory Technology Co., Ltd. (hereinafter referred to as "Authing"). Authing (or "we" for short) is well aware of the importance of personal information to you, and we have always solemnly promised to protect users who use our products and services (hereinafter collectively referred to as "Authing services") (hereinafter collectively referred to as "users" or "you") Personal information and privacy security. When you use the Authing service, we may collect and use your personal information (or "personal information" for short). "Authing Privacy Policy" (hereinafter referred to as "this policy") applies to the Authing service we provide. Users under the age of 18, please read this policy with a legal guardian, and pay special attention to the terms of use for minors. In particular, if you are a child under the age of 14, you should also ask your guardian to read this policy carefully, and you can use the Authing service only with the consent of the guardian. We hope to use this policy to explain to you the corresponding processing rules when we collect and use your personal information, as well as the ways we can provide you with access, correction, deletion and protection of this personal information, so as to better protect your rights and interests .

Scope of application: (a) When you use the Authing service or visit the webpage related to the Authing service, Authing automatically receives and records the information on your browser and computer, including but not limited to your IP address and browser type , The language used, the date and time of the visit, the software and hardware feature information, and the webpage records you need; (b) Authing obtains user personal data from business partners through legal means.

You understand and agree that the following information does not apply to this privacy policy: (a) Keyword information entered when using the search service provided by the Authing service; (b) The relevant information and data collected by Authing that you publish on the Authing service, including But it is not limited to participation in activities, transaction information and evaluation details; (c) Violation of legal provisions or violations of Authing service rules and the measures Authing has taken against you.

This policy will help you understand the following:

1. How we collect and use your personal information

2. How do we use Cookies or similar technologies

3. Personal information that we may share, transfer and disclose

4. How do we keep, store and protect the security of your personal information

5. How to manage your personal information

6. third-party services

7. Protection of minors

8. Notice and Amendment

9. Application of Law and Jurisdiction

10. How to contact us

【Special Reminder】 Please read carefully before using the Authing service (minors, please read it with a guardian) and understand this policy (especially the content marked in bold or underlined) to make an appropriate choice. Once you use or continue to use our products or services after we update this policy, it means that you agree to this policy and agree that we process your personal information in accordance with this policy.

This policy applies to Authing services. If there is any inconsistency with the similar terms of the "Professional Service Contract" between Authing and you, this policy shall prevail. If a single service we provide does not apply to this policy, the service will expressly exclude the application of this policy in an appropriate manner.

1. How we collect and use your personal information:

We collect your personal information mainly for you and other users to use the Authing service more easily and satisfactorily. And this personal information helps us achieve this goal.

A. We will collect and obtain your personal information through the following channels:

a. The personal information you provide.

ⅰ. The personal information you provide to us when you register for the Authing service account or use the Authing service, including your mobile phone number, and you can voluntarily choose to fill in your nickname, profile picture, gender, age, education, school, identity Certificate number, recipient’s name, recipient’s contact information, and basic information about the delivery address. If you only need to browse and understand Authing, you do not need to register an account and provide the above information. If you do not provide this information, it will not affect your use of the basic functions of Authing;

ⅱ. The shared personal information you provide to other parties through the Authing service, and the personal information stored when you use the Authing service.

Please note that if you upload or publish your personal information in a public area visible to other users in the Authing service, or disclose your personal information in your response to information uploaded or published by others, such personal information may be Collected and used by others, as long as you do not delete the personal information that you have disclosed or shared, the relevant personal information may remain in the public domain; even if you delete the shared personal information, the relevant personal information may still be owned by other users or not under our control The third party independently caches, copies, or stores, or saves it in the public domain by other users or such third parties. If you disclose or share your personal information through the aforementioned channels, we will not be liable for the leakage of your personal information. Therefore, we remind and ask you to carefully consider whether to disclose or share your personal information through the above channels. When you find that others have improperly collected or used your personal information, you can contact us through the contact information stipulated in Article 9 of this Policy [How to Contact Us].

b. Your personal information shared by other parties. That is, the shared personal information about you provided by other parties when using the Authing service.

c. Your personal information we have obtained. When you use the Authing service, we collect, aggregate, and record personal information.

B. We will collect and use the following types of personal information of you for the following purposes:

a. Help you complete registration, login and logout

In order for us to provide you with a complete Authing service, you need to provide basic registration or login personal information, including using your mobile phone number to register and log in or provide a third-party account to log in to Authing. If you only need to use basic services such as browsing, querying, and searching, you do not need to register as an Authing user and provide the above-mentioned personal information.

b. Customer service and after-sales

In accordance with relevant laws and regulations and regulatory requirements, or when you contact us, our customer service or after-sales service may require you to provide real identity information (name, ID) and account information to verify your identity in order to help you with questions, Or record the solutions and results of related issues.

Please note that your identity information is personally sensitive information. Please provide it with caution. If you refuse to provide it, you may not be able to obtain related services, but it will not affect the normal use of other functions and services.

c. Maintain the normal operation of basic functions

During your use of our services, in order to identify the abnormal status of your account and understand the suitability of the product, provide you with services such as browsing, searching, registering/logging in, viewing and editing personal information, purchasing services/products, and paying, and maintaining basic functions In normal operation, we may automatically collect and store information about the services you use and how you use them and associate these information, including:

ⅰ. Log information: When you use our services, we may automatically collect your detailed usage of our services and save them as relevant web logs. Log information includes your login account, search query content, IP address, browser type, telecom operator, network environment, language used, access date and time, and web browsing records you visit, Push open records, crash records, Stay time, refresh record, publish record, follow, subscribe, favorite and share.

ⅱ. Device information: We may receive and record the device-related information (including device identifiers (IMEI/MAC/OPEN UDID), Serial, SIM card) according to the specific permissions granted by you during software installation and use. IMSI identification code, device model, operating system and version, client version, device resolution, package name, device settings, process and software list, Android ID, IDFA, UUID, software and hardware feature information), information about the location of the device (Including IP address, GPS location, and WLAN access point, Bluetooth and base station sensor information that can provide relevant personal information).

At the same time, in order to collect the above basic personal device information, we will apply for permission to access your device information. We collect this information to provide you with our basic services and basic functions. If you refuse to provide the above permissions, you may be unable to use it. Our products and services.

Please note that separate device information and log information are personal information that cannot identify a specific natural person. If we combine this type of non-personal information with other personal information to identify a specific natural person, or use it in combination with personal information, during the combined use period, this type of non-personal information will be treated as personal information, except for obtaining you Unless otherwise provided by authorization or laws and regulations, we will anonymize and de-identify this type of personal information. During the combined use, this information will be treated and protected as your personal information in accordance with this privacy policy.

d. Provide you with goods or services

ⅰ. Sharing and publishing of personal information: When you use the Authing service, upload and/or publish personal information, and perform related actions, we will collect the personal information you upload, publish or form, and have the right to display your nickname , Avatar and post content.

ⅱ. Delivery of goods or services: When you order specific goods or services from our goods or services, we will generate an order for you to purchase the goods or services through the system. In order to facilitate the delivery to you of the goods or services you have purchased on Authing, you may need to provide the recipient's personal identification information, name, purchaser's subject and related information, orderer, contact number, and payment status information. If you refuse to provide such personal information, we will not be able to complete the relevant delivery services. If you order goods or services for others through the Authing service, you need to provide the aforementioned personal information of the actual orderer. Before providing us with the aforementioned personal information of the actual orderer, you need to ensure that you have obtained his authorization and consent.

When you use the Authing service, Authing will collect and store the pictures and voice information you upload, and our relevant recognition program will process and analyze these data.

ⅲ. In order to complete order payment, deliver goods or services, confirm transaction status, and provide you with after-sales and dispute resolution services, we will collect information related to the transaction progress through the transaction object, payment institution, logistics company, etc. you select based on the exchange. Your account number, order, transaction, payment, logistics information, or share your transaction information with the above-mentioned service providers.

ⅳ. Order management: In order to display the order information of your account and protect your after-sales rights and interests, Authing will collect the order information, transaction and consumption records generated during your use of Authing to show you and facilitate your order processing manage.

ⅴ. Customer service and after-sales service: When you contact our customer service or use other user response functions (including in-sales and after-sales applications, personal information protection complaints or suggestions, other customer complaints and needs), we may need you to provide necessary Personal information is used to match and verify your user identity in order to protect your account and system security. We may also save your contact information (used when you contact us or other contact information you voluntarily provide to us), your communication/call records and content with us, and other necessary information related to your needs, In order to contact you or help you solve the problem, or record the solution and result of the related problem.

e. Your personal information that we have collected indirectly:

We may obtain relevant personal information that you have authorized to share from management affiliates and third-party partners. We may obtain the account information (avatar, nickname, login time) that you authorized to share from a third party and bind your third-party account with your Authing service account after you agree to this policy, so that you can directly use the third-party account Log in and use our products and/or services. We will collect and use your personal information in compliance with relevant laws and regulations, and in accordance with agreements with affiliates or third-party partners, and we are confident that the source of the personal information provided by them is legal.

f. Send you a notice

We may issue service-related notices to you when necessary (for example, when we suspend a single service, change, or terminate the provision of a single service due to system maintenance).

If you do not want to continue to receive our push messages, you can ask us to stop pushing, for example: according to the SMS unsubscription guidelines, ask us to stop sending promotional messages, or set up in the mobile device to no longer receive our push messages; but Except when we send messages in accordance with legal regulations or service agreements.

g. Provide you with security

In order to improve the security of your use of the services provided by us and our partners, protect the personal and property safety of you or other users or the public from infringement, and better prevent phishing websites, fraud, network vulnerabilities, computer viruses, network attacks, network intrusions, etc. Security risks, to more accurately identify violations of laws and regulations or Authing service-related agreement rules, we may collect, use or integrate your account information, transaction information, device information, log information, and our affiliates and partners obtain your authorization Or use personal information shared by law to comprehensively judge your account and transaction risks, conduct identity verification, detect and prevent security incidents, and take necessary recording, auditing, analysis, and disposal measures in accordance with the law.

h. Other

You understand and agree that after collecting your personal information, we may de-identify the data through technical means. The de-identified information will not be able to identify you. In this case, we have the right to use the de-identified The user’s database is analyzed and used commercially without obtaining your consent.

Please note that if we want to use your personal information for other purposes not specified in this policy or collect additional personal information that is not mentioned, we will separately ask you to agree in advance (the way to confirm consent: check, Pop-up window, station letter, mail, short message method). Once you agree, these additional uses will be regarded as part of this policy, and this policy will also apply to such additional personal information.

If we want to use your personal information for other purposes not specified in this policy or collect additional personal information that is not mentioned, we will obtain additional information from you through page prompts, interactive processes, website announcements, or other methods. agree. During this process, you can contact us through the contact information stipulated in Article 9 of this policy [How to Contact Us].

i. Exceptions for obtaining authorization and consent

According to relevant laws and regulations, the collection of your personal information in the following situations does not require your authorization and consent:

ⅰ. It is related to the performance of the obligations stipulated by laws and regulations by the personal information controller;

ⅱ. It is directly related to national security and national defense security;

ⅲ. It is directly related to public safety, public health, and major public interests;

ⅳ. Directly related to criminal investigation, prosecution, trial, and execution of judgments;

ⅴ. In order to protect the life and property of the personal information subject or other individuals, but it is difficult to obtain the authorization and consent of the person;

ⅵ. The personal information involved is disclosed to the public by the subject of personal information on his own initiative;

ⅶ. Necessary for signing and performing contracts according to the requirements of the personal information subject;

ⅷ. Collecting personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels;

ⅸ. Necessary to maintain the safe and stable operation of the products or services provided, such as discovering and disposing of product or service failures;

j. You understand and agree that the Authing service may require you to enable specific access permissions in your device to achieve the collection and use of personal information involved in these permissions:

ⅰ. If we visit your camera, it is for you to use the camera to scan the code and take pictures, which is used to realize login, use the "photograph" function to pay, comment on pictures, take photos with words, take pictures, translate and upload avatars;

ⅱ. If we visit your photo album, it is to enable you to access and upload photos, pictures or videos in your device, post comments/share, and upload avatars using pictures in the photo album;

ⅲ. If we visit your storage, it is to enable you to implement functions such as cropping avatar pictures and querying crash logs;

ⅳ. If we access your microphone, it is to enable you to implement voice translation functions, voice comments, voice interaction with customer service, and voice teaching interaction functions. In these functions, we will collect your recording content to identify your specific need.

ⅴ. If we visit your browser, it is to enable you to realize "automatic login" and other functions. In these functions, we will collect relevant data of your browser to identify specific needs.

When you need to turn off this feature, most mobile devices will support your need. For specific methods, please refer to or contact your mobile device service provider or manufacturer. Please note that if you enable any permission, you authorize us to collect and use relevant personal information to provide you with corresponding services. Once you close any permission, you cancel the authorization, and we will no longer continue to collect based on the corresponding permissions. And the use of related personal information cannot provide you with the services corresponding to this authority. However, your decision to turn off permissions will not affect your use of authorized functions of other permissions, as well as the collection and use of personal information previously based on your authorization.

k. Reminders about personal sensitive information

The above personal information provided by you or collected by us may contain your sensitive personal information, including bank account numbers, transaction and consumption records, virtual property information, system account numbers, email addresses and related passwords, phone numbers, web browsing Record, location information. Please be cautious and pay attention to sensitive personal information. You agree that we can process your sensitive personal information in accordance with the purposes and methods described in this policy.

2. How do we use Cookies or similar technologies

a. Cookies

We or our third-party partners may obtain and use your personal information through Cookies, and store such personal information as log information.

Through the use of Cookies, we provide you with a simple and personalized network experience. A cookie is a small amount of data, which is sent from a web server to your browser and stored on the computer hard drive. We use Cookies to benefit you. For example, in order to make the login process of Authing faster, you can choose to store the user name in a Cookies. This will be more convenient and faster next time you want to log in to the Authing service. Cookies can help us determine the page and content you are connected to, the time you spend on the Authing specific service and the Authing service you choose.

Cookies enables us to serve you better and faster, and makes your experience on the Authing service more personalized. However, you should be able to control whether and how Cookies are accepted by your browser. Please refer to the file attached to your browser for more information on this.

We and third-party partners may collect and use your personal information through Cookies, and store such personal information.

We use our own Cookies, which may be used for the following purposes:

(1) Remember your identity. Cookies helps us to recognize your identity as our registered user, or save your preferences or other personal information about you provided to us;

(2) Analyze your use of our services. We can use Cookies to understand what activities you use Authing services for, or which services or services are most popular;

(3) Advertising optimization. Cookies helps us to provide you with advertisements that are relevant to you based on your personal information instead of general advertising.

While we use Cookies for the above purposes, we may aggregate the non-personally identifiable information collected through Cookies to advertisers and other partners to analyze how you and other users use the Authing service and use it for advertising services.

There may be Cookies placed by advertisers and other partners on the Authing service. These Cookies may collect non-personally identifiable information related to you to analyze how users use these services, send you advertisements that may be of interest to you, or evaluate the effectiveness of advertising services. The collection and use of such personal information by these third-party Cookies is not restricted by this policy, but by their own personal information protection statement. We are not responsible for third-party Cookies.

You can reject or manage Cookies through the browser or user selection mechanism. However, please note that if you disable Cookies, we may not be able to provide you with the best service experience, and some services may not be available normally. At the same time, you will still receive advertisements, but the relevance of these advertisements to you will be reduced.

b. Web beacons and pixel tags

In addition to Cookies, we also use other similar technologies such as web beacons and pixel tags on our website. For example, the email we send you may contain an address link that links to the content of our website. If you click the link, we will track the click to help us understand your product or service preferences so that we can proactively improve customer service Experience. A web beacon is usually a transparent image embedded in a website or email. With the help of the pixel tags in the email, we can know whether the email has been opened. If you do not want your activities to be tracked in this way, you can unsubscribe from our mailing list at any time.

3. Personal information that we may share, transfer or disclose

a. Sharing

You agree that we share your personal information with our affiliates or related legal entities, and some business partners that cooperate with us (collectively referred to as "information recipients") in accordance with this policy. We will actively help you understand the storage and use of personal information by the information recipient, as well as your rights to access, correct, delete, and cancel your account. Except for the following circumstances, without your consent, we will not share your personal information with any third party other than us and our information recipient:

ⅰ. Provide you with our services. We may share your personal information with the information recipient to achieve the core functions you need or provide the services you need;

ⅱ. Maintain and improve our services. We may share your personal information with information recipients to help us provide you with more targeted and better services, for example: communication service providers that send emails or push notifications on our behalf;

ⅲ. To achieve the purpose stated in the section "How do we collect and use your personal information" in Article 1 of this policy;

ⅳ. Fulfill our obligations and exercise our rights in this policy or other agreements we have reached with you;

ⅴ. The purpose of sharing with the information recipients who entrust us to promote is to make the entrusting parties understand the coverage and effectiveness of the promotion. For example, we can tell the entrusting party how many people have viewed their promotion information or purchased the entrusting party’s goods after seeing this information, or provide them with unidentifiable statistical information to help them understand their audience or customers.

ⅵ. To the extent permitted by laws and regulations, in order to comply with the law, protect us and our affiliates or partners, you or other Authing users, or the public from damage to the interests, property or safety of the public, for example, to prevent fraud and other illegal activities and To reduce credit risk, we may exchange personal information with other companies and organizations. However, this does not include personal information that is sold, rented, shared or otherwise disclosed for profit in violation of the commitments made in this policy.

ⅶ. Assist in handling disputes or disputes between you and others in response to your legal needs;

ⅷ. Provide your personal information in response to the legal request of your guardian;

ⅸ. Provided in accordance with the service agreement signed with you (including the electronic agreement signed online and the corresponding platform rules) or other legal documents;

ⅹ. Provided based on academic research;

?. Provided based on the public interest in compliance with laws and regulations.

We will only share your personal information for legal, legitimate, necessary, specific and clear purposes. For companies, organizations and individuals with whom we share personal information, we will sign strict confidentiality agreements with them, requiring them to handle personal information in accordance with our instructions, this policy and any other relevant confidentiality and security measures.

b. Transfer

ⅰ. With the continuous development of our business, we may conduct mergers, acquisitions, asset transfers or similar transactions, and your personal information may be transferred as part of such transactions. We will require new companies and organizations that hold your personal information to continue to be bound by this policy, otherwise, we will require that companies and organizations to re-seek authorization and consent from you.

ⅱ. After obtaining your explicit consent, we will transfer your personal information to other parties.

c. Disclosure

We will only disclose your personal information under the following circumstances and adopting industry-standard safety protection measures:

ⅰ. According to your needs, disclose your designated personal information in a disclosure method that you explicitly agree to;

ⅱ. In cases where your personal information must be provided in accordance with the requirements of laws and regulations, compulsory administrative law enforcement or judicial requirements, we may disclose your personal information based on the type of personal information required and the method of disclosure. Under the premise of complying with laws and regulations, when we receive the above request for the disclosure of personal information, we will require the recipient to issue corresponding legal documents, such as subpoenas or investigation letters. We firmly believe that the personal information we are required to provide should be as transparent as possible to the extent permitted by law. We have carefully reviewed all requests to ensure that they have a legal basis and are limited to data obtained by law enforcement agencies for specific investigation purposes and have legal rights.

d. Exceptions for obtaining prior authorization and consent when sharing, transferring, or disclosing personal information

In the following situations, sharing, transferring, and publicly disclosing your personal information does not require your prior authorization and consent:

ⅰ. Related to personal information controllers fulfilling obligations stipulated by laws and regulations;

ⅱ. Related to national security and national defense security;

ⅲ. Related to public safety, public health, and major public interests;

ⅳ. Related to judicial or administrative law enforcement such as criminal investigation, prosecution, trial, and execution of judgments;

ⅴ. In order to protect your or other individuals' life, property and other major legal rights and interests, but it is difficult to obtain the consent of the person;

ⅵ. Your personal information disclosed to the public on your own;

ⅶ. Collect personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels.

According to laws and regulations, sharing and transferring personal information that has been de-identified, and ensuring that the data recipient cannot restore and re-identify the subject of personal information does not belong to the external sharing, transfer, and public disclosure of personal information. The storage and processing will not need to notify you separately and obtain your consent.

4. How do we keep, store and protect the security of your personal information

a. We only store your personal information for the period necessary for the purpose stated in this policy and within the time limit prescribed by laws, regulations and supervision. Authing's criteria for judging the aforementioned period include:

ⅰ. Complete transaction purposes related to you, maintain corresponding transaction and business records, and respond to your possible inquiries or complaints;

ⅱ. Ensure the safety and quality of the services provided by Authing;

ⅲ. Do you agree to a longer retention period;

ⅳ. Whether there is any other special agreement on the retention period.

After your personal information exceeds the retention period, Authing will delete or anonymize your personal information in accordance with the requirements of applicable laws (if you are a minor, after your personal information exceeds the retention period, Authing will follow Relevant laws and regulations require that your personal information be processed accordingly). If it is impossible to delete it in accordance with relevant requirements due to special circumstances, the platform will explain this part of the matter to you.

If we terminate the service or operation, we will promptly stop the activities of continuing to collect your personal information, and at the same time, we will comply with relevant laws and regulations to notify you in advance, and delete or anonymize your personal information after terminating the service or operation. Unless otherwise provided by laws, regulations or regulatory authorities.

b. The personal information collected and generated during our operations within the territory of the People's Republic of China is stored in the territory of China. Except in the following situations:

ⅰ. There are clear provisions in laws and regulations;

ⅱ. Obtain your authorization and consent;

ⅲ. The products and services you use involve cross-border, and we need to provide your personal information overseas.

In response to the above circumstances, we will ensure that your personal information is adequately protected in accordance with this policy and national laws and regulations.

c. We attach great importance to personal information security, designate specific personnel, and take all reasonable and feasible measures to protect your personal information:

ⅰ. Data security technical measures

We will adopt safety protection measures that comply with industry standards, including the establishment of reasonable system specifications and safety technologies to prevent your personal information from unauthorized access, use, modification, and data damage or loss. Network services adopt a variety of encryption technologies. For example, in some services, we will use encryption technology to protect your personal information, use encryption technology to encrypt and store your personal information, and isolate it through isolation technology. When using personal information, such as personal information display and personal information association calculations, we will use a variety of data desensitization technologies to enhance the security of personal information in use. Strict data access control and multi-identity authentication technology are adopted to protect personal information and prevent data from being used in violation of regulations.

ⅱ. Other security measures we take to protect personal information

(1) We manage and regulate the storage and use of personal information by establishing a data classification and grading system, data security management specifications, and data security development specifications.

(2) We conduct comprehensive security control of data through confidentiality agreements, monitoring and auditing mechanisms for personal information contacts.

(3) We will also organize security and privacy protection training courses to strengthen employees’ awareness and security awareness of the importance of protecting personal information.

(4) We only allow employees and partners of us and our affiliates who need to know this personal information to access your personal information, and we have set up strict access control and monitoring mechanisms for this purpose. We also require all personnel who may have access to your personal information to perform corresponding confidentiality obligations. If you fail to fulfill these obligations, you may be held accountable or be suspended from our cooperative relationship.

ⅲ. The Internet is not an absolutely secure environment, and the communication methods with other users such as e-mail, instant messaging, social software or other service software cannot be determined whether it is completely encrypted. We recommend that you use complex passwords when using such tools, and pay attention. Protect your personal information security.

ⅳ. We will try our best to ensure or guarantee the security of any personal information you send to us. If our physical, technical, or management protection facilities are damaged, resulting in unauthorized access, public disclosure, tampering, or destruction of personal information, resulting in damage to your legitimate rights and interests, we will bear the corresponding legal responsibility.

d. Security incident handling

In the unfortunate event of a personal information security incident, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, and what you can independently prevent and reduce risks Suggestions, remedies for you, etc. At the same time, we will promptly notify you of the relevant information of the incident by email, letter, text message, phone call, push notification, etc. If it is difficult to inform the subject of personal information one by one, we will take a reasonable and effective way to issue an announcement. At the same time, we will also proactively report the handling of personal information security incidents in accordance with the requirements of the regulatory authorities.

Please understand that due to technical limitations and risk prevention limitations, even if we have tried our best to strengthen security measures, we cannot always guarantee the 100% security of personal information. You need to understand that the system and communication network you use to access the Authing service may cause problems due to circumstances beyond our control.

5. How to manage your personal information

We encourage you to update and modify your personal information to make it more accurate and effective. Please understand that your decision to correct, delete, withdraw your authorization or stop using the Authing service will not affect our previous personal information based on your authorization. Information processing.

You can manage your personal information in the following ways:

a. Access your personal information

ⅰ. Account personal information: If you want to access the basic personal information in your account (including avatar, nickname, birthday, company, address, etc.), you can log in to your account and access it through the "personal center".

ⅱ. Order personal information: You can check the status of all your orders in "Control Panel-Expense Management-Order Information".

b. Correct your personal information

If you want to correct the basic personal information in your account (including avatar, nickname, mobile phone number, etc.), you can log in to your account and make changes in the "Personal Center".

c. Delete your personal information

You can voluntarily delete part of your personal information through the methods listed in "(1) Accessing and Correcting Your Personal Information". When some personal information is deleted, we may require you to verify your identity to protect the security of your personal information.

In the following situations, you can request us to delete personal information:

ⅰ. If our handling of personal information violates laws and regulations;

ⅱ. If we collect and use your personal information, but have not obtained your authorization;

ⅲ. If our handling of personal information seriously violates our agreement with you;

ⅳ. If we no longer provide you with Authing service.

If we decide to respond to your deletion request, we will also notify the entities that have obtained your personal information from us as much as possible at the same time, requiring them to delete them in a timely manner, unless laws and regulations provide otherwise, or these entities obtain your independent authorization.

d. Change the scope of your authorization

You can always choose whether to disclose personal information. Some personal information is necessary to use the Authing service, but the provision of most other personal information is up to you. You can change the scope of your authorization to continue to collect personal information by "deleting personal information, turning off device functions, or canceling your account" in the methods listed in "This Article (1) Accessing and Correcting Your Personal Information" or through the ninth of this policy. Article [How to Contact Us] Contact us with the agreed contact information to withdraw your authorization. Under normal circumstances, we will reply within 15 days.

e. Cancel your account

If you no longer use the Authing service, you can log in to the process shown in "Authing"-"Personal Center"-"Security Level"-"Account Logout" if it complies with the stipulated conditions of the service agreement and relevant national laws and regulations. Or contact us to cancel your account in the contact information stipulated in Article 9 of this Policy [How to Contact Us]. Generally, we will cancel your account within 15 working days, at which time we will stop providing you with Authing services. When your account is cancelled or deleted, all service information and data under the Authing service related to that account will be deleted or anonymized, unless otherwise provided by laws and regulations.

f. Obtaining a copy of personal information: You can contact us through the email sales@authing.com service channel and inform us that you want to obtain a copy of your personal information. Generally, we will receive your question ten days after receiving your question. Respond within five days.

g. Responding to your above request

To ensure safety, you may need to provide a written request or prove your identity in other ways. We may ask you to verify your identity before processing your request. For your reasonable requests, we do not charge fees in principle, but for repeated requests that exceed reasonable limits, we will charge a certain cost as appropriate. For those who are unreasonably repeated, require too many technical means (for example, the need to develop new systems or fundamentally change current practices), bring risks to the legitimate rights and interests of others, or are very impractical (for example, involving information stored on backup tapes) Request, we may reject it.

In the following situations, we will not be able to respond to your request:

ⅰ. Related to our fulfillment of obligations stipulated by laws and regulations;

ⅱ. It is directly related to national security and national defense security;

ⅲ. It is directly related to public safety, public health, and major public interests;

ⅳ. Directly related to criminal investigation, prosecution, trial and execution of judgments;

ⅴ. We have sufficient evidence to show that you have subjective malice or abuse of rights;

ⅵ. In order to protect your or other individuals' life, property and other major legal rights and interests, but it is difficult to obtain the consent of the person;

ⅶ. Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations;

ⅷ. Involving commercial secrets.

6. Third-party services

The Authing service may be linked to social media or other services (including websites or other forms of services) provided by third parties. include:

a. You can use the "Share" button to share certain Authing service content to third-party services, or you can share third-party service content to Authing. These functions may collect your information (including your log information), and may install Cookies on your computer to operate the above functions normally;

b. We provide you with links through advertisements or other methods of our services, so that you can link to third-party services or websites;

c. Other access to third-party services. In order to achieve the purpose stated in this policy, we may access SDK or other similar applications provided by third-party service providers, and share certain information about you collected by us in accordance with this policy to such third-party service providers. In order to provide better customer service and user experience. Currently, the third-party service providers we access mainly include the following types:

ⅰ. For advertising-related services, including advertising display, advertising data monitoring/statistics, etc.;

ⅱ. Used for message push functions, including push push from mobile phone manufacturers, reminders of specific events, etc.;

ⅲ. For payment-related services, including order payment, transaction verification, income settlement, payment information summary statistics, etc.;

ⅳ. It is used to obtain device location permissions, collect device information and log information, etc. with your consent;

ⅴ. Used for third-party authorization services, including third-party account login, sharing relevant content to third-party products, etc.;

ⅵ. Used to support product functional modules, including online live broadcast, video playback, voice recognition, intelligent customer service, content storage, etc.;

Some third-party SDKs or similar applications that we access may collect your personal information. If you use such third-party services in our services, you agree that they will directly collect and process your information. We will evaluate the legality, legitimacy, and necessity of personal information collected by such third-party services, and require these third parties to take protective measures for your personal information, and strictly abide by relevant laws, regulations and regulatory requirements. You can also choose to contact us through the feedback channels listed in the "How to Contact Us" section of this policy, and we will answer you as soon as possible.

The services mentioned above are operated by relevant third parties. Your use of such third-party services (including any personal information you provide to such third parties) is subject to the third party's own terms of service and personal information protection statement (not this policy), and you need to read its terms carefully. We will only share your information for legitimate, necessary, and specific purposes. We will require them to fulfill relevant confidentiality obligations and take corresponding security measures.

7. Protection of minors

If you are a minor under the age of 18, please be sure to ask your guardian to read this policy carefully and use our services or provide us with personal information with the consent of your guardian. We will protect the personal information of minors in accordance with relevant national laws and regulations. If the guardian finds that the relevant minor’s personal information is filled out by the minor himself and needs to be modified or deleted, please feel free to contact us.

In particular, if you are a child under the age of 14, please notify your guardian and seek their consent and guidance before you use the Authing service and submit personal information.

8. Notification and Amendment

We may revise the terms of this policy in due course, and such revisions form part of this policy. For major changes, we will provide more noticeable notifications. If you do not agree with the changes, you can choose to stop using the Authing service; if you continue to use the Authing service, you agree to be bound by this revised policy.

We encourage you to review our privacy policy every time you use the Authing service.

We may issue service-related announcements when necessary (for example, when we suspend a certain service due to system maintenance). You may not be able to cancel these service-related announcements that are not promotional in nature.

Finally, you must keep your account and password information confidential. In any case, please keep it carefully and properly.

9. Application of law and jurisdiction

If there is a dispute, the two parties will resolve the dispute through negotiation; if the two parties cannot resolve the dispute through negotiation, both parties agree that the China International Economic and Trade Arbitration Commission ("CIETAC") will conduct arbitration in Beijing, China in accordance with CIETAC's effective arbitration rules and applicable laws. The language of the arbitration It is in Chinese and will be heard by 3 arbitrators.

10. How to contact us

The contact address of Beijing Steamory Technology Co., Ltd. is: Floor 16, Block B, Beichen Century Center, Chaoyang District, Beijing. We will protect your personal information in accordance with this policy.

We have designated personal information protection personnel, if you have complaints and reports about personal information security, or you have any questions, comments or suggestions about this policy, your personal information related matters, and privacy measures related to this policy or Authing If you have any questions, please contact us: Tel: 400-6197-031; Email address: sales@authing.com.

Under normal circumstances, we will reply within fifteen days from the date of receiving your questions, comments or suggestions.