2222

222


Defenders Of Realm:An Epic War

<h2>Privacy Policy</h2> <p>User privacy policy introduction: we regard user information security and privacy protection as our &quot;lifeline&quot;. Adhering to the concept of &quot;all based on user value&quot;, we are committed to improving the transparency of information processing, enhancing your convenience in information management, and ensuring your information and communication security. We strictly abide by laws and regulations, follow the following privacy protection principles, to provide you with more secure and reliable services:</p> <p>1.Safety and reliability: We do our utmost to prevent your information leakage, damage and loss through reasonable and effective information security technology and management process.</p> <p>2.Self determination: We provide you with convenient information management options, so that you can make appropriate choices and manage your personal information.</p> <p>3.Protecting communication secrets: We strictly abide by laws and regulations, protect your communication secrets, and provide you with secure communication services.</p> <p>4.Reasonable and necessary.... Introduction to User Privacy Policy We regard user information security and privacy protection as our &quot;lifeline&quot;. Adhering to the concept of &quot;all based on user value&quot;, we are committed to improving the transparency of information processing, enhancing your convenience in information management, and ensuring your information and communication security. We strictly abide by laws and regulations, follow the following privacy protection principles, to provide you with more secure and reliable services:</p> <p>1.Safety and reliability: We do our utmost to prevent your information leakage, damage and loss through reasonable and effective information security technology and management process.</p> <p>2.Self determination: We provide you with convenient information management options, so that you can make appropriate choices and manage your personal information.</p> <p>3.Protecting communication secrets: We strictly abide by laws and regulations, protect your communication secrets, and provide you with secure communication services.</p> <p>4.Reasonable Necessity: In order to provide better service to you and other users, we only collect necessary information.</p> <p>5.Clear and transparent: We strive to use concise and easy-to-understand expressions to introduce you to privacy policies so that you can clearly understand our information processing methods.</p> <p>6.Integrate privacy protection into product design: We integrate various factors such as law, product and design into the concept of privacy protection in every link of product or service development. This Privacy Policy mainly tells you what information we collect; the use of information we collect; and your rights. I hope you will read the Privacy Policy carefully and understand in detail how we collect and use information so that you can better understand our services and make appropriate choices. If you use our service, it means that you agree with what we have said in this policy.</p> <p>1.The information we collect is based on the principles of legality, legitimacy and necessity, and we only collect the information necessary to realize the function of the product.</p> <p>1.1 information you voluntarily provide when you use our services.</p> <p>1.1.1the information you fill in when you register your account. For example, the nickname and cell phone number you wrote when you registered your account.</p> <p>1.1.2upload information when you are using the service. For example, when you use your account, upload your avatar and share photos.</p> <p>1.1.3information you sent through our customer service or participate in our activities. For example, the questionnaire you filled out when you participated in our online activities may contain your name, telephone number, home address and other information.</p> <p>1.2we get information when you use the service.</p> <p>1.2.1log information. When you use our services, we may automatically collect relevant information and store it as service log information.</p> <p>(1)equipment information. For example, information such as device type, operating system version, unique device identifier, battery, signal strength, etc.</p> <p>(2)software information. For example, the version number and browser type of the software. To ensure the security of the operating environment or to provide services, we will collect information about mobile applications and other software you use.</p> <p>(3)IP address.</p> <p>(4)service log information. For example, when you use our service, you search, view information, service failure information, referral website and other information.</p> <p>(5)communication log information. For example, the account, communication time and time that you used to communicate when we used our service.</p> <p>1.2.2location information. When you use location-related services, we may record the location information of your device in order to provide you with relevant services.</p> <p>(1)The information provided by you or other users when using the service may contain the location information of your location, such as the information of your location in the account information you provide, the geographic tag information contained in the photos shared by you or others;</p> <p>1.3Information shared by other users contains your information, for example, photos or videos shared by other users may contain your information.</p> <p>1.4Information obtained from third-party partners may provide information that you generate or share when using thirdparty partner services. For example, when you log in to the third party partner service with Wechat or QQ account, we will get the name and time of your login to the third party partner service, which will facilitate your authorization management. Please read carefully the user agreement or privacy policy of the third party partner service.</p> <p>2.How do we use the collected information? We strictly abide by the laws and regulations and the agreement with users. We use the collected information for the following purposes. If we use your information for more than the following purposes, we will explain it to you again with your consent.</p> <p>2.1to provide you with services.</p> <p>2.2meet your personalized needs. For example, language settings, location settings, personalized help services.</p> <p>2.3product development and service optimization. For example, when our system fails, we record and analyze the information generated when the system fails, and optimize our services.</p> <p>2.4safety assurance. For example, we will use your information for authentication, security, anti-fraud monitoring, archive backup, customer security services and other purposes. For example, the security software you download or install will detect malicious programs or viruses, or identify fraudulent information for you.</p> <p>2.5recommend to you what advertisements and information you may be interested in.</p> <p>2.6evaluate and improve our advertising and other promotional and promotional activities.</p> <p>2.7management software. For example, software certification and software upgrading.</p> <p>2.8invite you to take part in the investigation of our service. In order to let you have a better experience, improve our services or other uses with your consent, we may use the information collected by some services for other services in accordance with relevant laws and regulations. For example, use your information when using one of our services to show you personalized content or advertisements in another service, and use it for user research, analysis and statistics. To ensure the security of the service and help us better understand how our application works, we may record relevant information, such as how often you use the application, failure information, overall usage, performance data, and the source of the application. We will not combine the information we store in the analysis software with the personal identity information you provide in the application.</p> <p>Third, how can we use Cookie and related technologies, or our third-party partners, to collect your information, possibly by placing secure Cookies and related technologies, in order to provide you with more personalized user experience and services? We will strictly request the third party partners to comply with the relevant provisions of this policy. You can also configure Cookie by browser. Note, however, that if you disable Cookie, you may not be able to enjoy the best service experience and some services may not work properly. If you want to know more about the security of Cookie, please refer to the Cookie policy statement.</p> <p>Fourth, you can share your information with your friends, family members and other users through our service. Please note that this may include sensitive information such as your personal identity information, personal property information and so on. Please carefully consider disclosing your personal sensitive information. You can control the range of information you share through the privacy settings in our service, or you can delete the information you publicly share through the settings in the service or the guidelines we provide. But please note that this information may still be kept independently by other users or unrelated third parties outside our control. Five, how do you manage your own information?</p> <p>5.1 You can access, modify and delete the registration information and other personal information provided by you in the process of using our service. You can also contact us in accordance with the notification guidelines. The scope and mode of your access, modification and deletion of personal information will depend on the specific services you use. For example, if you want to stop sharing your geographic location information when using geographic location-related services, you can stop sharing through the mobile location shutdown function, the shutdown mode of software and hardware service providers and communication service providers. It is recommended that you read the relevant guidelines carefully.</p> <p>5.2 According to this policy, we will collect and use your information only to realize the functions of our products or services. If you find that we violate the provisions of laws, administrative regulations or the agreement between the two sides to collect and use your personal information, you can ask us to delete it. If you find that your personal information we collect and store is wrong, you can also ask us to correct it. Please contact us through the contact information listed in this policy.</p> <p>5.3 When you visit, modify and delete relevant information, we may require you to authenticate to ensure the security of your account.</p> <p>5.4 Please understand that due to technical constraints, legal or regulatory requirements, we may not be able to meet all your requirements. We will respond to your request within a reasonable period of time.</p> <ol> <li>The information we share is strictly restricted by laws and regulations, such as:</li> </ol> <p>6.1with your prior consent, we may share your personal information with the third party.</p> <p>6.2For external processing purposes only, we may work with third-party partners (third-party service providers, contractors, agents, advertising partners, application developers, etc.), e.g., communication service providers who send e-mail or push notifications on behalf of us, map service providers who provide location services for us. They may not be in your jurisdiction) to share your personal information and allow them to process the above information for us in accordance with our instructions, privacy policies and other relevant confidentiality and security measures for the following purposes:</p> <p>6.2.1to provide you with our services; </p> <p>6.2.2to achieve the purpose described in the section &quot;How do we use the collected information&quot;;</p> <p>6.2.3 fulfilling our obligations and exercising our rights in this policy;</p> <p>6.2.3understands, maintains and improves our services. If we share your information with the above-mentioned third parties, we will use encryption, anonymous processing and other means to protect your information security.</p> <p>6.3With the sustained development of our business, when mergers, acquisitions, asset transfers and other transactions lead to the sharing of your personal information with third parties, we will inform you of the relevant situation by pushing notifications, announcements and other forms, and continue to protect or require new managers in accordance with laws and regulations and standards not less than those required by this policy. Continue to protect your personal information.</p> <p>6.4we will use the collected information for big data analysis. For example, we will use the information collected to analyze and form city thermodynamic plans or industry insight reports that do not contain any personal information. We may publicize and share with our partners information that is statistically processed and does not contain identifying content, to understand how users use our services or to inform the public about the general trends in the use of our services.</p> <p>6.5we may disclose your personal information for the following purposes:</p> <p>6.5.1comply with applicable laws and regulations.</p> <p>6.5.2complying with the provisions of court judgments, rulings or other legal procedures;</p> <p>6.5.3comply with the requirements of relevant government agencies or other statutory authorized organizations.</p> <p>6.5.4we have reason to believe that we need to comply with relevant laws and regulations.</p> <p>6.5.5Reasonable and necessary uses for the implementation of relevant service agreements or policies, the maintenance of social and public interests, and the protection of personal property safety or other legitimate rights and interests of our customers, our affiliated companies, other users or employees.</p> <p>Seven, we may send information to you.</p> <p>7.1 When you use our service, we may send you e-mail, short message, information or push notification. You can choose unsubscribe on the device according to our related hints.</p>

页面列表

ITEM_HTML