首页 > 其他分享 >“Switch Cube”Privacy Policy

“Switch Cube”Privacy Policy

时间:2023-08-17 16:45:35浏览次数:43  
标签:information use Cube personal will services Switch Policy your

The privacy policy respects and protects the personal privacy of all users who use the privacy policy network services. In order to provide you with more accurate and personalized services, our Privacy Policy covers how we collect, use, disclose, transmit and store your information. However, this privacy policy will treat this information with a high degree of diligence and prudence. Privacy Policy This Privacy Policy will be updated from time to time. When you agree to the Privacy Policy Web Service Use Agreement, you are deemed to have accepted the entire content of this Privacy Policy. This privacy policy is an integral part of the agreement to use The app service. You are not required to provide the personal information we request, but in many cases, if you choose not to provide it, we will not be able to provide you with our products or services, or respond to any questions you may have.

1. How we collect information

Based on the principles of legality, justification and necessity, we only collect information necessary to realize product functions. The main sources of personal information collected by our company are: information provided by you, information obtained during your use of our products or services, and your information shared by third parties. We will collect and use your personal information for the purpose of the following product functions. If you do not provide relevant information or do not agree to our collection of relevant information, you may not be able to register as our user or enjoy certain services we provide, Or fail to achieve good service results.

1. You provide account registration, login functions and services, and you may be required to provide the following account registration information:

When you register an account, you will provide us with your mobile phone number and login password.

When you choose to log in with a third-party account, we will read the avatar and nickname information you used when registering with the third-party account. The aforementioned third-party accounts include QQ, WeChat, Weibo or other third-party accounts, and the third-party accounts actually accessed by specific products and services shall prevail.

The purpose of collecting the aforementioned account information is (1) to provide you with better services through account management. By logging into the account, you can synchronize your relevant information. (2) If you provide a real and valid mobile phone number, QQ number, Weibo number, and WeChat ID for binding, you can easily retrieve your account number and password when you encounter problems with losing your registered account or forgetting your password. (3) We will de-identify the relevant information collected and conduct statistical analysis in order to understand user habits more accurately, and on this basis, we will continue to improve products, service quality, and product user experience

2. The information you submit when you use our customer service or participate in our activities. In order to get in touch with you in time, give feedback on customer service issues or related event information, you may provide us with your contact information for timely communication.

3. Device information

Device information refers to the information of the device you use when using our products or services. In order to make necessary adaptations between products and services and devices and provide security services, when you use products or services, we will collect the device name, device model, device identification code, operating system and application version that you use Sogou’s products or services , language setting, resolution, service provider network ID (PLMN) related information. This information is collected to help us conduct bug analysis, ensure your normal use of our products and services, improve and optimize our product experience, and protect your account security. Except as otherwise expressly stipulated in this policy, we will not provide your device information to any third party. However, we cannot guarantee that other third parties will not obtain your device information through other means and combine the device information with other information to identify your personal identity. If any loss is caused to you, you should seek compensation from the third party. The above device information is the basic information collected to provide services. If you do not want the device information to be collected by us, it may cause us to be unable to provide you with normal services.

4. Location information

Location information refers to the information about your location collected when you turn on the device positioning function and use location-based related services, mainly including:

When you turn on the device location function and use related products or services, we may use GPS, WiFi or other technical means to collect and process information about your actual location. Whereabouts and precise positioning information are sensitive personal information, and our products or services will not collect such sensitive personal information unless required for specific product or service functions.

Real-time information including your geographic location provided by you or other users. Including shared information uploaded by you or others showing your current or past geographic location, and geotagging information contained in photos shared by you or others.

If you do not want to be accessed, you can choose to turn off relevant functions in your device or product/service, but this may affect our provision of relevant services to you.

5. Log information

For the sake of service security, when you use products and services, the system may automatically collect certain information through cookies or other means and store it in server logs. Such information may include:

Detailed use of our products and services, such information may include web search terms you use, page addresses you visit, and other information and content details you browse or request when using services; equipment or software information, In addition to the above-mentioned device information, we may collect the version number and browser type of the software you use. We collect information about the mobile applications and other software you use as necessary to ensure the security of your operating environment or to provide the Services. Device event information, including crashes, system activity information, and other relevant information.

6. Other information collected with your consent

In order to provide you with more convenient, better, and personalized products or services, some of our products and services may require you to provide specific personal sensitive information for specific functions. If you choose not to provide such information, you may not be able to use the corresponding function normally, but it will not affect your use of other functions in the service. These functions include:

(1) Application functions based on the camera (camera): You can complete the functions of video shooting, photo taking, code scanning and face recognition after enabling the camera/camera permission. We may apply face recognition technology to more scenarios in the future, but at that time we will confirm with you again whether you are willing for us to use your facial information to realize these extended functions.

(2) Photo/video access and upload application functions based on photo album (picture library/video library): You can use the corresponding function to edit your photos/pictures/videos after enabling the photo album permission.

(3) Application functions based on microphone voice technology: You can directly use the microphone to record or realize corresponding functions after enabling the microphone permission. In these functions, we will collect your recordings to recognize your voice content and achieve corresponding functional effects.

(4) Application functions based on address book information: We will collect your address book information after you enable the address book permission, so that you can more conveniently access the contact information in your address book when using the corresponding functions, without Then enter it manually.

(5) Calendar-based application functions: After you enable the permission to read/write your calendar, we will collect your calendar information for memo records and reminders.

(6) Application functions based on mobile phone file reading: You can use the corresponding functions to edit and process files in the mobile phone after enabling the file reading/uploading permission.

You understand and agree that the above application functions may require you to enable us to access your camera (camera), photo album (picture library), microphone (voice), address book and calendar in your device, in order to realize the functions required by these functions. The collection and use of the information involved. Please note that before collecting sensitive personal information, we will obtain your consent through a pop-up window or similar prominent means. If you voluntarily provide your sensitive personal information, you agree that we will process your sensitive personal information according to the purpose and method described in this policy

7. Your information shared by other third parties

It mainly includes two situations: (1) Information posted by other users may contain your information. (2) Information generated or shared when you use third-party partner services. When you log in to our software products or services using Weibo, QQ account or other third-party accounts, we need to verify your identity or bind Your account information, with your authorization to associate the relevant account with our products or services.

2. How we use the collected information

We strictly abide by the provisions of laws and regulations and the agreement with users, and use the collected information for the following purposes. If we use your information beyond the following purposes, we will explain to you again and obtain your consent.

1. To meet your individual needs: for example, language setting, location setting, personalized help service.

2. To provide you with services, product development and service optimization: For example, when our system fails, we will record and analyze the information generated when the system fails to optimize our services.

3. Security protection: For example, we will use your information for identity verification, security protection, anti-fraud monitoring, archive backup, customer security services and other purposes. For example, security software that you download or install can detect malicious programs or viruses, or identify scam messages for you.

4. Recommend advertisements, information, etc. that you may be interested in.

5. Evaluate and improve the effectiveness of our advertising and other promotions and promotional activities.

6. Manage software: For example, perform software certification, software upgrades, etc.

7. Invite you to participate in surveys about our services.

8. According to laws and regulations, collect and use your relevant information in the following situations, in which case your authorization is not required.

Related to national security and national defense security;

Related to public security, public health, and major public interests;

Related to criminal investigation, prosecution, trial and judgment execution;

In order to protect the major legal rights and interests of the personal information subject or other individuals such as life and property, but it is difficult to obtain the consent of the individual;

Necessary for maintaining the safe and stable operation of the products and/or services provided, including discovering and handling product and/or service failures, etc.;

Necessary for legitimate news reporting;

It is necessary for academic research institutions to carry out statistical or academic research based on public interests, and when providing academic research or description results to the outside world, de-identify the personal information contained in the results;

Other circumstances stipulated by laws and regulations.

9. Other purposes with your consent.

In order to allow you to have a better experience, improve our services or other purposes with your consent, we may use the information collected through certain services for our other services, subject to compliance with relevant laws and regulations. For example, use your information when you use one of our services to show you personalized content or advertisements in another service, and use it for user research analysis and statistics.

To ensure the security of our services and to help us better understand how our applications are functioning, we may record relevant information, such as how often you use the application, failure information, overall usage, performance data, and the source of the application. We do not combine the information we store in the analytics software with personally identifiable information you provide in the application.

3. How do we share, transfer and publicly disclose your personal information

We are fully aware of the legal responsibilities that should be borne when personal information is damaged due to illegal sharing, transfer, and public disclosure of personal information. For all sharing, transfer, and public disclosure of your personal information, we will strictly follow the following terms:

(1) Sharing

Respect for user privacy is one of our basic principles. Except for the following circumstances, we will not share your personal information with any company, organization or individual:

1. Sharing with explicit consent: After obtaining your explicit consent, we will share your personal information with other parties.

2. We may share your personal information externally in accordance with the requirements of judicial or administrative agencies.

3. Sharing with related parties: Your personal information may be shared with our affiliated companies. We will only share necessary personal information and be bound by the purposes stated in this Privacy Policy. If the affiliated company wants to change the purpose of processing personal information, it will ask for your authorization and consent again.

4. Sharing with authorized partners: Only to achieve the purpose stated in this policy, some of our services will be provided by authorized partners. We may share some of your personal information with our partners to provide better customer service and user experience. We will only share your personal information for legal, legitimate, necessary, specific, and clear purposes, and only share personal information necessary to provide services, for example, you must share your personal information with logistics companies when you purchase our products online information. Our partners have no right to use the shared personal information for any other purpose.

We will sign strict confidentiality agreements with companies, organizations and individuals with whom we share personal information, requiring them to process personal information in accordance with our instructions, this Privacy Policy and any other relevant confidentiality and security measures.

(2) Transfer

We will not transfer your personal information to any company, organization or individual, except in the following cases:

1. Transfer with explicit consent: After obtaining your explicit consent, we will transfer your personal information to other parties.

2. When it comes to mergers, acquisitions or bankruptcy liquidation, if it involves the transfer of personal information, we will require the new company or organization that holds your personal information to continue to be bound by this privacy policy, otherwise we will require the company or organization to Ask for your authorization again.

(3) Public disclosure

We will only publicly disclose your personal information under the following circumstances:

1. Disclose the personal information you specify in the disclosure method you expressly agree to

2. When your personal information must be provided in accordance with the requirements of laws and regulations, mandatory administrative law enforcement or judicial requirements, we may publicly disclose your personal information based on the type of personal information required and the method of disclosure. Under the premise of complying with laws and regulations, when we receive the above request for information disclosure, we will require to issue corresponding legal documents, such as subpoenas or investigation letters.

4. How do we protect your personal information

1. We have adopted industry-standard security measures to protect the personal information you provide to prevent unauthorized access, public disclosure, use, modification, damage or loss of data. We will take all reasonable and feasible measures to protect your personal information. For example, when exchanging data (such as credit card information) between your browser and the "service", it is protected by SSL encryption; we also provide https secure browsing methods for the website; we will use encryption technology to ensure the confidentiality of data; we will use Trusted protection mechanisms prevent data from malicious attacks; we will deploy access control mechanisms to ensure that only authorized personnel can access personal information; and we will hold security and privacy protection training courses to strengthen employees' awareness of the importance of protecting personal information .

2. We will take all reasonable and feasible measures to ensure that no irrelevant personal information is collected. Unless we have your written permission, we will only keep your personal information for 36 months after you delete or cancel your account. After this period, we will anonymize your personal information or 

destroy.

3. The Internet is not an absolutely secure environment, and emails, instant messaging, and communication with other users are not encrypted. We strongly recommend that you do not send personal information through such methods. Please use a complex password to help us ensure the security of your account.

4. The Internet environment is not 100% safe, and we will try our best to ensure or guarantee the security of any information you send to us. If our physical, technical, or management protection facilities are damaged, resulting in unauthorized access, public disclosure, tampering, or destruction of information, resulting in damage to your legitimate rights and interests, we will bear corresponding legal responsibilities.

5. After an unfortunate personal information security incident occurs, we will promptly inform you in accordance with the provisions of the second paragraph of Article 42 of the "Network Security Law": the basic situation and possible impact of the security incident, and the measures we have taken or will take Measures, suggestions that you can independently prevent and reduce risks, remedial measures for you, etc. We will promptly inform you of the relevant circumstances of the incident by email, letter, phone call, push notification, etc. When it is difficult to inform the personal information subject one by one, we will issue an announcement in a reasonable and effective manner. At the same time, we will also actively report the handling of personal information security incidents in accordance with the requirements of the regulatory authorities.

V. How do you manage your personal information

1. You can access, modify and delete the registration information and other personal information you provided during the process of using our services, or contact us according to the notification guidelines. The scope and method of your access, modification and deletion of personal information will depend on the specific services you use.

For example, if you want to stop sharing your geographic location information when using geographic location-related services, you can stop sharing through the mobile phone location off function, hardware and software service providers, and communication service providers to stop sharing. It is recommended that you carefully read the relevant guidelines .

2. We will collect and use your information only to realize the functions of our products or services as described in this policy.

If you find that we have collected and used your personal information in violation of laws, administrative regulations or the agreement between the two parties, you can ask us to delete it.

If you find that your personal information collected and stored by us is wrong, you can also ask us to correct it.

When you access, modify and delete relevant information, we may require you to perform identity verification to ensure the security of your account.

3. In the following situations, we will not be able to respond to your request in accordance with the requirements of laws and regulations:

Directly related to national security and national defense security.

Directly related to public safety, public health, and major public interests.

Directly related to criminal investigation, prosecution, trial and judgment execution.

There is sufficient evidence that you have subjective malice or abuse of rights.

Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals and organizations.

involving trade secrets.

6. Personal information about children

Our products, websites and services are primarily intended for adults. Minors may not create their own user accounts without the consent of their parents or guardians. For the collection of minors' personal information with the consent of their parents, we will only use or publicly disclose this information when required by judicial or administrative agencies, with the explicit consent of parents or guardians, or when it is necessary to protect minors.

Although local laws and customs define minors differently, we consider anyone under the age of 16 to be a minor.

If we discover that we have collected personal information about minors without prior verifiable parental consent, we will try to delete the data as soon as possible.

7. How to update this policy

Our Privacy Policy will be updated from time to time.

Generally, we will not reduce your rights under this Privacy Policy. We will post the updated version on this page and notify you of any changes to this policy with a pop-up box or an equivalently prominent means of the pop-up box. Once you agree, you agree to be bound by the revised policy.

标签:information,use,Cube,personal,will,services,Switch,Policy,your
From: https://www.cnblogs.com/chars2018/p/17638075.html

相关文章

  • Java的流程控制(选择结构语句 if ~ switch &循环结构语句dowhile ~ for)
    前言程序执行的控制流程分为三种,也称为三种结构,分别是:顺序结构、和循环结构。顺序结构指的是程序执行按照代码的编写顺序,依次从上往下开始执行,直到程序结束。程序的执行默认是顺序执行的一、选择结构语句1.if条件语句一个if语句包含一个布尔表达式和一条或多条语句if(布尔表达......
  • rockchip平台关闭硬件加速 vendor.hwc.compose_policy
    修改位置:device/rockchip/rk356x/device.mk:114:        vendor.hwc.compose_policy=1\这个值是在/hardware/rockchip/hwcomposer/drmhwc2/rockchip/platform/rk3588/drmvop3588.cpp:2923:intiMode=hwc_get_int_property("vendor.hwc.compose_policy",&qu......
  • Go语言中的switch语句
    Go语言提供了两种主要形式的switch语句,它们分别有不同的用途和特点。1.基于值的switch这种形式的switch语句是基于一个表达式的值来决定执行哪个case语句块。这与许多其他编程语言中的switch语句相似。语法:switchexpression{casevalue1://codetobeexe......
  • stm32cubemx 配置波特率
    1、参考链接:https://www.cnblogs.com/forever-youth/p/15807690.html 2、步骤:   1、先算出连接can总线的PCLK1时钟频率   2、再根据公式:can波特率=pclk1/((tbs1+tbs2+sync_seg)*brp)     其中PCLK1就是时钟频率,sync_seg一般默认固定为1   ......
  • Switch语句使用方法和注意点
    Switch语句是一种多分支选择结构,与case、break、default配合使用,控制程序运行流程。Break控制退出Switch代码块,如果不使用break控制,程序会顺序执行后续case语句中的代码。default可以用来做错误处理,专门处理case以外的所有情况。intmain(){ intday=0; printf("请输入数字:")......
  • Switch 分支结构
    Switch分支结构基本结构switch(表达式){​ case:常量1:语句块1;​ case:常量2:语句块2;​ case:常量3:语句块3;​ ......​ default:​ default语句块;​ break;}表达式应当是一个具体的值break表示退出没有一个匹配case后的值,自动执行defaul;流程图案例im......
  • Striving for Simplicity and Performance in Off-Policy DRL: Output Normalization
    发表时间:2020(ICML2020)文章要点:这篇文章基于SAC做简单并且有效的改进来提升效果。作者首先认为SAC里面的entropy是为了解决actionsaturationduetotheboundednatureoftheactionspaces,这个意思就是说动作空间假如约束到[0-1],动作通常会在0和1两个端点处,而加了entropy可......
  • switch
    #include<iostream>usingnamespacestd;intmain(intargc,char**argv){ intn; cin>>n; chara[n]; intb; for(inti=0;i<n;i++){ cin>>a[i]; if(a[i]<=57&&a[i]>=48){ b=0; }else{ b=1; } switch(b){ c......
  • Ubuntu20.04 下编译和运行 FreeSWITCH的问题汇总
    1.Ubuntu20.04下编译和运行FreeSWITCH的问题汇总1.1.环境Ubuntu20.04.2LTS(Linux5.4.0-152-genericx86_64GNU/Linux)FreeSWITCH-1.10.9-release1.2.结论根据配置和编译过程中的错误提示,基本上就是一些依赖库的缺失问题,根据提示给出的依赖库及其版本要求,只要能在a......
  • Kubenrtes k8s Pod镜像拉取策略与pod重启策略,imagePullPolicy restartPolicy
    Pod镜像拉取策略我们在创建pod的时候,他都需要一个镜像,他需要这个镜像的时候我们呢怎么拉取这个镜像,有个策略#下载策略有三个[root@k8s-master1~]#kubectlexplainpod.spec.containers.imagePullPolicyKIND:PodVERSION:v1FIELD:imagePullPolicy<string>#这......