How do we collect your information?
Personal information means any information in electronic form or otherwise, by which, solely or combined with other information, a natural person can be identified. We may collect one or more types of the below information according to different circumstances: type of device, IP address, location data, log accrued from using our websites, operations or activities carried out on our websites. Only if any of the above information contains any personal information, or if we use any of the above information in combination with personal information, we will treat the information as personal information. According to applicable laws and regulations, if any of the above information falls within the ambit of personal information, we will also take such information as personal information according to relevant provisions under the applicable laws and regulations.
We will take all reasonable steps to make sure that we will only collect your information on a necessary basis. We will not collect all your above information in one time. Instead, We may collect your different information by the below approaches under different circumstances:
1.1 When you open our websites, or when we provide data synchronization to you, or when your location refreshes, we may collect the your IP address, as well as the location when you provide us relevant permissions. In addition, when you open our or websites, we may also identify the type of your device.
1.2 When you provide us the permission to acquire your location and use our location-based services, we may determine your location by the GPS, WIFI or mobile network signal sent via your device, so that we may deliver more customized services based on your location, such as weather services. You can stop sharing your location with us by adjusting the application permissions on your devices. You can stop sharing your location with us via GPS by adjusting the GPS settings of your device. You can also contact your mobile network operator to get information on how to stop location sharing based on WIFI or mobile network signal. But if you are not willing to share your relevant location information with us, you will still have to avoid filling or select any location on our websites. Otherwise, we will still acquire the location you selected or filled in for the purpose to provide location-based services. If you do not share your location with us, the delivery of our location-based services will be influenced.
1.3 When you contact us, we may acquire your email, QQ ID or any other social network account you used to contact us.
1.4 Under all the above situations and when you participate in our lottery and other promotion activities or market survey, browse any content, send any feedback or report any information, redirect to our websites, redirect to any third party’s applications or websites, we may record the information you filled in as well as the operations and activities you carried out on our websites. We may also read the log accrued from your previous operations and activities. If you actively share with us or publish your file or document when you carry out the above activities, we may also acquire such information.
How do we use your information?
Please understand, we will not use your information to actively identify your actual identity as a natural person or carry out automatic decision-making. Your information will be used within the necessary extent in the below approaches to:
2.1 adapt to the devices: we will adapt our services to the devices, display our pages, identify any abnormal conditions by processing the type of the device.
2.2 provide weather services: we will display the weather information according to your location data.
2.3 keep service log: we will store your IP address, the type of your device, the location you located in or you selected in our service log, to record the status and quality of our services.
2.4 provide more customized services: the information you shared with us when using our websites will help us to know you better. We may use such information to provide more customized services to you, including to recommend advertisements and articles which may better match with you.
2.5 contact you: upon your request, we may contact you via the contact information provided by you.
2.6 carry out data analysis, statistics and research: by analyze, count and research the information you provided when using our websites, especially the log accrued from using our websites as well as your operations or activities carried out on our websites, we may know the current status of our products and services, assess the effects of our advertisements and other promotion activities, and we may also improve our products, services, the quality of our product and services, as well as your experience.
How do we apply cookie and relevant technologies?
When you visit our websites or use our services, we may use cookie or relevant technologies. Cookie is a data file established by the server and stored on your device, which can save the preference and settings of the device, as well as record which part of the sites has been visited by the device. Cookie may only be read by the server establishes such cookie. We use cookie and relevant technologies to provide to you services that are more convenient, safe and meet your preference better. We also use cookie and relevant technology to fulfill functions such as identity verification and traffic statistics. You can decide whether to refuse cookie. You can check the settings of your browser or consult with the supplier of your browser to know the detailed steps. But if you refuse cookie, your access to and use of our services may be influenced.
How is your information disclosed?
We may disclose your information to the third party on a necessary basis under the below circumstances, under which we will also require the third party to process such information according to applicable laws and regulations:
4.2 To comply with the applicable laws, regulations and the requirements of competent government authorities, we may also disclose your information accordingly.
4.4 When we are subject to transactions such as acquisition, reform and assets transfer, your information may be disclosed or even transferred to the third party as a part of such transactions.
4.5 Under other circumstances, we may also disclose your information to third parties with your prior consent.
Exceptions for requesting your consent
Under the below circumstances, we do not need to request your consent on the collection, use or disclose of your information, or provide services relating to the visit, change and deletion of such information:
5.1 where national security or national defense security is involved;
5.2 where public security, sanitation, material interest is involved;
5.3 where judicial or administrative enforcement relating to criminal investigation, litigation, judgement and execution is involved;
5.4 where such information is used to protect the life, property or any other material interest of you or any third party but your consent will be very difficult to obtain;
5.5 where your personal information is made public by your act;
5.6 where personal information is collected from any information legally disclosed to the public, including channels such as news and government information announcement;
5.7 any other situation provided by laws and regulations.
Please acknowledge, according to applicable laws and regulations, if we process the information by technical measures and any other necessary measures, so that such data may not be used to identify a specific person or reversed into personal information, or such data may not be used to identify a specific person without being combined with any additional information, then we will not notify you or request your consent on the use of such processed data.
How do we protect your information with reasonable measures?
We think very highly of the security of your information. To keep your information secure, we adopt reasonable safety technology and measures, which aim to prevent your information from inappropriate visit, use, change, damage and disclose. To ensure the security during information transfer, we adopt encryption technologies such as the transport layer security protocol, and use measures such as https when providing browsing services. When we store your information, we also adopt encryption technologies and necessary isolation measures. Moreover, we adopt physical protection measures to accomplish the physical isolation of your information, such as entrance guard, control on access to physical location, authorization management on personnel, monitoring, etc.
But please understand, no matter what security measures we adopt, we cannot ensure your information will be absolutely secure. Neither can we be responsible to you for any information security issues caused by any third party.
Please be particularly noted that, when you use our websites and services, we may provide you the channel to share information with others. If you share your information with others or publicly post your information via our channel, then other people may visit, read, store or share your information. You should be responsible for the information shared or publicly posted via our channel. We also especially suggest you to pay more attention to the security of such information.
How is your information stored and transferred?
We provide services all over the world. To the extent allowed by applicable laws and regulations, your information may be transferred or visited globally based on the location you visit our websites or use our services. When cross-border transfer or visit involves, we will comprehensively protect your information according to applicable laws and regulations.
How can you visit, change and delete your information?
If you need to visit or update the personal information of you, or if you would like to request us to delete your personal information according to the applicable laws and regulations, you can send email to our official user service email address (email@example.com) to contact us. We will provide you the approach to visit, update or delete your personal information, unless the applicable laws and regulations do not grant you the rights to do so.
We will respond to your request within a reasonable period. To verify your identity, we may request you to provide relevant materials which may be competent to prove your identity before we further deal with your request. In principle, we may not charge you for any reasonable request. But as to repeated requests or requests beyond reasonable extent, we may charge you according to the specific situation. We may refuse any repeated requests, or requests which is not directly associated with your identity, or takes unreasonable technical measures to respond, or brings risk to legal interest of others, or is not practical, or may be refused according to applicable laws and regulations.
Information of children.
Third party services.