PrivacyUser AgreementTechnical Support
Privacy Policy
1. We respect and value the privacy of our members very much, and we will do our best to ensure the security of your information and data so that customers have no worries. This is the purpose of our privacy policy that we have always followed.
2. We will never disclose any personally identifiable information to any third party, unless we receive a court summons or comply with the requirements and judgments of applicable laws. We have the right to provide necessary personal information to relevant payment platform service providers and financial insurance institutions through the website to complete payment requirements.
3. All personal information you provide is transmitted through a 128-bit SSL encrypted secure port and stored in a confidential environment that is inaccessible to the general public. All internal access to data will be strictly restricted and closely monitored.
4. In order to ensure the normal operation of the service, protect your or third parties' personal and property safety from infringement, better prevent phishing websites, fraud, network vulnerabilities, computer viruses, network attacks, network intrusions and other security risks, and more accurately identify In violation of laws and regulations, we will record and save your login and usage details during your use of the service, and save them as network logs, including Internet Protocol (IP) address, Internet Service Provider (ISP), browser type, Access date and time, software and hardware feature information, web browsing records and usage records.
1. In order to allow customers to enjoy a safe and pleasant service experience here, we ask customers to carefully read this "Privacy Policy", which will involve matters related to our use of your personal information. Our company takes a rigorous attitude towards the personal privacy of our customers.
2. In order for customers to enjoy further services, sometimes we may need customers to provide personal information. This policy will cover the use of relevant customer personal information, as well as the recording procedures for relevant information. In any case, we will process your personal information in accordance with this policy. When using your personal information we
3. The current legal provisions will be applied, and we will try our best to take the best and safest way to deal with it.
4. We include IM instant messaging service to provide you with basic communication capabilities such as private chat and group chat. Through this service, you can quickly integrate instant messaging and real-time network capabilities into your own products and services and provide instant messaging to your end users. Communication Services.
5. In order to accurately judge the operating environment, optimize network scheduling, ensure the normal operation of services, and facilitate the troubleshooting of problems that arise in the operation of communication services, we will collect the following information from end users, including (1) equipment information: equipment type, equipment brand and Model, device manufacturer, system version, name, edited version information, system kernel information, CPU model, device memory and storage size, screen brightness and resolution, device input device, device architecture, baseband information, font HASH, HOSTNAME , auxiliary function list, system process list; (2) Log information: device running status (CPU, memory running status), browser type and version information, network connection type and status, WIFISSID, WIFIBSSID, IP address, operator information, Network agent, communication service operation log information.
6. In order to protect the security of your account and ensure that communication services are only used in applications authorized by you, we will collect the Bundle ID of the IOS application you develop and/or the application package name of the Android application you develop on the end user's device. , application version number, application signature, installation update time, installation running path.
Authorization and use of personal information of end users
As the end user's personal information controller, we accept your entrustment and provide you with data processing services according to your instructions, but we have no control over how you use the end user's personal information. You should collect, use and authorize us to collect and use your end users' personal information in a manner that complies with applicable laws and moral obligations.
If you accept this Policy, you guarantee that you have complied with and will continue to comply with applicable laws, regulations and regulatory requirements and the provisions of this Policy, including but not limited to:
1. Will comply with all applicable laws, regulations and regulatory requirements related to the collection of information from end users;
2. We must disclose our products to end users, as well as the rules on how we collect and use end users' personal information, and obtain the end users' full, necessary and clear authorization and consent, allowing us to use the collected information in compliance with relevant laws and regulations. The information is used for the service purposes listed in this policy. To fulfill the above obligations, you should formulate and publish privacy policy documents that are no lower than the personal information protection standards stipulated in this policy.
3. An easy-to-operate rights realization and information management mechanism has been provided to end users, explaining how users can exercise their choices, access, correct their personal information, exercise their right to delete, change the scope of their authorization and consent, and other operations.
If you are unable to meet the above conditions or your end users do not agree to the collection and use of their personal information in accordance with this policy, you should not continue to use the service; your continued use will be deemed that you have agreed and guaranteed to us that all your End users have agreed that we have the right to collect and use their personal information to provide corresponding services. In any case, all responsibilities arising from your failure to obtain end-user consent in advance to enable us to collect and use their personal information to provide services shall be borne by you, and you shall fully compensate us for any losses caused to us.
How we protect your and end users' personal information
We attach great importance to information security, have established a dedicated security team, and take all reasonable and feasible measures to protect your and end-users' personal information:
1. We will adopt security technical measures that comply with industry standards, including using encryption and other technologies to encrypt and save your and end-users' personal information, and isolate them through isolation technology to prevent your and end-users' personal information from being accessed without authorization. Authorized access, use and modification to avoid data damage or loss.
2. We have an industry-leading data security management system that focuses on personal information and revolves around the data life cycle, improving the security of the entire system from multiple dimensions such as organizational construction, system design, and personnel management. We manage and standardize the storage and use of personal information by establishing a data classification and classification system, data security management specifications, and data security development specifications.
3. We only allow those who need to know this information to access your and end-users' personal information, and have set up strict access control and monitoring mechanisms for this purpose. We also require all persons who may have access to your and end-users' personal information to fulfill corresponding confidentiality obligations.
4. We attach great importance to information security compliance and have passed many international and domestic security certifications, such as ISO27001 information security management system certification, information system security level protection certification, etc., to fully protect your and end-user information with industry-leading solutions Safety.
5. In order to deal with possible risks such as leakage, damage and loss of personal information, we have formulated a number of systems to clarify the classification and grading standards of security incidents and security vulnerabilities and the corresponding processing procedures. We have also established an emergency response team for security incidents. In accordance with the requirements of security incident handling specifications, we launch security plans for different security incidents, stop losses, analyze, locate, formulate remedial measures, and cooperate with relevant departments to trace the source and attack.
Please understand that due to technical limitations and risk prevention limitations, even if we have tried our best to strengthen security measures, we cannot always guarantee 100% information security. If a security incident such as personal information leakage occurs, we will activate an emergency plan to prevent the security incident from expanding, report it in a timely manner in accordance with the "National Cybersecurity Incident Emergency Plan" and other relevant regulations, and inform you of the relevant situation by sending emails, push notifications, announcements, etc. , and give you security advice.
You need to understand that the systems and communication networks you use to use the service may have problems due to circumstances beyond our control. In order to more effectively protect the information security of you and your end users, we also hope that you can strengthen your self-protection. If your physical, technical, or management protection facilities are damaged, your and your end users' personal information will be accessed without authorization. , public disclosure, tampering, or destruction, the risks and responsibilities arising therefrom will be borne by you, and we will not be responsible.
Copyright 2023 © DingDong Information Technology Co., Ltd.