Authing 隐私政策 / Authing Privacy Policy

Authing 隐私政策

本版更新日期:2021 年 12 月 10 日

欢迎使用北京蒸汽记忆科技有限公司(下称" Authing ")提供的产品和服务! Authing (或简称"我们")深知个人信息对您的重要性,我们一向庄严承诺保护使用我们的产品和服务(以下统称" Authing 服务")之用户(以下统称"用户"或"您")的个人信息及隐私安全。您在使用 Authing 服务时,我们可能会收集和使用您的相关个人信息(或简称"个人信息")。 《 Authing 隐私政策》(以下简称"本政策")适用于我们提供的 Authing 服务, 未满十八周岁的用户,请在法定监护人的陪同下阅读本政策,并特别注意未成年人使用条款。特别地,如果您是未满 14 周岁的儿童,还应请您的监护人仔细阅读本政策,经监护人同意后,您方可使用 Authing 服务。 我们希望通过本政策向您说明我们在收集和使用您相关个人信息时对应的处理规则,以及我们为您提供的访问、更正、删除和保护这些个人信息的方式,以便更好的保障您的权益。

适用范围:(a)在您使用 Authing 服务,或访问 Authing 服务相关的网页时, Authing 自动接收并记录的您的浏览器和计算机上的信息,包括但不限于您的 IP 地址、浏览器的类型、使用的语言、访问日期和时间、软硬件特征信息及您需求的网页记录等数据;(b) Authing 通过合法途径从商业伙伴处取得的用户个人数据。

您了解并同意,以下信息不适用本隐私权政策:(a)在使用 Authing 服务提供的搜索服务时输入的关键字信息;(b) Authing 收集到的您在 Authing 服务发布的有关信息数据,包括但不限于参与活动、成交信息及评价详情;(c)违反法律规定或违反 Authing 服务规则行为及 Authing 已对您采取的措施。

本政策将帮助您了解以下内容:

一、我们如何收集和使用您的个人信息

二、我们如何使用 Cookies 或同类技术

三、我们可能共享、转让和披露的个人信息

四、我们如何保留、储存和保护您的个人信息安全

五、如何管理您的个人信息

六、第三方服务

七、未成年人保护

八、通知和修订

九、法律适用与管辖

十、如何联系我们

【特别提示】请您在使用 Authing 服务前,仔细阅读(未成年人请在监护人陪同下阅读)并了解本政策(特别是加粗或下划线标注的内容),以做出适当选择。一旦您使用或在我们更新本政策后继续使用我们的产品或服务,即意味着您同意本政策并同意我们按照本政策处理您的相关个人信息。

本政策适用于 Authing 服务,如与 Authing 与您之间的《专业服务合同》同类条款之约定存在不一致的,以本政策为准。如我们提供的某一单项服务不适用本政策的,该服务中会以适当方式明示排除适用本政策。

一、我们如何收集和使用您的个人信息

我们收集您的个人信息主要是为了您和其他用户能够更容易和更满意地使用 Authing 服务。而这些个人信息有助于我们实现这一目标。

(一)我们将通过以下途径收集和获得您的个人信息:

1、您提供的个人信息。

(1)您在注册 Authing 服务的帐号或使用 Authing 服务时,向我们提供的个人信息,包括您的手机号码,并且您可以自愿选择填写您的昵称、头像、性别、年龄、学历、学校、身份证号码、收件人姓名、收件人联系方式、收货地址基本信息。如果您仅需使用浏览、了解 Authing ,您不需要注册账户及提供上述信息。如果您不提供这些信息,并不会影响您使用 Authing 的基本功能;

(2)您通过 Authing 服务向其他方提供的共享个人信息,以及您使用 Authing 服务时所储存的个人信息。

请注意,如您在 Authing 服务中其他用户可见的公开区域内上传或发布的个人信息中、您对其他人上传或发布的信息作出的回应中公开您的个人信息,该等个人信息可能会被他人收集并加以使用,只要您不删除您所公开或共享的个人信息,有关个人信息可能一直留存在公众领域;即使您删除共享个人信息,有关个人信息仍可能由其他用户或不受我们控制的第三方独立地缓存、复制或储存,或由其他用户或该等第三方在公众领域保存。如您将个人信息通过上述渠道公开或共享,由此造成您的个人信息泄露,我们不承担责任。因此,我们提醒并请您慎重考虑是否通过上述渠道公开或共享您的个人信息。当您发现他人不正当地收集或使用您的个人信息时,您可以通过本政策第九条【如何联系我们】约定的联系方式联络我们。

2、其他方分享的您的个人信息。亦即其他方使用 Authing 服务时所提供有关您的共享个人信息。

3、我们获取的您的个人信息。您在使用 Authing 服务时,我们收集、汇总、记录的个人信息。

(二)我们会出于以下目的,收集和使用您以下类型的个人信息:

1、帮助您完成注册、登录及注销

为便于我们为您提供完整的 Authing 服务,您需要提供基本注册或登录个人信息,包括使用手机号码注册登录或提供第三方账号登录 Authing 。如果您仅需使用浏览、查询、搜索等基本服务,您不需要注册成为 Authing 用户及提供上述个人信息。

2、客服与售后

依照相关法律法规规定及监管要求,或当您与我们联系时,我们的客服或售后可能会需要您提供真实身份信息(姓名、身份证)和账号信息以核验您的身份,以便帮助您问题,或记录相关问题的处理方案及结果。

请注意,您的身份信息属于个人敏感信息,请您谨慎提供,如果拒绝提供您将可能无法获得相关服务,但不影响其他功能与服务的正常使用。

3、维护基础功能的正常运行

在您使用我们服务过程中,为识别账号异常状态、了解产品适配性,向您提供浏览、搜索、注册/登录、查看和编辑个人资料、购买服务/产品、支付的服务,维护基础功能的正常运行,我们可能会自动收集、储存关于您使用的服务以及使用方式的信息并将这些信息进行关联,这些信息包括:

(1)日志信息:当您使用我们的服务时,我们可能会自动收集您对我们服务的详细使用情况,作为有关网络日志保存。日志信息包括您的登录账号、搜索查询内容、IP 地址、浏览器的类型、电信运营商、网络环境、使用的语言、访问日期和时间及您访问的网页浏览记录、Push 打开记录、崩溃记录、停留时长、刷新记录、发布记录、关注、订阅、收藏及分享。

(2)设备信息:我们可能会根据您在软件安装及使用中授予的具体权限,接收并记录您所使用的设备相关信息(包括设备标识符( IMEI / MAC / OPEN UDID )、Serial、SIM 卡 IMSI 识别码、设备机型、操作系统及版本、客户端版本、设备分辨率、包名、设备设置、进程及软件列表、Android ID、IDFA、UUID、软硬件特征信息)、设备所在位置相关信息(包括 IP 地址、GPS 位置以及能够提供相关个人信息的 WLAN 接入点、蓝牙和基站传感器信息)。

同时为了收集上述基本的个人设备信息,我们将会申请访问您的设备信息的权限,我们收集这些信息是为了向您提供我们基本服务和基础功能,如您拒绝提供上述权限将可能导致您无法使用我们的产品与服务。

请注意,单独的设备信息、日志信息是无法识别特定自然人身份的个人信息。如果我们将这类非个人信息与其他个人信息结合用于识别特定自然人身份,或者将其与个人信息结合使用,则在结合使用期间,这类非个人信息将被视为个人信息,除取得您授权或法律法规另有规定外,我们会将该类个人信息做匿名化、去标识化处理。这些信息在结合使用期间,将作为您的个人信息按照本隐私政策处理与保护。

4、向您提供商品或服务

(1)个人信息的分享与发布:您在使用 Authing 服务时、上传和/或发布个人信息以及进行相关行为时,我们将收集您上传、发布或形成的个人信息,并有权展示您的昵称、头像和发布内容。

(2)商品或服务交付:当您在我们的商品或服务中订购具体商品或服务时,我们会通过系统为您生成购买该商品或服务的订单。为便于向您交付您在 Authing 购买的商品或服务,您可能需提供收货人个人身份信息、姓名、购买者主体及相关信息、订购人、联系电话、支付状态信息。如果您拒绝提供此类个人信息,我们将无法完成相关交付服务。如您通过 Authing 服务为其他人订购商品或服务,您需要提供该实际订购人的前述个人信息。向我们提供该实际订购人的前述个人信息之前,您需确保您已经取得其授权同意。

在您使用 Authing 服务时, Authing 将会收集、储存您上传的图片、语音信息,我们的相关识别程序会对这些数据进行处理分析。

(3)为完成订单支付、交付商品或服务、确认交易状态及为您提供售后与争议解决服务,我们会通过您基于交易所选择的交易对象、支付机构、物流公司等收集与交易进度相关的您的账号、订单、交易、支付、物流信息,或将您的交易信息共享给上述服务提供者。

(4)订单管理:为展示您的账户的订单信息及保障您的售后权益, Authing 会收集您在使用 Authing 过程中产生的订单信息、交易和消费记录用于向您展示及便于您对订单进行管理。

(5)客服与售后服务:当您联系我们的客服或使用其他用户响应功能时(包括提出售中售后申请、个人信息保护投诉或建议、其他客户投诉和需求),我们可能需要您提供必要的个人信息以匹配并核验您的用户身份,以便保障您的账号与系统安全。我们可能还会保存您的联系方式(您与我们联系时使用的或您向我们主动提供的其他联系方式)、您与我们的通信/通话记录和内容、与您需求相关联的其他必要信息,以便与您联系或帮助您解决问题,或记录相关问题的处理方案及结果。

5、我们通过间接方式收集到的您的个人信息:

我们可能从管理关联方、第三方合作伙伴获取您授权共享的相关个人信息。我们可能从第三方获取您授权共享的账户信息(头像、昵称、登录时间)并在您同意本政策后将您的第三方账户与您的 Authing 服务账户绑定,使您可以通过第三方账户直接登录并使用我们的产品与/或服务。我们将在符合相关法律法规规定,并依据与关联方或第三方合作伙伴的约定、确信其提供的个人信息来源合法的前提下,收集并使用您的这些个人信息。

6、向您发送通知

我们可能在必需时(例如当我们由于系统维护而暂停某一单项服务、变更、终止提供某一单项服务时)向您发出与服务有关的通知。

如您不希望继续接收我们推送的消息,您可要求我们停止推送,例如:根据短信退订指引要求我们停止发送推广短信,或在移动端设备中进行设置,不再接收我们推送的消息;但我们依法律规定或服务协议约定发送消息的情形除外。

7、为您提供安全保障

为提高您使用我们及合作伙伴提供服务的安全性,保护您或其他用户或公众的人身财产安全免遭侵害,更好地预防钓鱼网站、欺诈、网络漏洞、计算机病毒、网络攻击、网络侵入等安全风险,更准确地识别违反法律法规或 Authing 服务相关协议规则的情况,我们可能会收集、使用或整合您的账户信息、交易信息、设备信息、日志信息以及我们关联公司、合作伙伴取得您授权或依据法律共享的个人信息,来综合判断您账户及交易风险、进行身份验证、检测及防范安全事件,并依法采取必要的记录、审计、分析、处置措施。

8、其他

您了解并同意,在收集您的个人信息后,我们可能通过技术手段对数据进行去标识化处理,去标识化处理的信息将无法识别您的身份,在此情况下我们有权使用已经去标识化的信息,对用户数据库进行分析并予以商业化的利用,而无需另行获得您的同意。

请您注意,如果我们要将您的个人信息用于本政策中未载明的其他用途或额外收集未提及的其他个人信息,我们会另行事先请您同意(确认同意的方式:勾选、弹窗、站内信、邮件、短信方式)。一旦您同意,该等额外用途将视为本政策的一部分,该等额外个人信息也将适用本政策。

如果我们要将您的个人信息用于本政策中未载明的其他用途或额外收集未提及的其他个人信息,我们会依法通过页面提示、交互流程、网站公告或其他方式另行征得您的同意。在此过程中,您可通过本政策第九条【如何联系我们】约定的联系方式联络我们。

9、征得授权同意的例外

根据相关法律法规规定,以下情形中收集您的个人信息无需征得您的授权同意:

(1)与个人信息控制者履行法律法规规定的义务相关的;

(2)与国家安全、国防安全直接相关的;

(3)与公共安全、公共卫生、重大公共利益直接相关的;

(4)与刑事侦查、起诉、审判和判决执行等直接相关的;

(5)出于维护个人信息主体或其他个人的生命、财产等重大合法权益但又很难得到本人授权同意的;

(6)所涉及的个人信息是个人信息主体自行向社会公众公开的;

(7)根据个人信息主体要求签订和履行合同所必需的;

(8)从合法公开披露的信息中收集个人信息的,如合法的新闻报道、政府信息公开等渠道;

(9)维护所提供产品或服务的安全稳定运行所必需的,如发现、处置产品或服务的故障;

10、您理解并同意, Authing 服务可能需要您在您的设备中开启特定的访问权限,以实现这些权限所涉及个人信息的收集和使用:

(1)如我们访问您的摄像头,是为了使您可以使用摄像头进行扫码、拍摄,用于实现登录、使用"拍照"功能支付、图片评论、拍照取词、拍照翻译及上传头像;

(2)如我们访问您的相册,是为了使您可以实现您设备中的照片、图片或视频的取用与上传、发表评论/分享、使用相册中的图片上传头像;

(3)如我们访问您的存储,是为了使您可以实现裁剪头像图片、崩溃日志查询等功能;

(4)如我们访问您的麦克风,是为了使您可以实现语音翻译功能、语音评论、与客服实现语音交互以及语音教学交互功能,在这些功能中我们会收集您的录音内容以识别您的具体需求。

(5)如我们访问您的浏览器,是为了使您可以实现“自动登录”等功能,在这些功能中我们将收集您浏览器的相关数据以识别具体需求。

当您需要关闭该功能时,大多数移动设备都会支持您的这项需求,具体方法请参考或联系您移动设备的服务商或生产商。请您注意,您开启任一权限即代表您授权我们可以收集和使用相关个人信息来为您提供对应服务,您一旦关闭任一权限即代表您取消了授权,我们将不再基于对应权限继续收集和使用相关个人信息,也无法为您提供该权限所对应的服务。但是,您关闭权限的决定不会影响您使用已授权其他权限的功能,以及此前基于您的授权所进行的个人信息收集及使用。

11、有关个人敏感信息的提示

以上由您提供或我们收集您的个人信息中,可能包含您的个人敏感信息,包括银行账号、交易和消费记录、虚拟财产信息、系统账号、邮箱地址及其有关的密码、电话号码、网页浏览记录、位置信息。请您谨慎并留意个人敏感信息,您同意您的个人敏感信息我们可以按本政策所述的目的和方式来处理。

二、我们如何使用 Cookies 或同类技术

(一) Cookies

我们或我们的第三方合作伙伴可能通过 Cookies 获取和使用您的个人信息,并将该等个人信息储存为日志信息。

通过使用 Cookies ,我们向您提供简单易行并富个性化的网络体验。一个 Cookies 是少量的数据,它们从一个网络服务器送至您的浏览器并存在计算机硬盘上。我们使用 Cookies 是为了让您可以受益。比如,为使得 Authing 的登录过程更快捷,您可以选择把用户名存在一个 Cookies 中。这样下次当您要登录 Authing 的服务时能更加方便快捷。Cookies 能帮助我们确定您连接的页面和内容,您在 Authing 特定服务上花费的时间和您所选择的 Authing 服务。

Cookies 使得我们能更好、更快地为您服务,并且使您在 Authing 服务上的经历更富个性化。然而,您应该能够控制 Cookies 是否以及怎样被你的浏览器接受。请查阅您的浏览器附带的文件以获得更多这方面的信息。

我们和第三方合作伙伴可能通过 Cookies 收集和使用您的个人信息,并将该等个人信息储存。

我们使用自己的 Cookies ,可能用于以下用途:

(1)记住您的身份。Cookies 有助于我们辨认您作为我们的注册用户的身份,或保存您向我们提供有关您的喜好或其他个人信息;

(2)分析您使用我们服务的情况。我们可利用 Cookies 来了解您使用 Authing 服务进行什么活动、或哪些服务或服务最受欢迎;

(3)广告优化。 Cookies 有助于我们根据您的个人信息,向您提供与您相关的广告而非进行普遍的广告投放。

我们为上述目的使用 Cookies 的同时,可能将通过 Cookies 收集的非个人身份信息汇总提供给广告商和其他伙伴,用于分析您和其他用户如何使用 Authing 服务并用于广告服务。

Authing 服务上可能会有广告商和其他合作方放置的 Cookies 。这些 Cookies 可能会收集与您相关的非个人身份信息,以用于分析用户如何使用该等服务、向您发送您可能感兴趣的广告,或用于评估广告服务的效果。这些第三方 Cookies 收集和使用该等个人信息不受本政策约束,而是受到其自身的个人信息保护声明约束,我们不对第三方的 Cookies 承担责任。

您可以通过浏览器或用户选择机制拒绝或管理 Cookies 。但请您注意,如果您停用 Cookies ,我们有可能无法为您提供最佳的服务体验,某些服务也可能无法正常使用。同时,您仍然将收到广告,只是这些广告与您的相关性会降低。

(二)网站信标和像素标签

除 Cookies 外,我们还会在网站上使用网站信标和像素标签等其他同类技术。例如,我们向您发送的电子邮件可能含有链接至我们网站内容的地址链接,如果您点击该链接,我们则会跟踪此次点击,帮助我们了解您的产品或服务偏好以便于我们主动改善客户服务体验。网站信标通常是一种嵌入到网站或电子邮件中的透明图像。借助于电子邮件中的像素标签,我们能够获知电子邮件是否被打开。如果您不希望自己的活动以这种方式被追踪,则可以随时从我们的寄信名单中退订。

三、我们可能共享、转让或披露的个人信息

(一)共享

您同意我们依据本政策向我们的关联方或相关法人团体、与我们合作的一些商业合作伙伴(合称"信息接收方")共享您的个人信息。我们将积极帮助您了解信息接收方对个人信息的存储、使用等情况,以及您享有的访问、更正、删除、注销账户等权利。除以下情形外,未经您同意,我们不会与我们及我们的信息接收方之外的任何第三方共享您的个人信息:

1、向您提供我们的服务。我们可能向信息接收方共享您的个人信息,以实现您需要的核心功能或提供您需要的服务;

2、维护和改善我们的服务。我们可能向信息接收方共享您的个人信息,以帮助我们为您提供更有针对性、更完善的服务,例如:代表我们发出电子邮件或推送通知的通讯服务提供商;

3、实现本政策第一条"我们如何收集和使用您的个人信息"部分所述目的;

4、履行我们在本政策或我们与您达成的其他协议中的义务和行使我们的权利;

5、向委托我们进行推广的信息接收方共享,目的是为了使该等委托方了解推广的覆盖面和有效性。比如我们可以告知该委托方有多少人看了他们的推广信息或在看到这些信息后购买了委托方的商品,或者向他们提供不能识别个人身份的统计信息,帮助他们了解其受众或顾客。

6、在法律法规允许的范围内,为了遵守法律、维护我们及我们的关联方或合作伙伴、您或其他 Authing 用户或社会公众利益、财产或安全免遭损害,比如为防止欺诈等违法活动和减少信用风险,我们可能与其他公司和组织交换个人信息。不过,这并不包括违反本政策中所作的承诺而为获利目的出售、出租、共享或以其它方式披露的个人信息。

7、应您合法需求,协助处理您与他人的纠纷或争议;

8、应您的监护人合法要求而提供您的个人信息;

9、根据与您签署的服务协议(包括在线签署的电子协议以及相应的平台规则)或其他的法律文件约定所提供;

10、基于学术研究而提供;

11、基于符合法律法规的社会公共利益而提供。

我们仅会出于合法、正当、必要、特定、明确的目的共享您的个人信息。对我们与之共享个人信息的公司、组织和个人,我们会与其签署严格的保密协定,要求他们按照我们的说明、本政策以及其他任何相关的保密和安全措施来处理个人信息。

(二)转让

1、随着我们业务的持续发展,我们有可能进行合并、收购、资产转让或类似的交易,而您的个人信息有可能作为此类交易的一部分而被转移。我们会要求新的持有您个人信息的公司、组织继续受本政策的约束,否则,我们将要求该公司、组织重新向您征求授权同意。

2、在获得您的明确同意后,我们会向其他方转让您的个人信息。

(三)披露

我们仅会在以下情况下,且采取符合业界标准的安全防护措施的前提下,才会披露您的个人信息:

1、根据您的需求,在您明确同意的披露方式下披露您所指定的个人信息;

2、根据法律、法规的要求、强制性的行政执法或司法要求所必须提供您个人信息的情况下,我们可能会依据所要求的个人信息类型和披露方式披露您的个人信息。在符合法律法规的前提下,当我们收到上述披露个人信息的请求时,我们会要求接收方必须出具与之相应的法律文件,如传票或调查函。我们坚信,对于要求我们提供的个人信息,应该在法律允许的范围内尽可能保持透明。我们对所有的请求都进行了慎重的审查,以确保其具备合法依据,且仅限于执法部门因特定调查目的且有合法权利获取的数据。

(四)共享、转让、披露个人信息时事先征得授权同意的例外

以下情形中,共享、转让、公开披露您的个人信息无需事先征得您的授权同意:

1、与个人信息控制者履行法律法规规定的义务相关的;

2、与国家安全、国防安全有关的;

3、与公共安全、公共卫生、重大公共利益有关的;

4、与刑事侦查、起诉、审判和判决执行等司法或行政执法有关的;

5、出于维护您或其他个人的生命、财产等重大合法权益但又很难得到本人同意的;

6、您自行向社会公众公开的个人信息;

7、从合法公开披露的信息中收集个人信息的,如合法的新闻报道、政府信息公开等渠道。

根据法律规定,共享、转让经去标识化处理的个人信息,且确保数据接收方无法复原并重新识别个人信息主体的,不属于个人信息的对外共享、转让及公开披露行为,对此类数据的保存及处理将无需另行向您通知并征得您的同意。

四、我们如何保留、储存和保护您的个人信息安全

(一)我们仅在本政策所述目的所必需期间和法律法规及监管规定的时限内保存您的个人信息, Authing 判断前述期限的标准包括:

1、完成与您相关的交易目的、维护相应交易及业务记录、应对您可能的查询或投诉;

2、保证 Authing 为您提供服务的安全和质量;

3、您是否同意更长的留存期间;

4、是否存在保留期限的其他特别约定。

在您的个人信息超出保留期间后, Authing 会根据适用法律的要求删除您的个人信息,或使其匿名化处理(如您为未成年人,在您的个人信息超出保留期间后, Authing 会按照相关法律法规要求对您的个人信息进行相应处理)。如因特殊情形无法按照相关要求删除的,平台将对该部分事项向您进行说明。

如我们终止服务或运营,我们将及时停止继续收集您个人信息的活动,同时会遵守相关法律法规要求提前向您通知,并在终止服务或运营后对您的个人信息进行删除或匿名化处理,法律法规或监管部门另有规定的除外。

(二)我们在中华人民共和国境内运营中收集和产生的个人信息,存储在中国境内。以下情形除外:

1、法律法规有明确规定;

2、获得您的授权同意;

3、您使用的产品、服务涉及跨境,我们需要向境外提供您的个人信息的。

针对以上情形,我们会确保依据本政策及国家法律法规要求对您的个人信息提供足够的保护。

(三)我们非常重视个人信息安全,指定了特定人员,并采取一切合理可行的措施,保护您的个人信息:

1、数据安全技术措施

我们会采用符合业界标准的安全防护措施,包括建立合理的制度规范、安全技术来防止您的个人信息遭到未经授权的访问使用、修改,避免数据的损坏或丢失。网络服务采取了多种加密技术,例如在某些服务中,我们将利用加密技术来保护您的个人信息,采取加密技术对您的个人信息进行加密保存,并通过隔离技术进行隔离。在个人信息使用时,例如个人信息展示、个人信息关联计算,我们会采用多种数据脱敏技术增强个人信息在使用中的安全性。采用严格的数据访问权限控制和多重身份认证技术保护个人信息,避免数据被违规使用。

2、我们为保护个人信息采取的其他安全措施

(1)我们通过建立数据分类分级制度、数据安全管理规范、数据安全开发规范来管理规范个人信息的存储和使用。

(2)我们通过个人信息接触者保密协议、监控和审计机制来对数据进行全面安全控制。

(3)我们还会举办安全和隐私保护培训课程,加强员工对于保护个人信息重要性的认识和安全意识。

(4)我们仅允许有必要知晓这些个人信息的我们及我们关联方的员工、合作伙伴访问您的个人信息,并为此设置了严格的访问权限控制和监控机制。我们同时要求可能接触到您的个人信息的所有人员履行相应的保密义务。如果未能履行这些义务,可能会被追究法律责任或被中止与我们的合作关系。

3、互联网并非绝对安全的环境,而且电子邮件、即时通讯、社交软件或其他服务软件等与其他用户的交流方式无法确定是否完全加密,我们建议您使用此类工具时请使用复杂密码,并注意保护您的个人信息安全。

4、我们将尽力确保或担保您发送给我们的任何个人信息的安全性。如果我们的物理、技术、或管理防护设施遭到破坏,导致个人信息被非授权访问、公开披露、篡改、或毁坏,导致您的合法权益受损,我们将承担相应的法律责任。

(四)安全事件处置

在不幸发生个人信息安全事件后,我们将按照法律法规的要求,及时向您告知:安全事件的基本情况和可能的影响、我们已采取或将要采取的处置措施、您可自主防范和降低风险的建议、对您的补救措施等。我们同时将及时将事件相关情况以邮件、信函、短信、电话、推送通知等方式告知您,难以逐一告知个人信息主体时,我们会采取合理、有效的方式发布公告。同时,我们还将按照监管部门要求,主动上报个人信息安全事件的处置情况。

请您理解,由于技术的限制以及风险防范的局限,即便我们已经尽量加强安全措施,也无法始终保证个人信息百分之百的安全。您需要了解,您接入 Authing 服务所用的系统和通讯网络,有可能因我们可控范围外的情况而发生问题。

五、如何管理您的个人信息

我们鼓励您更新和修改您的个人信息以使其更准确有效,也请您理解,您更正、删除、撤回授权或停止使用 Authing 服务的决定,并不影响我们此前基于您的授权而开展的个人信息处理。

您可以通过以下方式来管理您的个人信息:

(一)访问您的个人信息

1、账户个人信息:如果您希望访问您的账户中的个人基本个人信息(包括头像、昵称、生日、公司、地址等),您可以登录账号通过"个人中心"进行访问。

2、订单个人信息:您可以在"控制台-费用管理-订单信息"查看您的所有订单状态。

(二)更正您的个人信息

如果您希望更正您的账户中的个人基本个人信息(包括头像、昵称、手机号等),您可以登录账号在"个人中心"进行修改。

(三)删除您的个人信息

您可以通过"(一)访问、更正您的个人信息"中列明的方式自主删除您的部分个人信息。在部分个人信息删除时,我们可能会要求您进行身份验证,以保障个人信息安全。

在以下情形中,您可以向我们提出删除个人信息的请求:

1、如果我们处理个人信息的行为违反法律法规;

2、如果我们收集、使用您的个人信息,却未征得您的授权同意;

3、如果我们处理个人信息的行为严重违反了与您的约定;

4、如果我们不再为您提供 Authing 服务。

若我们决定响应您的删除请求,我们还将同时尽可能通知从我们处获得您的个人信息的实体,要求其及时删除,除非法律法规另有规定,或这些实体获得您的独立授权。

(四)改变您授权同意的范围

您总是可以选择是否披露个人信息。有些个人信息是使用 Authing 服务所必需的,但大多数其他个人信息的提供是由您决定的。您可以通过"本条(一)访问、更正您的个人信息"中列明的方式"删除个人信息、关闭设备功能或注销账号等方式改变您授权我们继续收集个人信息的范围或通过本政策第九条【如何联系我们】约定的联系方式联络我们撤回您的授权,一般情况下,我们将在十五天内予以回复。

(五)注销您的账号

如果您不再使用 Authing 服务,在符合服务协议约定条件及国家相关法律法规规定的情况下,您可以通过登录" Authing "-"个人中心"-"安全等级"-"账号注销"所示的流程或本政策第九条【如何联系我们】约定的联系方式联络我们注销您的账号,一般情况下,我们将在十五个工作日内为您注销账号,届时我们将停止为您提供 Authing 服务。当您的帐号注销或被删除后,与该帐号相关的 Authing 服务项下的全部服务资料和数据将被删除或匿名化处理,但法律法规另有规定的除外。

(六)获取个人信息副本:您可以通过邮箱 sales@authing.com 服务渠道联系我们并且告知我们您想要获取您的个人信息副本,一般情况下,我们将在收到您的问题之日起十五天内予以回复。

(七)响应您的上述请求

为保障安全,您可能需要提供书面请求,或以其他方式证明您的身份。我们可能会先要求您验证自己的身份,然后再处理您的请求。对于您合理的请求,我们原则上不收取费用,但对多次重复、超出合理限度的请求,我们将视情收取一定成本费用。对于那些无端重复、需要过多技术手段(例如,需要开发新系统或从根本上改变现行惯例)、给他人合法权益带来风险或者非常不切实际(例如,涉及备份磁带上存放的信息)的请求,我们可能会予以拒绝。

在以下情形中,我们将无法响应您的请求:

1、与我们履行法律法规规定的义务相关的;

2、与国家安全、国防安全直接相关的;

3、与公共安全、公共卫生、重大公共利益直接相关的;

4、与刑事侦查、起诉、审判和执行判决等直接相关的;

5、我们有充分证据表明您存在主观恶意或滥用权利的;

6、出于维护您或其他个人的生命、财产等重大合法权益但又很难得到本人同意的;

7、响应您的请求将导致您或其他个人、组织的合法权益受到严重损害的;

8、涉及商业秘密的。

六、第三方服务

Authing 服务可能链接至第三方提供的社交媒体或其他服务(包括网站或其他服务形式)。包括:

(一)您可利用"分享"键将某些 Authing 服务内容分享到第三方服务,或您将第三方服务内容分享到 Authing 。这些功能可能会收集您的信息(包括您的日志信息),并可能在您的电脑装置 Cookies,从而正常运行上述功能;

(二)我们通过广告或我们服务的其他方式向您提供链接,使您可以链接至第三方的服务或网站;

(三)其他接入第三方服务的情形。为实现本政策中声明的目的,我们可能会接入第三方服务商提供的 SDK 或其他类似的应用程序,并将我们依照本政策收集的您的某些信息共享给该等第三方服务商,以便提供更好的客户服务和用户体验。目前,我们接入的第三方服务商主要包括以下几种类型:

(1)用于广告相关服务,包括广告展示、广告数据监测/统计等;

(2)用于消息推送功能,包括手机厂商 Push 推送、特定事件提醒等;

(3)用于支付相关服务,包括订单支付、交易行为核验、收入结算、支付信息汇总统计等;

(4)用于在您同意的情况下获取设备位置权限、搜集设备信息和日志信息等;

(5)用于第三方授权服务,包括第三方帐号登陆、将有关内容分享至第三方产品等;

(6)用于支持产品功能模块,包括在线直播、视频播放、语音识别、智能客服、内容存储等;

我们接入的部分第三方 SDK 或类似应用程序可能会收集您的个人信息,如您在我们的服务中使用这类由第三方提供的服务时,您同意将由其直接收集和处理您的信息。我们会评估这类第三方服务收集个人信息的合法性、正当性、必要性,要求该等第三方对您的个人信息采取保护措施,并严格遵守相关法律法规与监管要求。您也可以选择通过本政策"如何联系我们"章节所列的反馈渠道联系我们,我们会尽快为您作出解答。

如上所述服务由相关的第三方负责运营。您使用该等第三方服务(包括您向该等第三方提供的任何个人信息),须受第三方自己的服务条款及个人信息保护声明(而非本政策)约束,您需要仔细阅读其条款。我们仅会出于正当、必要、特定的目的共享您的信息。我们会要求他们履行相关保密义务并采取相应的安全措施。

七、未成年人保护

如您为未满 18 周岁的未成年人的,请务必让您的监护人仔细阅读本政策,并在征得您的监护人同意的前提下使用我们的服务或向我们提供个人信息。我们将根据国家相关法律法规的规定保护未成年人的相关个人信息。如监护人发现相关未成年人个人信息为未成年人自行填写,需要进行修改或删除处理的,请随时与我们联系。

特别地,若您是 14 周岁以下的儿童,请您通知您的监护人,并在您使用 Authing 服务、提交个人信息之前,寻求其同意和指导。

八、通知和修订

我们可能适时修改本政策的条款,该等修改构成本政策的一部分。对于重大变更,我们会提供更显著的通知,您如果不同意该等变更,可以选择停止使用 Authing 服务;如您仍然继续使用 Authing 服务的,即表示同意受经修订的本政策的约束。

我们鼓励您在每次使用 Authing 服务时都查阅我们的隐私政策。

我们可能在必需时(例如当我们由于系统维护而暂停某一项服务时)发出与服务有关的公告。您可能无法取消这些与服务有关、性质不属于推广的公告。

最后,您必须对您的账号和密码信息负有保密义务。任何情况下,请小心妥善保管。

九、法律适用与管辖

如果出现纠纷,双方协商一致解决;如果双方无法通过协商解决争端,则双方同意由中国国际经济贸易仲裁委员会(简称" CIETAC ")根据 CIETAC 有效的仲裁规则以及适用法律在中国北京进行仲裁,仲裁语言为中文,并由3名仲裁员进行审理。

十、如何联系我们

北京蒸汽记忆科技有限公司的联系地址为:北京市朝阳区北辰世纪中心 B 座 16 层。我们将按照本政策保护您的个人信息。

我们指定了个人信息保护专门人员,如您有关于个人信息安全的投诉和举报,或您对本政策、您的个人信息的相关事宜有任何问题、意见或建议,以及有关本政策或 Authing 的隐私措施的问题,请与我们联系:电话:400-6197-031;邮箱地址: sales@authing.com 。

一般情况下,我们将在收到您的问题、意见或建议之日起十五天内予以回复。

Authing Privacy Policy

Update date: December 10, 2021

Welcome to use the products and services provided by Beijing Steamory Technology Co., Ltd. (hereinafter referred to as "Authing"). Authing (or "we" for short) is well aware of the importance of personal information to you, and we have always solemnly promised to protect users who use our products and services (hereinafter collectively referred to as "Authing services") (hereinafter collectively referred to as "users" or "you") Personal information and privacy security. When you use the Authing service, we may collect and use your personal information (or "personal information" for short). "Authing Privacy Policy" (hereinafter referred to as "this policy") applies to the Authing service we provide. Users under the age of 18, please read this policy with a legal guardian, and pay special attention to the terms of use for minors. In particular, if you are a child under the age of 14, you should also ask your guardian to read this policy carefully, and you can use the Authing service only with the consent of the guardian. We hope to use this policy to explain to you the corresponding processing rules when we collect and use your personal information, as well as the ways we can provide you with access, correction, deletion and protection of this personal information, so as to better protect your rights and interests .

Scope of application: (a) When you use the Authing service or visit the webpage related to the Authing service, Authing automatically receives and records the information on your browser and computer, including but not limited to your IP address and browser type , The language used, the date and time of the visit, the software and hardware feature information, and the webpage records you need; (b) Authing obtains user personal data from business partners through legal means.

You understand and agree that the following information does not apply to this privacy policy: (a) Keyword information entered when using the search service provided by the Authing service; (b) The relevant information and data collected by Authing that you publish on the Authing service, including But it is not limited to participation in activities, transaction information and evaluation details; (c) Violation of legal provisions or violations of Authing service rules and the measures Authing has taken against you.

This policy will help you understand the following:

1. How we collect and use your personal information

2. How do we use Cookies or similar technologies

3. Personal information that we may share, transfer and disclose

4. How do we keep, store and protect the security of your personal information

5. How to manage your personal information

6. third-party services

7. Protection of minors

8. Notice and Amendment

9. Application of Law and Jurisdiction

10. How to contact us

【Special Reminder】 Please read carefully before using the Authing service (minors, please read it with a guardian) and understand this policy (especially the content marked in bold or underlined) to make an appropriate choice. Once you use or continue to use our products or services after we update this policy, it means that you agree to this policy and agree that we process your personal information in accordance with this policy.

This policy applies to Authing services. If there is any inconsistency with the similar terms of the "Professional Service Contract" between Authing and you, this policy shall prevail. If a single service we provide does not apply to this policy, the service will expressly exclude the application of this policy in an appropriate manner.

1. How we collect and use your personal information:

We collect your personal information mainly for you and other users to use the Authing service more easily and satisfactorily. And this personal information helps us achieve this goal.

A. We will collect and obtain your personal information through the following channels:

a. The personal information you provide.

ⅰ. The personal information you provide to us when you register for the Authing service account or use the Authing service, including your mobile phone number, and you can voluntarily choose to fill in your nickname, profile picture, gender, age, education, school, identity Certificate number, recipient’s name, recipient’s contact information, and basic information about the delivery address. If you only need to browse and understand Authing, you do not need to register an account and provide the above information. If you do not provide this information, it will not affect your use of the basic functions of Authing;

ⅱ. The shared personal information you provide to other parties through the Authing service, and the personal information stored when you use the Authing service.

Please note that if you upload or publish your personal information in a public area visible to other users in the Authing service, or disclose your personal information in your response to information uploaded or published by others, such personal information may be Collected and used by others, as long as you do not delete the personal information that you have disclosed or shared, the relevant personal information may remain in the public domain; even if you delete the shared personal information, the relevant personal information may still be owned by other users or not under our control The third party independently caches, copies, or stores, or saves it in the public domain by other users or such third parties. If you disclose or share your personal information through the aforementioned channels, we will not be liable for the leakage of your personal information. Therefore, we remind and ask you to carefully consider whether to disclose or share your personal information through the above channels. When you find that others have improperly collected or used your personal information, you can contact us through the contact information stipulated in Article 9 of this Policy [How to Contact Us].

b. Your personal information shared by other parties. That is, the shared personal information about you provided by other parties when using the Authing service.

c. Your personal information we have obtained. When you use the Authing service, we collect, aggregate, and record personal information.

B. We will collect and use the following types of personal information of you for the following purposes:

a. Help you complete registration, login and logout

In order for us to provide you with a complete Authing service, you need to provide basic registration or login personal information, including using your mobile phone number to register and log in or provide a third-party account to log in to Authing. If you only need to use basic services such as browsing, querying, and searching, you do not need to register as an Authing user and provide the above-mentioned personal information.

b. Customer service and after-sales

In accordance with relevant laws and regulations and regulatory requirements, or when you contact us, our customer service or after-sales service may require you to provide real identity information (name, ID) and account information to verify your identity in order to help you with questions, Or record the solutions and results of related issues.

Please note that your identity information is personally sensitive information. Please provide it with caution. If you refuse to provide it, you may not be able to obtain related services, but it will not affect the normal use of other functions and services.

c. Maintain the normal operation of basic functions

During your use of our services, in order to identify the abnormal status of your account and understand the suitability of the product, provide you with services such as browsing, searching, registering/logging in, viewing and editing personal information, purchasing services/products, and paying, and maintaining basic functions In normal operation, we may automatically collect and store information about the services you use and how you use them and associate these information, including:

ⅰ. Log information: When you use our services, we may automatically collect your detailed usage of our services and save them as relevant web logs. Log information includes your login account, search query content, IP address, browser type, telecom operator, network environment, language used, access date and time, and web browsing records you visit, Push open records, crash records, Stay time, refresh record, publish record, follow, subscribe, favorite and share.

ⅱ. Device information: We may receive and record the device-related information (including device identifiers (IMEI/MAC/OPEN UDID), Serial, SIM card) according to the specific permissions granted by you during software installation and use. IMSI identification code, device model, operating system and version, client version, device resolution, package name, device settings, process and software list, Android ID, IDFA, UUID, software and hardware feature information), information about the location of the device (Including IP address, GPS location, and WLAN access point, Bluetooth and base station sensor information that can provide relevant personal information).

At the same time, in order to collect the above basic personal device information, we will apply for permission to access your device information. We collect this information to provide you with our basic services and basic functions. If you refuse to provide the above permissions, you may be unable to use it. Our products and services.

Please note that separate device information and log information are personal information that cannot identify a specific natural person. If we combine this type of non-personal information with other personal information to identify a specific natural person, or use it in combination with personal information, during the combined use period, this type of non-personal information will be treated as personal information, except for obtaining you Unless otherwise provided by authorization or laws and regulations, we will anonymize and de-identify this type of personal information. During the combined use, this information will be treated and protected as your personal information in accordance with this privacy policy.

d. Provide you with goods or services

ⅰ. Sharing and publishing of personal information: When you use the Authing service, upload and/or publish personal information, and perform related actions, we will collect the personal information you upload, publish or form, and have the right to display your nickname , Avatar and post content.

ⅱ. Delivery of goods or services: When you order specific goods or services from our goods or services, we will generate an order for you to purchase the goods or services through the system. In order to facilitate the delivery to you of the goods or services you have purchased on Authing, you may need to provide the recipient's personal identification information, name, purchaser's subject and related information, orderer, contact number, and payment status information. If you refuse to provide such personal information, we will not be able to complete the relevant delivery services. If you order goods or services for others through the Authing service, you need to provide the aforementioned personal information of the actual orderer. Before providing us with the aforementioned personal information of the actual orderer, you need to ensure that you have obtained his authorization and consent.

When you use the Authing service, Authing will collect and store the pictures and voice information you upload, and our relevant recognition program will process and analyze these data.

ⅲ. In order to complete order payment, deliver goods or services, confirm transaction status, and provide you with after-sales and dispute resolution services, we will collect information related to the transaction progress through the transaction object, payment institution, logistics company, etc. you select based on the exchange. Your account number, order, transaction, payment, logistics information, or share your transaction information with the above-mentioned service providers.

ⅳ. Order management: In order to display the order information of your account and protect your after-sales rights and interests, Authing will collect the order information, transaction and consumption records generated during your use of Authing to show you and facilitate your order processing manage.

ⅴ. Customer service and after-sales service: When you contact our customer service or use other user response functions (including in-sales and after-sales applications, personal information protection complaints or suggestions, other customer complaints and needs), we may need you to provide necessary Personal information is used to match and verify your user identity in order to protect your account and system security. We may also save your contact information (used when you contact us or other contact information you voluntarily provide to us), your communication/call records and content with us, and other necessary information related to your needs, In order to contact you or help you solve the problem, or record the solution and result of the related problem.

e. Your personal information that we have collected indirectly:

We may obtain relevant personal information that you have authorized to share from management affiliates and third-party partners. We may obtain the account information (avatar, nickname, login time) that you authorized to share from a third party and bind your third-party account with your Authing service account after you agree to this policy, so that you can directly use the third-party account Log in and use our products and/or services. We will collect and use your personal information in compliance with relevant laws and regulations, and in accordance with agreements with affiliates or third-party partners, and we are confident that the source of the personal information provided by them is legal.

f. Send you a notice

We may issue service-related notices to you when necessary (for example, when we suspend a single service, change, or terminate the provision of a single service due to system maintenance).

If you do not want to continue to receive our push messages, you can ask us to stop pushing, for example: according to the SMS unsubscription guidelines, ask us to stop sending promotional messages, or set up in the mobile device to no longer receive our push messages; but Except when we send messages in accordance with legal regulations or service agreements.

g. Provide you with security

In order to improve the security of your use of the services provided by us and our partners, protect the personal and property safety of you or other users or the public from infringement, and better prevent phishing websites, fraud, network vulnerabilities, computer viruses, network attacks, network intrusions, etc. Security risks, to more accurately identify violations of laws and regulations or Authing service-related agreement rules, we may collect, use or integrate your account information, transaction information, device information, log information, and our affiliates and partners obtain your authorization Or use personal information shared by law to comprehensively judge your account and transaction risks, conduct identity verification, detect and prevent security incidents, and take necessary recording, auditing, analysis, and disposal measures in accordance with the law.

h. Other

You understand and agree that after collecting your personal information, we may de-identify the data through technical means. The de-identified information will not be able to identify you. In this case, we have the right to use the de-identified The user’s database is analyzed and used commercially without obtaining your consent.

Please note that if we want to use your personal information for other purposes not specified in this policy or collect additional personal information that is not mentioned, we will separately ask you to agree in advance (the way to confirm consent: check, Pop-up window, station letter, mail, short message method). Once you agree, these additional uses will be regarded as part of this policy, and this policy will also apply to such additional personal information.

If we want to use your personal information for other purposes not specified in this policy or collect additional personal information that is not mentioned, we will obtain additional information from you through page prompts, interactive processes, website announcements, or other methods. agree. During this process, you can contact us through the contact information stipulated in Article 9 of this policy [How to Contact Us].

i. Exceptions for obtaining authorization and consent

According to relevant laws and regulations, the collection of your personal information in the following situations does not require your authorization and consent:

ⅰ. It is related to the performance of the obligations stipulated by laws and regulations by the personal information controller;

ⅱ. It is directly related to national security and national defense security;

ⅲ. It is directly related to public safety, public health, and major public interests;

ⅳ. Directly related to criminal investigation, prosecution, trial, and execution of judgments;

ⅴ. In order to protect the life and property of the personal information subject or other individuals, but it is difficult to obtain the authorization and consent of the person;

ⅵ. The personal information involved is disclosed to the public by the subject of personal information on his own initiative;

ⅶ. Necessary for signing and performing contracts according to the requirements of the personal information subject;

ⅷ. Collecting personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels;

ⅸ. Necessary to maintain the safe and stable operation of the products or services provided, such as discovering and disposing of product or service failures;

j. You understand and agree that the Authing service may require you to enable specific access permissions in your device to achieve the collection and use of personal information involved in these permissions:

ⅰ. If we visit your camera, it is for you to use the camera to scan the code and take pictures, which is used to realize login, use the "photograph" function to pay, comment on pictures, take photos with words, take pictures, translate and upload avatars;

ⅱ. If we visit your photo album, it is to enable you to access and upload photos, pictures or videos in your device, post comments/share, and upload avatars using pictures in the photo album;

ⅲ. If we visit your storage, it is to enable you to implement functions such as cropping avatar pictures and querying crash logs;

ⅳ. If we access your microphone, it is to enable you to implement voice translation functions, voice comments, voice interaction with customer service, and voice teaching interaction functions. In these functions, we will collect your recording content to identify your specific need.

ⅴ. If we visit your browser, it is to enable you to realize "automatic login" and other functions. In these functions, we will collect relevant data of your browser to identify specific needs.

When you need to turn off this feature, most mobile devices will support your need. For specific methods, please refer to or contact your mobile device service provider or manufacturer. Please note that if you enable any permission, you authorize us to collect and use relevant personal information to provide you with corresponding services. Once you close any permission, you cancel the authorization, and we will no longer continue to collect based on the corresponding permissions. And the use of related personal information cannot provide you with the services corresponding to this authority. However, your decision to turn off permissions will not affect your use of authorized functions of other permissions, as well as the collection and use of personal information previously based on your authorization.

k. Reminders about personal sensitive information

The above personal information provided by you or collected by us may contain your sensitive personal information, including bank account numbers, transaction and consumption records, virtual property information, system account numbers, email addresses and related passwords, phone numbers, web browsing Record, location information. Please be cautious and pay attention to sensitive personal information. You agree that we can process your sensitive personal information in accordance with the purposes and methods described in this policy.

2. How do we use Cookies or similar technologies

a. Cookies

We or our third-party partners may obtain and use your personal information through Cookies, and store such personal information as log information.

Through the use of Cookies, we provide you with a simple and personalized network experience. A cookie is a small amount of data, which is sent from a web server to your browser and stored on the computer hard drive. We use Cookies to benefit you. For example, in order to make the login process of Authing faster, you can choose to store the user name in a Cookies. This will be more convenient and faster next time you want to log in to the Authing service. Cookies can help us determine the page and content you are connected to, the time you spend on the Authing specific service and the Authing service you choose.

Cookies enables us to serve you better and faster, and makes your experience on the Authing service more personalized. However, you should be able to control whether and how Cookies are accepted by your browser. Please refer to the file attached to your browser for more information on this.

We and third-party partners may collect and use your personal information through Cookies, and store such personal information.

We use our own Cookies, which may be used for the following purposes:

(1) Remember your identity. Cookies helps us to recognize your identity as our registered user, or save your preferences or other personal information about you provided to us;

(2) Analyze your use of our services. We can use Cookies to understand what activities you use Authing services for, or which services or services are most popular;

(3) Advertising optimization. Cookies helps us to provide you with advertisements that are relevant to you based on your personal information instead of general advertising.

While we use Cookies for the above purposes, we may aggregate the non-personally identifiable information collected through Cookies to advertisers and other partners to analyze how you and other users use the Authing service and use it for advertising services.

There may be Cookies placed by advertisers and other partners on the Authing service. These Cookies may collect non-personally identifiable information related to you to analyze how users use these services, send you advertisements that may be of interest to you, or evaluate the effectiveness of advertising services. The collection and use of such personal information by these third-party Cookies is not restricted by this policy, but by their own personal information protection statement. We are not responsible for third-party Cookies.

You can reject or manage Cookies through the browser or user selection mechanism. However, please note that if you disable Cookies, we may not be able to provide you with the best service experience, and some services may not be available normally. At the same time, you will still receive advertisements, but the relevance of these advertisements to you will be reduced.

b. Web beacons and pixel tags

In addition to Cookies, we also use other similar technologies such as web beacons and pixel tags on our website. For example, the email we send you may contain an address link that links to the content of our website. If you click the link, we will track the click to help us understand your product or service preferences so that we can proactively improve customer service Experience. A web beacon is usually a transparent image embedded in a website or email. With the help of the pixel tags in the email, we can know whether the email has been opened. If you do not want your activities to be tracked in this way, you can unsubscribe from our mailing list at any time.

3. Personal information that we may share, transfer or disclose

a. Sharing

You agree that we share your personal information with our affiliates or related legal entities, and some business partners that cooperate with us (collectively referred to as "information recipients") in accordance with this policy. We will actively help you understand the storage and use of personal information by the information recipient, as well as your rights to access, correct, delete, and cancel your account. Except for the following circumstances, without your consent, we will not share your personal information with any third party other than us and our information recipient:

ⅰ. Provide you with our services. We may share your personal information with the information recipient to achieve the core functions you need or provide the services you need;

ⅱ. Maintain and improve our services. We may share your personal information with information recipients to help us provide you with more targeted and better services, for example: communication service providers that send emails or push notifications on our behalf;

ⅲ. To achieve the purpose stated in the section "How do we collect and use your personal information" in Article 1 of this policy;

ⅳ. Fulfill our obligations and exercise our rights in this policy or other agreements we have reached with you;

ⅴ. The purpose of sharing with the information recipients who entrust us to promote is to make the entrusting parties understand the coverage and effectiveness of the promotion. For example, we can tell the entrusting party how many people have viewed their promotion information or purchased the entrusting party’s goods after seeing this information, or provide them with unidentifiable statistical information to help them understand their audience or customers.

ⅵ. To the extent permitted by laws and regulations, in order to comply with the law, protect us and our affiliates or partners, you or other Authing users, or the public from damage to the interests, property or safety of the public, for example, to prevent fraud and other illegal activities and To reduce credit risk, we may exchange personal information with other companies and organizations. However, this does not include personal information that is sold, rented, shared or otherwise disclosed for profit in violation of the commitments made in this policy.

ⅶ. Assist in handling disputes or disputes between you and others in response to your legal needs;

ⅷ. Provide your personal information in response to the legal request of your guardian;

ⅸ. Provided in accordance with the service agreement signed with you (including the electronic agreement signed online and the corresponding platform rules) or other legal documents;

ⅹ. Provided based on academic research;

ⅺ. Provided based on the public interest in compliance with laws and regulations.

We will only share your personal information for legal, legitimate, necessary, specific and clear purposes. For companies, organizations and individuals with whom we share personal information, we will sign strict confidentiality agreements with them, requiring them to handle personal information in accordance with our instructions, this policy and any other relevant confidentiality and security measures.

b. Transfer

ⅰ. With the continuous development of our business, we may conduct mergers, acquisitions, asset transfers or similar transactions, and your personal information may be transferred as part of such transactions. We will require new companies and organizations that hold your personal information to continue to be bound by this policy, otherwise, we will require that companies and organizations to re-seek authorization and consent from you.

ⅱ. After obtaining your explicit consent, we will transfer your personal information to other parties.

c. Disclosure

We will only disclose your personal information under the following circumstances and adopting industry-standard safety protection measures:

ⅰ. According to your needs, disclose your designated personal information in a disclosure method that you explicitly agree to;

ⅱ. In cases where your personal information must be provided in accordance with the requirements of laws and regulations, compulsory administrative law enforcement or judicial requirements, we may disclose your personal information based on the type of personal information required and the method of disclosure. Under the premise of complying with laws and regulations, when we receive the above request for the disclosure of personal information, we will require the recipient to issue corresponding legal documents, such as subpoenas or investigation letters. We firmly believe that the personal information we are required to provide should be as transparent as possible to the extent permitted by law. We have carefully reviewed all requests to ensure that they have a legal basis and are limited to data obtained by law enforcement agencies for specific investigation purposes and have legal rights.

d. Exceptions for obtaining prior authorization and consent when sharing, transferring, or disclosing personal information

In the following situations, sharing, transferring, and publicly disclosing your personal information does not require your prior authorization and consent:

ⅰ. Related to personal information controllers fulfilling obligations stipulated by laws and regulations;

ⅱ. Related to national security and national defense security;

ⅲ. Related to public safety, public health, and major public interests;

ⅳ. Related to judicial or administrative law enforcement such as criminal investigation, prosecution, trial, and execution of judgments;

ⅴ. In order to protect your or other individuals' life, property and other major legal rights and interests, but it is difficult to obtain the consent of the person;

ⅵ. Your personal information disclosed to the public on your own;

ⅶ. Collect personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels.

According to laws and regulations, sharing and transferring personal information that has been de-identified, and ensuring that the data recipient cannot restore and re-identify the subject of personal information does not belong to the external sharing, transfer, and public disclosure of personal information. The storage and processing will not need to notify you separately and obtain your consent.

4. How do we keep, store and protect the security of your personal information

a. We only store your personal information for the period necessary for the purpose stated in this policy and within the time limit prescribed by laws, regulations and supervision. Authing's criteria for judging the aforementioned period include:

ⅰ. Complete transaction purposes related to you, maintain corresponding transaction and business records, and respond to your possible inquiries or complaints;

ⅱ. Ensure the safety and quality of the services provided by Authing;

ⅲ. Do you agree to a longer retention period;

ⅳ. Whether there is any other special agreement on the retention period.

After your personal information exceeds the retention period, Authing will delete or anonymize your personal information in accordance with the requirements of applicable laws (if you are a minor, after your personal information exceeds the retention period, Authing will follow Relevant laws and regulations require that your personal information be processed accordingly). If it is impossible to delete it in accordance with relevant requirements due to special circumstances, the platform will explain this part of the matter to you.

If we terminate the service or operation, we will promptly stop the activities of continuing to collect your personal information, and at the same time, we will comply with relevant laws and regulations to notify you in advance, and delete or anonymize your personal information after terminating the service or operation. Unless otherwise provided by laws, regulations or regulatory authorities.

b. The personal information collected and generated during our operations within the territory of the People's Republic of China is stored in the territory of China. Except in the following situations:

ⅰ. There are clear provisions in laws and regulations;

ⅱ. Obtain your authorization and consent;

ⅲ. The products and services you use involve cross-border, and we need to provide your personal information overseas.

In response to the above circumstances, we will ensure that your personal information is adequately protected in accordance with this policy and national laws and regulations.

c. We attach great importance to personal information security, designate specific personnel, and take all reasonable and feasible measures to protect your personal information:

ⅰ. Data security technical measures

We will adopt safety protection measures that comply with industry standards, including the establishment of reasonable system specifications and safety technologies to prevent your personal information from unauthorized access, use, modification, and data damage or loss. Network services adopt a variety of encryption technologies. For example, in some services, we will use encryption technology to protect your personal information, use encryption technology to encrypt and store your personal information, and isolate it through isolation technology. When using personal information, such as personal information display and personal information association calculations, we will use a variety of data desensitization technologies to enhance the security of personal information in use. Strict data access control and multi-identity authentication technology are adopted to protect personal information and prevent data from being used in violation of regulations.

ⅱ. Other security measures we take to protect personal information

(1) We manage and regulate the storage and use of personal information by establishing a data classification and grading system, data security management specifications, and data security development specifications.

(2) We conduct comprehensive security control of data through confidentiality agreements, monitoring and auditing mechanisms for personal information contacts.

(3) We will also organize security and privacy protection training courses to strengthen employees’ awareness and security awareness of the importance of protecting personal information.

(4) We only allow employees and partners of us and our affiliates who need to know this personal information to access your personal information, and we have set up strict access control and monitoring mechanisms for this purpose. We also require all personnel who may have access to your personal information to perform corresponding confidentiality obligations. If you fail to fulfill these obligations, you may be held accountable or be suspended from our cooperative relationship.

ⅲ. The Internet is not an absolutely secure environment, and the communication methods with other users such as e-mail, instant messaging, social software or other service software cannot be determined whether it is completely encrypted. We recommend that you use complex passwords when using such tools, and pay attention. Protect your personal information security.

ⅳ. We will try our best to ensure or guarantee the security of any personal information you send to us. If our physical, technical, or management protection facilities are damaged, resulting in unauthorized access, public disclosure, tampering, or destruction of personal information, resulting in damage to your legitimate rights and interests, we will bear the corresponding legal responsibility.

d. Security incident handling

In the unfortunate event of a personal information security incident, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, and what you can independently prevent and reduce risks Suggestions, remedies for you, etc. At the same time, we will promptly notify you of the relevant information of the incident by email, letter, text message, phone call, push notification, etc. If it is difficult to inform the subject of personal information one by one, we will take a reasonable and effective way to issue an announcement. At the same time, we will also proactively report the handling of personal information security incidents in accordance with the requirements of the regulatory authorities.

Please understand that due to technical limitations and risk prevention limitations, even if we have tried our best to strengthen security measures, we cannot always guarantee the 100% security of personal information. You need to understand that the system and communication network you use to access the Authing service may cause problems due to circumstances beyond our control.

5. How to manage your personal information

We encourage you to update and modify your personal information to make it more accurate and effective. Please understand that your decision to correct, delete, withdraw your authorization or stop using the Authing service will not affect our previous personal information based on your authorization. Information processing.

You can manage your personal information in the following ways:

a. Access your personal information

ⅰ. Account personal information: If you want to access the basic personal information in your account (including avatar, nickname, birthday, company, address, etc.), you can log in to your account and access it through the "personal center".

ⅱ. Order personal information: You can check the status of all your orders in "Control Panel-Expense Management-Order Information".

b. Correct your personal information

If you want to correct the basic personal information in your account (including avatar, nickname, mobile phone number, etc.), you can log in to your account and make changes in the "Personal Center".

c. Delete your personal information

You can voluntarily delete part of your personal information through the methods listed in "(1) Accessing and Correcting Your Personal Information". When some personal information is deleted, we may require you to verify your identity to protect the security of your personal information.

In the following situations, you can request us to delete personal information:

ⅰ. If our handling of personal information violates laws and regulations;

ⅱ. If we collect and use your personal information, but have not obtained your authorization;

ⅲ. If our handling of personal information seriously violates our agreement with you;

ⅳ. If we no longer provide you with Authing service.

If we decide to respond to your deletion request, we will also notify the entities that have obtained your personal information from us as much as possible at the same time, requiring them to delete them in a timely manner, unless laws and regulations provide otherwise, or these entities obtain your independent authorization.

d. Change the scope of your authorization

You can always choose whether to disclose personal information. Some personal information is necessary to use the Authing service, but the provision of most other personal information is up to you. You can change the scope of your authorization to continue to collect personal information by "deleting personal information, turning off device functions, or canceling your account" in the methods listed in "This Article (1) Accessing and Correcting Your Personal Information" or through the ninth of this policy. Article [How to Contact Us] Contact us with the agreed contact information to withdraw your authorization. Under normal circumstances, we will reply within 15 days.

e. Cancel your account

If you no longer use the Authing service, you can log in to the process shown in "Authing"-"Personal Center"-"Security Level"-"Account Logout" if it complies with the stipulated conditions of the service agreement and relevant national laws and regulations. Or contact us to cancel your account in the contact information stipulated in Article 9 of this Policy [How to Contact Us]. Generally, we will cancel your account within 15 working days, at which time we will stop providing you with Authing services. When your account is cancelled or deleted, all service information and data under the Authing service related to that account will be deleted or anonymized, unless otherwise provided by laws and regulations.

f. Obtaining a copy of personal information: You can contact us through the email sales@authing.com service channel and inform us that you want to obtain a copy of your personal information. Generally, we will receive your question ten days after receiving your question. Respond within five days.

g. Responding to your above request

To ensure safety, you may need to provide a written request or prove your identity in other ways. We may ask you to verify your identity before processing your request. For your reasonable requests, we do not charge fees in principle, but for repeated requests that exceed reasonable limits, we will charge a certain cost as appropriate. For those who are unreasonably repeated, require too many technical means (for example, the need to develop new systems or fundamentally change current practices), bring risks to the legitimate rights and interests of others, or are very impractical (for example, involving information stored on backup tapes) Request, we may reject it.

In the following situations, we will not be able to respond to your request:

ⅰ. Related to our fulfillment of obligations stipulated by laws and regulations;

ⅱ. It is directly related to national security and national defense security;

ⅲ. It is directly related to public safety, public health, and major public interests;

ⅳ. Directly related to criminal investigation, prosecution, trial and execution of judgments;

ⅴ. We have sufficient evidence to show that you have subjective malice or abuse of rights;

ⅵ. In order to protect your or other individuals' life, property and other major legal rights and interests, but it is difficult to obtain the consent of the person;

ⅶ. Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations;

ⅷ. Involving commercial secrets.

6. Third-party services

The Authing service may be linked to social media or other services (including websites or other forms of services) provided by third parties. include:

a. You can use the "Share" button to share certain Authing service content to third-party services, or you can share third-party service content to Authing. These functions may collect your information (including your log information), and may install Cookies on your computer to operate the above functions normally;

b. We provide you with links through advertisements or other methods of our services, so that you can link to third-party services or websites;

c. Other access to third-party services. In order to achieve the purpose stated in this policy, we may access SDK or other similar applications provided by third-party service providers, and share certain information about you collected by us in accordance with this policy to such third-party service providers. In order to provide better customer service and user experience. Currently, the third-party service providers we access mainly include the following types:

ⅰ. For advertising-related services, including advertising display, advertising data monitoring/statistics, etc.;

ⅱ. Used for message push functions, including push push from mobile phone manufacturers, reminders of specific events, etc.;

ⅲ. For payment-related services, including order payment, transaction verification, income settlement, payment information summary statistics, etc.;

ⅳ. It is used to obtain device location permissions, collect device information and log information, etc. with your consent;

ⅴ. Used for third-party authorization services, including third-party account login, sharing relevant content to third-party products, etc.;

ⅵ. Used to support product functional modules, including online live broadcast, video playback, voice recognition, intelligent customer service, content storage, etc.;

Some third-party SDKs or similar applications that we access may collect your personal information. If you use such third-party services in our services, you agree that they will directly collect and process your information. We will evaluate the legality, legitimacy, and necessity of personal information collected by such third-party services, and require these third parties to take protective measures for your personal information, and strictly abide by relevant laws, regulations and regulatory requirements. You can also choose to contact us through the feedback channels listed in the "How to Contact Us" section of this policy, and we will answer you as soon as possible.

The services mentioned above are operated by relevant third parties. Your use of such third-party services (including any personal information you provide to such third parties) is subject to the third party's own terms of service and personal information protection statement (not this policy), and you need to read its terms carefully. We will only share your information for legitimate, necessary, and specific purposes. We will require them to fulfill relevant confidentiality obligations and take corresponding security measures.

7. Protection of minors

If you are a minor under the age of 18, please be sure to ask your guardian to read this policy carefully and use our services or provide us with personal information with the consent of your guardian. We will protect the personal information of minors in accordance with relevant national laws and regulations. If the guardian finds that the relevant minor’s personal information is filled out by the minor himself and needs to be modified or deleted, please feel free to contact us.

In particular, if you are a child under the age of 14, please notify your guardian and seek their consent and guidance before you use the Authing service and submit personal information.

8. Notification and Amendment

We may revise the terms of this policy in due course, and such revisions form part of this policy. For major changes, we will provide more noticeable notifications. If you do not agree with the changes, you can choose to stop using the Authing service; if you continue to use the Authing service, you agree to be bound by this revised policy.

We encourage you to review our privacy policy every time you use the Authing service.

We may issue service-related announcements when necessary (for example, when we suspend a certain service due to system maintenance). You may not be able to cancel these service-related announcements that are not promotional in nature.

Finally, you must keep your account and password information confidential. In any case, please keep it carefully and properly.

9. Application of law and jurisdiction

If there is a dispute, the two parties will resolve the dispute through negotiation; if the two parties cannot resolve the dispute through negotiation, both parties agree that the China International Economic and Trade Arbitration Commission ("CIETAC") will conduct arbitration in Beijing, China in accordance with CIETAC's effective arbitration rules and applicable laws. The language of the arbitration It is in Chinese and will be heard by 3 arbitrators.

10. How to contact us

The contact address of Beijing Steamory Technology Co., Ltd. is: Floor 16, Block B, Beichen Century Center, Chaoyang District, Beijing. We will protect your personal information in accordance with this policy.

We have designated personal information protection personnel, if you have complaints and reports about personal information security, or you have any questions, comments or suggestions about this policy, your personal information related matters, and privacy measures related to this policy or Authing If you have any questions, please contact us: Tel: 400-6197-031; Email address: sales@authing.com.

Under normal circumstances, we will reply within fifteen days from the date of receiving your questions, comments or suggestions.