在线一本码道高清

Privacy Protection Agreement

This agreement is based on the "Internet Security Law of the People's Republic of China", "Decision of the Standing Committee of the National People's Congress on Strengthening the Protection of Network Information", "Regulations on the Management of Information Services on Mobile Internet Applications", "Personal Information Security Regulations" and related laws and regulations. Provides that through this privacy protection agreement regarding Little Information, it is clear that when you use the "Little Information" software and related services, we will collect, use, store, share, transfer (if applicable) and protect your personal in accordance with this privacy protection agreement. Information to tell you a little bit about how your personal information is handled, and how we provide you with inquiries, accesses, deletions, corrections, withdrawals of consent and protection of this information. Among them, the important content such as the terms of your personal information rights are blackened, please pay special attention. According to laws and regulations, when using a little information software and related services, you need to expressly agree to the terms of this privacy protection agreement. If you do not expressly agree to this privacy protection agreement, this will cause Little Information to provide you with complete products and services, but Little Information will also use de-identification, fragmentation, encryption and other measures to protect this information. If you do not agree with the terms of this privacy protection agreement, Little Information can not provide you with complete products and services, you can also choose to stop using it. When you choose to continue or use it again, based on the necessity to provide products and services, you will be deemed to accept and acknowledge that a little bit of information will be processed in accordance with the terms of this agreement.

Beijing Yidian Information Technology Co., Ltd. promises to abide by the terms of this privacy protection agreement. Yidian Information will adopt security protection measures in accordance with laws and regulations to protect your personal information and privacy. Therefore, Yidian Information has formulated this "Privacy Protection Agreement" and has a special reminder: I hope you carefully read and understand this Privacy Protection Agreement before using "Little Information" and related services, and you can make your appropriate choices in accordance with this agreement.

  1. I. Collection and Use of Personal Information

    Collection of personal information

    During your use of the “Little Information” software and related services, we will clearly show you the purpose, method and scope of collection and use to collect information in accordance with the principles of lawfulness, justification and necessity. In order to provide better services and more comprehensive functions to all users, Little Information may collect, store and use information about you to ensure the normal operation of the product; meanwhile, in the process of continuous optimization and improvement of products and services; and We may also collect, use, and store your relevant information while ensuring the safety of products, services and users. If you do not provide relevant information, you may not be able to register as a user of Little Information or enjoy some of the services or features of Little Information, or you may not be able to achieve the intended effect of the related service. This includes obtaining some basic information, as well as providing personal information to Little Information when you register, use Little Information and its related products or services; such information includes:

    1. 1.1 Guarantee the normal operation of “Little Information” mobile terminal, PC terminal and related services

      You are downloading and installing an information client. In order to ensure the normal operation of software and services, we will collect device-related device models, operating system versions, network information, IMEI, MAC address, IDFA (iOS), storage, and user Internet access. Use & log information. This information is the basic information that must be collected to ensure the normal operation of a little information product and the provision of services.

    2. 1.2 Registration, authentication, and registration of “Little Information” and related services

      When you register a little information account or use a little information and its products, a little information will at least collect your mobile phone number or WeChat number, QQ number, Sina Weibo number, email address, password, password protection options. Account nickname, avatar, gender, birthday, location may also be collected. When you log in through your mobile phone number, you need to allow the application to send SMS messages for the client's mobile phone number to use the verification code to log in to the basic functions; if you associate with other methods (such as WeChat, QQ, Sina Weibo) Register a little information, a little information will request your personal information from the associated third party, for a little information but personal information that the third party can't provide, a little information can still ask you to provide. If you refuse to provide this information, it will affect your use of a little information or a function of a little information. The aforementioned personal information collection will be used for user registration, registration code verification receipt, password retrieval, etc. When you register and use a little information, a little information will verify the real name of the personally identifiable information you provide. If you refuse to provide the relevant information, the little information operator will refuse to provide you with services.

      According to the relevant laws and regulations of the People's Republic of China, you need to perform real-name authentication to enjoy certain services or use certain functions. You may need to provide your real identity information (real name, ID number, phone number, etc.) to complete the real-name verification. This information is personal sensitive information. We will use the industry's common method and do our best to protect your personal sensitive information. If you do not provide this information, you may not be able to obtain related services, but it will not affect the normal use of other functions and services of "Little Information".

    3. 1.3 Recommendations for personalized information and services

      In order to provide you with interesting and valuable personalized information and services, to achieve this core function, we may collect and use the following information:

      1. 1.3.1 With your explicit consent, a little information will be geo-located , which will help a little information provide you with relevant information such as news in the main function interface and local channels.

        1.3.2 Your attention, collection, search, browsing preferences (information about articles, audio and video, pictures, games, cartoons, etc. that interest you) and other information about your operations and usage behavior

        1.3.3 Your active feedback, release, like , comment and other information;

        1.3.4 Which features of the application did you use, the order of access, the type and frequency of reading news, and search for subscribed channels?

        1.3.5 A list of software installations for which you have used and installed the application software.

        We show and recommend information about your area based on the city corresponding to the IP address. You refuse to provide geographic location information, and we will not push you local information based on geographic location, but it will not affect the normal use of other functions and services of “Little Information”. The above information we collected and used was de-identified. The data analysis only corresponds to a specific code that cannot be directly associated with the user's identity, and cannot and will never be associated with your real identity. You can also choose to turn off personalized recommendations in the settings.

    4. 1.4 Search services for you

      When you use the search service provided by a little information operator, a little information will collect your query keyword information, equipment information, log records, etc. In order to provide you with an efficient search service, some of this information will be temporarily stored in you Local storage. Here, you need to be aware that if your keyword information cannot identify you personally or in combination, it does not belong to your personal information, so a little information has the right to use it for other purposes; only if you When your search keyword information is related to your other information and can identify you personally, during the combined use, Yidian will use your search keyword information as your personal information and your search history Handle and protect it in accordance with this privacy statement.

    5. 1.5 Provide you with information release and interactive services

      When you post content, comments, answers or likes, we will collect the information you post and display your nickname, avatar, post content, etc.

      (1) When you use uploading text, pictures, publishing audio and video, we will ask you to authorize sensitive permissions such as cameras, photos, albums, microphones. If you refuse to provide authorization, you will not be able to use this feature, but it will not affect your normal use of other features.
      (2) When you actively subscribe, follow and interact with the accounts and topics you are interested in, when you comment or share content, we will show you the subscriptions and follow the accounts to post content.
    6. 1.6 Recommending Products or Services to You

      We hold related marketing activities. When you choose to participate, you can provide information such as name, mailing address, contact information, bank account number, and income status . This information may include personal sensitive information (such as personal phone number, bank account number, property status, etc.), which is necessary for you to receive the product or enjoy the service. If you refuse to provide this information, we may not be able to issue products or provide services.

    7. 1.7 Ensure a little bit of information product, service and user safety

      In order to ensure the security of a little information products, services, and services provided by users, we may record network log information, as well as information on the frequency of use of software and related services, crash data, overall installation, number of installed applications, usage, and performance data.

  2. 2. Possible Uses of Collected Information

    1. 2.1 Service provision and information use

      Little Information may use the information collected in the course of providing services to you for the following purposes:

      2.1.1 provide you with services;

      2.1.2 When providing a little information service, it is used for identity verification, customer service, security prevention, fraud monitoring, archiving and backup purposes to ensure the security of the products and services provided by a little information to you;

      2.1.3 Help a little information design new services and improve a little information existing services;

      2.1.4 Make Little Information better understand how you access and use Little Information's services to respond to your personalized needs, such as language settings, location settings, personalized help services, interest subscription services and instructions , Or otherwise respond to you and other users;

      2.1.5 Software certification or management software upgrade;

      2.1.6 Involve you in surveys about a few information products and services.

    2. 2.2 Other uses

      In order to allow you to have a better experience, improve the service of a little information or other uses you agree with, under the premise of complying with relevant laws and regulations, a little information may be collected through a service to collect information or personalize Way for a little information about other services or products. For example, the information collected when you use one service of Little Information may be used to provide you with specific content in another service or to show you relevant, concerned, non-generalized information. If a bit of information provides the corresponding option in the relevant service, you can also authorize a bit of information to use the information provided and stored by the service for other services of a bit of information.

    3. 2.3. Use of Cookies

      Yidian Information Web Edition will use cookies to help you personalize your experience, ensure the safe and efficient operation of products and services, and recommend, display, and promote content or accounts that may interest you. Cookies are text files that are stored by your web server on your access device. One of the main purposes is to save users time and operating costs. For example, when you log in to a little information page, cookies will help you call your information on subsequent visits to simplify the process of filling out your personal information (such as one-click login, etc.). For more information about cookies, you can refer to the attached file or related introduction of your browser.

    4. 2.4 Personal information exempted from consent for collection and use

      According to laws and regulations and relevant national standards, we do not need your authorization to collect and use your personal information:

        2.4.1 directly related to national security and national defense security;

        2.4.2 Those directly related to public safety, public health, and major public interests;

        2.4.3 Directly related to crime investigation, prosecution, trial and judgment enforcement;

        2.4.4 It is difficult to obtain the consent of the personal information subject or other individuals because they have significant legal rights and interests;

        2.4.5 Your personal information collected is disclosed to the public by yourself;

        2.4.6 Your personal information collected from legally publicly disclosed information, such as legal news reports, government information disclosure, etc .;

        2.4.7 Necessary for signing or performing a contract at your request;

        2.4.8 Necessary for maintaining the safe and stable operation of a piece of information software and related services, such as finding and handling a failure of a piece of information software and related services;

        2.4.9 Necessary for legal news reporting;

        2.4.10 When academic research institutions need to carry out statistical or academic research based on the public interest and provide the results of academic research or description to the outside world, the personal information contained in the results is de-identified;

        2.4.11 Other situations required by laws and regulations.

  3. Protection and security measures of personal information

    1. 1.Personal Information Use Principles

      When using personal information, Yidian Information always adhered to the relevant requirements of laws and regulations and personal information security standards. The purpose of using personal information is to provide users with services or service support, and adhere to the necessary, reasonable and minimum use and use of personal information. And take all reasonable technical means and measures to ensure that personal information is not leaked, to protect the integrity and availability of personal information; to take effective measures to protect the security of personal information during the service process, to avoid causing damage to users.

    2. 2. Personal information security measures

      2.1 In the use of personal information, such as personal information display, personal information related calculations, Little Information will use a variety of data desensitization technologies including content replacement, encryption and desensitization to enhance the security of personal information in use.

      2.2 Manage and regulate the storage and use of personal information by establishing a data classification and grading system, data security management specifications, and data security development specifications.

      2.3 Establish a special department for data security, responsible for security emergency response organizations to promote and guarantee the security of personal information.

      2.4 Strengthen security awareness. E-news will also organize training on network information security and privacy protection to enhance employees' awareness of the importance of protecting personal information.

      2.5 Develop emergency plans for personal information security incidents, so that relevant personnel understand job responsibilities and emergency handling strategies and procedures.

      2.6 If a security incident caused by personal information occurs, a little information will inform you immediately and report to the appropriate authority, record the incident, evaluate the impact, and immediately conduct problem troubleshooting and emergency measures; and reasonable And effective ways to publish warning information related to the public; although the above reasonable and effective measures have been taken and the standards required by relevant laws and regulations have been complied with, a little information still cannot guarantee that your personal information will be communicated through unsafe channels. safety. Therefore, users should take proactive measures to ensure the security of their personal information, such as regularly changing account passwords and not disclosing personal information such as their account passwords to others.

  4. Third, personal information storage

    1. 1. Preservation of personal information

      In order to achieve the service purpose, personal information is stored for the shortest period of time. When personal information needs to be deleted or anonymized, personal information should be operated as soon as possible.

      2. De-identification

      After collecting personal information, Yidian Information will perform de-identification processing, and take technical and management measures to store the de-identified data separately from information that can be used to recover and identify individuals, and ensure that in the subsequent processing of personal information Do not re-identify individuals

      3. Transmission and storage of personal sensitive information

      When a bit of information is used to transmit personal sensitive information, security measures such as encryption are taken, and technical measures such as de-identification and fragmentation are taken before they are stored.

      4.Storage location

      A little information is stored on domestic servers according to laws and regulations.

      5.Storage period

      The retention period of personal information is the shortest time necessary to achieve the purpose of the service, that is, the period between your use of a little information service and the time you ask to cancel your account, and meet the period prescribed by laws and regulations.

  5. 4. Disclosure of Information

    1. One point of information-related applications will not disclose your personal information to third parties without permission, unless one of the following situations occurs:

    1.1 Provide your personal information as required by law or requested by the competent authority;

    1.2 In an emergency, in order to protect a little information and the legitimate rights and interests of its users or public safety and interests;

    1.3 You authorize or agree to a little information disclosure;

    1.4 Comply with a little information related service terms and software agreement.

    2. According to laws and regulations, a little information will be publicly disclosed to state agencies and organizations without obtaining your authorization and consent.

    2.1 Directly related to crime investigation, prosecution, trial and judgment enforcement

    2.2 Directly related to national security and national defense security

    2.3 Those directly related to public safety, public health, and major public interests

    2.4 For the protection of your or other individual's life, property, etc.

  6. V. Sharing and Transfer of Personal Information

    In principle, we will not share or transfer your personal information to third parties, unless you have your prior authorization or consent, or the sharing or transfer of your personal information is de-identified information, and sharing third parties cannot re-identify such Natural human subject of information.

    1. 1. Personal Information We May Share

      1.1 In order to achieve programmatic ad push, we may share de-identified or anonymized information with advertising partners

      We may share information with partners who have commissioned us for promotion and advertising, but we will not share information that personally identifies you, such as your name, ID number, etc., and will only provide these partners with difficulty identifying you Personally identifiable user portrait tags and de-identified or anonymized information to help them improve the effective reach of ads without identifying you personally. You can refuse us to send you programmatic ads, but it will not affect your use of other services.

      1.2 Share with business partners for specific functions

      When a software service provider, smart device provider, system service provider, and our partners (including but not limited to Himalayan, Aurora, and Alliance) provide services to you, such as newsletters that send emails or push notifications Service providers, map service providers who provide location services for Little Information, provide audio and video information for Little Information, provide one-click registration for Little Information, and provide statistical services for Little Information. They may not be located in your jurisdiction , Or when you need to use the geolocation function, in order to achieve this function, your location information and related device information (such as hardware model, operating system version number, International Mobile Equipment Identity (IMEI), network device hardware) Address (MAC)), name, avatar, contact information, etc .; but we will de-identify and provide it to the aforementioned provider.

      For statistical analysis purposes, our products may integrate third-party SDKs or other similar applications, such as Youmeng + SDK. Youmeng + SDK needs to collect your device ’s International Mobile Equipment Identifier (IMEI), iOS Advertising Identifier (IDFA), device Mac address, and device model. For your information security, we have agreed on strict data security and confidentiality obligations with third-party SDK service providers, and these companies will strictly abide by our data privacy and security requirements. We will not share your personal information with you unless we have your consent. To help you better understand the types and uses of the data collected by Youmeng + and how to protect your personal information, you can visit http://www.umeng.com/policy to learn about Youmeng + Privacy Policy. We understand and respect your right to choose. If you do not want to participate in the alliance + big data calculation, you can also visit http://outdip.umeng.com/opt\_out.html to exercise the opt-out right.

      1.3 Recommending Products or Providing Services to You

      We hold related marketing activities. When you choose to participate, you can provide information such as name, mailing address, contact information, bank account number, and income status. With your explicit consent, we will share the above information with third parties so that we can entrust third parties to provide you with products or services in a timely manner.

    2. 2. Careful assessment and liability constraints on third parties who share personal information

      2.1 With your consent, we will conduct a personal information security impact assessment (legality, necessity assessment), and only share information necessary to achieve the purpose of cooperation with a third party. If a third party needs to use personal information beyond the scope of the aforementioned authorization due to business needs, the third party will need to ask for your consent again.

      2.2 For the third party with whom we share your personal information, the third party will sign a confidentiality agreement with us. At the same time, we will evaluate their data security capabilities and environment, and require third parties to process the information with no less than the confidentiality and security measures required by this privacy protection agreement.

      2.3 We will inform you of the type of personal sensitive information involved in the sharing and transfer, the identity of the data recipient and the data security capabilities;

      2.4 We will accurately record and save the sharing and transfer, including the date, scale, purpose, and basic information of the data receiver;

      2.5 To help you understand the storage and use of personal information by data recipients, and the rights of the main body of personal information, such as access, correction, deletion, cancellation of accounts, etc.

    3. 3. Transfer of personal information during acquisition, merger, and reorganization

      With the continuous development of Yidian Information Business, when mergers, acquisitions, asset transfers, reorganizations and other transactions result in the transfer of your personal information to third parties, Yidian Information will inform you of relevant situations through push notifications, announcements, etc. And continue to protect or require new managers to continue to protect your personal information.

  7. Updates and public information

    Little Information encourages users to update and modify personal information to make it effective. Users can decide to modify related information, such as nickname, avatar, etc.

    Please note that when you voluntarily disclose your personal information (for example, you post it on a message board under a news article), the information may be collected and used by others, thus causing your personal information to be leaked. No information is liable. In addition, a bit of information reminds you that you are the person who is responsible for maintaining the confidentiality of your account and password information. Please take care to keep it safe.

  8. Special protection for minors' information and use

    Little Information attaches great importance to the protection of personal information of minors. If you are a minor under the age of 18, you must obtain the consent of your parent or legal guardian before using the information service. If you apply for an account registration on Yidian, Yidian will assume that you have obtained the consent of the aforementioned parent or guardian. Little Information will protect the relevant information of minors in accordance with relevant national laws and regulations and the provisions of this agreement.

  9. Your rights

    1. 1.Access, change, deletion of your information and account cancellation

      After you have completed the account registration and performed reasonable and necessary identity verification of Ping An Information, you can check, modify, and delete the personal information you submitted to the operator of Ping Information. In general, you can browse, modify, and delete the information you submit at any time, but due to security and identification considerations, you may not be able to modify some initial registration information and verification information provided during registration.

      1. 1.1. Access personal account information:

        You can query and access your basic information (except personal information of ID card) such as your avatar, username, profile, gender, birthday, region, location, email address, etc. You can click “Edit profile” or “Account and privacy settings” "For query and access.

        1.2 You can inquire, modify and delete your personal information online through the mobile client and other channels.

        Such as: query access, correction, cancellation of your follow account, blacklist; query access fan, visitor information; query access, change, delete your favorite records, reading history, search history; delete postings, questions and answers, comments.

        1.3 You have the right to update or correct your personal information on your own, or authorize a little information customer service to update or correct the information, or before you make the information update and correction, the information will first verify your identity, and then the information can be corrected and updated .

        1.4 Yidian Information always puts the protection of your personal information first, and collects and uses your personal information in strict accordance with relevant laws, administrative regulations and this agreement. If you find that Yiyi Information violates the laws, administrative regulations or this agreement If you agree to collect and use their personal information, you have the right to request a little information to delete your personal information; if you find that your personal information collected and stored is wrong, you have the right to request a little information to correct it. A little information will be taken to correct it.

        1.5 Account cancellation

        Regarding account cancellation, please use it carefully. Once you complete the account cancellation, you will not be able to use any of the services and functions provided by the information.

        Account logout process: log in to a little information APP → me → settings → account settings and binding → account logout

        1.6 suspension of operations

        If Little Information ceases operations, it will stop the collection of your personal information in a timely manner, notify you of the suspension of operations in the form of one-by-one delivery or announcements, and delete or anonymize your personal information held or pass Technical measures make it non-identifiable.

    2. 2.Change the scope of your authorization agreement or revoke authorization

      1. 2.1. Changing or revoking permissions for sensitive information

        You can delete information, change privacy settings, and turn off geographic location, camera, microphone and other permissions in the device's own operating system to change the scope of your authorization agreement or withdraw your authorization.

        2.2. Refuse to accept push and marketing messages

        You can turn off "Push Notifications" to reject the push of messages through settings, turn on or off programmatic ad display settings through "Ad Settings", and unsubscribe us from sending you marketing text messages by replying to "TD".

        Please understand that certain business functions and services will require your information to be completed. After you withdraw your consent or authorization, we cannot continue to provide you with the functions and services corresponding to the withdrawal of consent or authorization, and we will no longer process your corresponding Personal information. However, your decision to withdraw consent or authorization will not affect the processing of personal information we have previously performed based on your authorization.

    3. 3. Complaints

      You can make a complaint or report in accordance with our published email tousu@yidian-inc.com, the telephone number for reporting complaints “13691332103” and related systems. If you think that your right to personal information may be infringed, or you find clues that your right to personal information has been infringed, you can contact us through the aforementioned methods or the user feedback email "kefu@yidian-inc.com". We will promptly report your complaints and reports after checking.

  10. Nine, exemption

    In addition to the exemption provided by the relevant provisions above, there is no need to bear any legal liability for non-our faults in the following situations:

    1. Your personal information was leaked because you informed or shared your registered account with others;

    2.Our company has taken effective measures to prevent personal information leakage, loss, theft or misappropriation caused by the normal operation of the network due to hacking acts that cannot be prevented by technology or capabilities, computer virus intrusion or temporary shutdown due to government control Tampering, etc.

    3. The leakage of personal data caused by other websites linked to a little information and the legal disputes and consequences caused by it.

  11. X. Amendment of Privacy Protection Agreement

    With the development of Little Information related products, or when there are changes in personal information laws, regulations and policies, Little Information will update or modify this privacy protection agreement from time to time. A little information will be posted on the product or official website prominent notice of changes to the privacy protection agreement, if necessary, please confirm again.

  12. Eleven, contact a little information

    If you have any questions about the information related services or the privacy measures involved in this agreement, please send an email to the user feedback email of kefu@yidian-inc.com. You can also contact a little information customer service by telephone, customer service hotline: 400-819-1599 or customer service QQ: 4008191599.

Updated: January 9, 2020

Effective date: January 9, 2020