Privacy Policy and User Agreement
This privacy policy introduces the company’s privacy data-related policies and practices, which will cover the personal information we collect, use, process, store and disclose that is collected about you through the company’s mobile app . Please read our privacy policy carefully.
1. How does the company collect your personal information
Personal information is data that can be used to uniquely identify or contact someone. When you use our company's mobile App, we will collect your personal information, such as email address and phone number, during the user registration process. In order to protect personal privacy, you should not provide any other information except as specifically requested by the company.
2. How the company uses your personal information
1 , through your personal information, the company moved to send your App service information.
2 , your personal information is achieved through passwords retrieve functions.
3 , in addition to a reorganization of the Company, merger or sale, you can transfer all personal information we collect to the relevant third party, the Company will not provide any unrelated third party, sell, rent, share or trade your personal information, Unless you have obtained your permission in advance, or the third party and the company provide services to you individually or jointly, and after the service ends, they will be prohibited from accessing all the information that they were able to access before.
3. Personal Information Security
Ensuring the security of your personal data is of the utmost importance to us. When you register and enter personal data in our mobile App , we will use Secure Sockets Layer technology ( SSL ) to encrypt this information. Data transmission and data storage in two stages, we will widely accepted by the industry standard quasi (such as firewalls, encryption and data privacy legal requirements) to protect you submit to us information. However , no method of internet transmission or electronic storage is 100% secure. Therefore, although we protect your personal information through commercially acceptable means, we still cannot guarantee the absolute security of the information.
4. How long will the company keep personal information
In general, the company will only retain your personal information for the period required to fulfill the purpose of collection, and will comply with the data retention period stipulated by applicable laws.
Five, legal disclaimer
We have the right to disclose you when required by law and when the company believes that information related to you must be disclosed to protect the company’s legal rights or to comply with judicial procedures, court orders or legal procedures applicable to the company’s mobile app Personal information. If the company determines that disclosure is reasonably necessary in order to enforce the company's terms and conditions or protect our operations, we may disclose information about you.
6. Changes to this privacy policy
If you decide to change the privacy policy, we will post these changes in this policy, on our company’s website, and where we deem appropriate, so that you can understand how we collect and use your personal information, who can access this information, and where Under circumstances, we will disclose this information.
The company reserves the right to modify this policy at any time, so please check it frequently. If you make a major change to this policy, the company will notify you through a website notice.
7. Carry out internal data analysis and research, third-party SDK statistical services, and improve our products or services. We collect data based on your interaction with us and the choices you make, including your privacy settings and the products and services you use. Features. The data we collect may include SDK/API/JS code version, browser, Internet service provider, IP address, platform, timestamp, application identifier, application version, application distribution channel, independent device identifier, iOS advertising identifier character ( the IDFA ), Andrews advertiser identifier, the card ( the MAC ) address, international mobile equipment identity ( the IMEI ), the device type, the terminal manufacturer, a terminal device operating system version, session start / stop time, language, location, time zone, and Network status ( WiFi, etc.), hard disk, CPU and battery usage, etc.
8. About Android sensitive permissions
Get mobile phone contact information. It is mainly used to synchronize mobile phone contacts to the hardware device, so that users can directly dial or view contacts through the hardware device.
Nine, privacy issues
If you have any questions or concerns about our privacy policy or data processing, please contact legend_wgl@yeah.net
User Agreement
Users in the use of technology developer (ie, hereinafter referred to as " technology development side " ) before providing the services, should read the "User Agreement" carefully (hereinafter referred to as " the Agreement " ). Once the user logs in or uses the services of the technology developer, it is deemed that the user has understood and expressly agreed to the contents of this agreement, and this agreement immediately has legal effect between the user and the technology developer. All activities of users logging in and using this product service will be bound by this agreement and bear corresponding responsibilities and obligations. If the user does not agree to any content in this agreement, the user should immediately stop using all services provided by the technology developer. According to the "Network Security Law of the People's Republic of China", "Provisions on the Protection of Personal Information of Telecommunications and Internet Users" and relevant laws and regulations, and in accordance with the relevant agreements between the technology developer and its partners, the user must have explicitly authorized the technology developer to cooperate Partners (hereinafter referred to as " partners "), hereby expressly authorize and entrust technology developers and their affiliates to pass official or relevant real-name authentication platforms, credit information platforms (including but not limited to: credit reporting agencies, bank credit information platforms, online lending platforms, consumer finance platforms, Three-party payment platforms, provident fund platforms, investment and wealth management platforms, etc.) and other related platforms inquire, verify, and store users' personal credit information, and output it to partners for evaluation and reference use of users' personal credit. The user understands and agrees that the specific authorized query, verification, storage, and output content shall be subject to the information requested by the partner for query, verification, storage, output and the actual query, verification, storage, and output of the technology developer and its affiliates. The technology developer and its affiliates will process relevant personal information within the scope of authorization (including but not limited to all necessary processing for the purpose of the relevant agreement, including but not limited to encryption processing and mask processing for the protection of users’ personal information) and It is only provided to partners for use, but disputes between users and partners due to the validity of authorization, authorized content, authorization scope, authorization period, etc. have nothing to do with the technology developer. If the user has any objection or dispute to the above-mentioned authorized matters of the partner, he should immediately stop using all the services provided by the technology developer. When the user uses this service, it means that the user has expressly authorized to inquire, verify, process, store, and use his personal information within the agreed scope of partners, technology developers and their affiliates, and to verify the validity of the authorization and the content of the verification There are no factual or legal objections or disputes on related matters such as query verification platform, processing method, scope of use, etc. In view of the fact that the user must authorize the partner and be notified by the partner of the service before being able to enter, log in and use the service, when the user logs in or uses the service, it is deemed that there has been a legal, legal, and legal relationship between the user and the technology developer’s partner. Sufficient, necessary, and irrevocable authorization, and the user is clearly aware of the relevant adverse effects that may be caused by the authorization to provide relevant information, such as negative credit ratings. In order to protect the personal information of users, the technology developer will take reasonable measures to keep the user information strictly confidential, and at the same time supervise and require the specific partner to keep it strictly confidential. Without the authorization of the user, the technology developer and its affiliates will not provide user information to any other party.
—, the subject of the agreement
This agreement is an agreement between the user and the technology developer regarding the user's use of this service.
2. About this service
1. The content of this service refers to the related services provided by the technology developer to its partners and users through this application ( " this service " )
2. For users of this service, technology developers will continue to enrich the terminals and forms of users using this service.
3. Scope of license:
- ( 1 ) The technology developer grants users a personal, non-transferable and non-exclusive license to use this application.
- ( 2 ) All other intellectual property rights not expressly authorized by this article and other terms of this agreement are still reserved by the technology developer. If the technology developer fails to exercise any of the aforementioned rights, it does not constitute a waiver of that right.
Three, account login
To use this application, users may need to enter personal information to log in and use. The user clearly understands that the account he provides to the technology developer is for his own use only, otherwise, the user may cause infringement to the user or others. The user promises and agrees that using the same device, the same ID number or account to use the services under this agreement will be regarded as the user's own behavior. Users should properly keep their own equipment, ID documents and account password information, and prudently hand them over to others to use or use other’s equipment, ID documents or account information. If the user’s environment violates this agreement and causes losses to the user or others, the technology developer should not also Will not bear any legal responsibility. If the user causes losses to the technology developer, he shall bear all the losses suffered by the technology developer.
Fourth, the use of the application
If a user obtains this application or an installation program with the same name as this application from an application of a non-technical developer partner or a non-technical developer partner, the technology developer cannot guarantee that the application can be used normally, and is therefore We are not responsible for the losses caused to users.
Five, application update
In order to enhance user experience and improve service content, technology developers will continue to provide users with application updates from time to time (these updates may take the form of application replacement, modification, function enhancement, version upgrades, etc.). In order to improve the user experience and ensure the security of the service and the consistency of the functions, the technology developer has the right to update the application without special notice to the user, or to change or restrict some of the functions of the application.
6. User personal information protection
1 • Protecting users' personal information is a basic principle of technology developers, and technology developers will take reasonable measures to protect users' personal information. In addition to laws and regulations and circumstances authorized users, without the user's permission technical development side will not be disclosed to any third party, thoroughly exposed users' personal information .
2 • The user may need to fill in some necessary information when logging in to the account or using the service. If the information filled in by the user is untrue or incomplete, the service may not be used normally.
3 •—In general, users can browse and modify the information submitted by themselves at any time, but for the sake of integrity and identity recognition, users may not be able to modify the initial registration information and other verification information provided during registration.
4 • The technology developer will use various security technologies and procedures to establish a complete management system to protect users' personal information from unauthorized access, use or disclosure.
7. Authorized matters and code of conduct
1 • Authorized matters
- ( 1 ) The user fully understands and agrees: When using this service, the user may need to use the relevant authority, interface and related equipment information of the user's terminal device to realize the corresponding function.
- ( 2 ) The user may choose not to provide certain information of the user to the technology developer, but the related service function may not be realized due to the |
- ( 3 ) In order to achieve the purpose of this agreement to provide partners and users with better and safer services, the user agrees and expressly authorizes the technology developer and its affiliates to query, verify, store, process and process the user’s relevant personal information. Use within the agreed scope (provided to the user's authorized partners for credit evaluation and reference use of the user). The technology developer and its affiliates keep the personal information of users strictly confidential. The authorization under this agreement is irrevocable.
- ( 4 ) The user knows and expressly authorizes and agrees that the technology developer and its affiliates are entrusted by partners to legally inquire, verify, and review user information from third-party credit reporting agencies or data agencies in accordance with relevant laws and regulations. The above information includes But not limited to personal information, characteristic information (including but not limited to user’s court dishonesty information, network dishonesty information, whether it is wool party information, whether it has used communication trumpets and suspicious device information, etc.), related information (that is, user’s The relationship between ID card information, mobile phone number, mobile phone equipment, and bank card to determine whether there is any abnormality in user information, the relationship is not limited and specific personal sensitive information), loan transaction information, online investment and financial information, J product Earning partners need to verify or refer to relevant user information such as financial information, public utility information, central bank credit reports, personal network data information, etc. The information specifically inquired, verified, and reviewed by the technology developer shall ultimately be subject to the information that the partner needs to verify, reference use, and actual verification and use. The information obtained by the technology developer is only used in the business-related work of the partner, such as the evaluation of personal credit information between the user and the partner. The technology developer and its affiliates will provide the acquired information to the partner. In addition, without the user’s authorization, the technology developer and its affiliates shall not and will not disclose, disclose or disclose to other institutions or individuals. Provide user information
2 • User prohibited behaviors Unless permitted by law or written permission by the technology developer, users shall not engage in the following behaviors:
- ( 1) Delete the copyright information on this application and its copies.
- ( 2 ) Reverse engineering, reverse assembly, reverse compilation of this application, or try to discover the source code of this application in other ways.
- ( 3 ) Use, rent, lend, copy, modify, link, reprint, compile, publish, publish, etc., the content of intellectual property owned by the technology developer.
- ( 4 ) By modifying or forging the instructions and data in the operation of the application, adding, deleting, changing the function or operating effect of the application, or operating or disseminating the application and method used for the above purposes to the public, no matter Whether these actions are for commercial purposes.
- ( 5 ) Interfere with this application and its components, modules, data, etc. by yourself, authorize others or use third-party applications.
- ( 6 ) Other behaviors not expressly authorized by the technology developer.
3. Responsible for their own actions. The user fully understands and agrees that the user must be responsible for his authorization to the partner (including but not limited to the authorization method, authorization content and authorization period, etc.) and the related behavior under his account. The technology developer will urge partners to obtain user authorization before they can inquire, verify or use relevant information and require partners to keep the user’s information strictly confidential, but users should judge the content that they come into contact with when using this service. If you have any objections or disputes about authorization-related matters and information security, you should stop using this service immediately. The technology developer cannot and will not be liable for any disputes or disputes between the user and the partner. If the user does not immediately stop using the service as required by the agreement, the technology developer will not be responsible for any disputes or disputes caused by the technology developer. No responsibility will be assumed for risks or losses.
8. Intellectual Property Statement
1 • The technology developer is the owner of the intellectual property rights of this application. The copyright of this application : intellectual property rights, trademark rights, patent rights, trade secrets and other intellectual property rights, and all information content related to this application (including but not limited to text, pictures, audio, video, graphics, interface design, layout framework , Relevant data or electronic documents, etc.) are protected by the laws and regulations of the People's Republic of China and corresponding international treaties. The technology developer enjoys the above-mentioned relevant intellectual property rights in accordance with the law, except for the rights that the relevant right holders should enjoy in accordance with the law.
2 • Without the written consent of the technology developer or related right holders, the user shall not implement, utilize, or transfer the above intellectual property rights for any commercial or non-commercial purposes by himself or by a third party.
Nine, terminal security responsibility
1 • The user understands and agrees that this application or this service, like most Internet applications and services, may be affected by a variety of factors (including but not limited to user reasons,] network service quality, social environment, etc.); or will be affected by the intrusion of various security issues the I (including but not limited to unlawful use of user data, a reality harassment; users download and install other applications or other Web sites you visit may contain viruses, Trojan horses or other malicious programs, Threaten the security of user terminal information and data, and then affect the normal use of this application and this service, etc.). Therefore, users should strengthen the awareness of information security and personal information protection, and pay attention to password protection to avoid losses. When the above situation occurs, the technology developer will work hard to cooperate with the relevant parties at the first time to repair in time, but the loss caused to the user by the technology developer is exempted within the scope permitted by law.
2. Youhu shall not make, publish, use, or disseminate malicious programs used to steal the account of the technology developer and the personal information and property of others.
3 • Maintaining the security and normal use of the application is the joint responsibility of the technology developer and the user. The technology developer will reasonably and prudently take necessary technical measures to protect the user's terminal information and data security in accordance with industry standards.
4 • To the extent permitted by law, the technology developer shall not be liable for service interruption or obstruction caused by the following circumstances:
- ( 1 ) Damaged by computer viruses, Trojan horses or other malicious programs, or hacker attacks.
- ( 2 ) The computer software, system, hardware, and communication line of the user or technology developer fails.
- ( 3 ) Improper user operation.
- ( 4 ) The user uses this service in a manner not authorized by the technology developer.
- ( 5 ) Circumstances beyond the control or reasonably foreseeable by other technology developers.
10. Force majeure and reasonable exemption
" Force majeure " refers to an objective situation that occurs after the signing of this agreement that the affected party cannot foresee, avoid and cannot overcome. Such events include but are not limited to floods, fires, droughts, typhoons, earthquakes and other natural disasters, strikes, commotions, riots and wars, as well as actions or omissions of government departments, adjustments to laws and regulations or policies, changes in data sources (including but not Limited to changes in its service content and form), domestic data channel paralysis, hacking, computer virus intrusion, new virus outbreak, network interruption due to telecommunications operator problems, server inaccessibility, power outage, system failure, transmission line, communication failure, etc. Factors beyond the control of the developer. Failure to perform or fail to fully perform this agreement due to the influence of force majeure shall not be regarded as a breach of contract and shall not be liable for corresponding breach of contract.
11. Other
1. When the user uses this application or this service, it is deemed that the user has read and agreed to be bound by this agreement. The technology developer has the right to modify the terms of this agreement when necessary. Users can check the relevant agreement terms in the latest version of this application and this service. After the terms of this agreement are changed, if the user continues to log in, use this application, and this service, it is deemed that the user has accepted the revised agreement. If the user does not accept the revised agreement, he should stop using this application.
2 • The establishment, entry into force, performance, interpretation and dispute resolution of this agreement shall be governed by the laws of the mainland of the People’s Republic of China (excluding conflict of laws).
3 • If any dispute or dispute occurs between the user and the technology developer, it should be settled through friendly negotiation; if the negotiation fails, the user agrees to submit the dispute or dispute to the jurisdiction of the local people's government of the defendant.
4 • The headings of all the terms of this agreement are for reading convenience only, they have no actual meaning and cannot be used as the basis for interpretation of the meaning of this agreement.
5 • No matter the terms of this agreement are partially invalid or unenforceable for any reason, the remaining terms are still valid and binding on both parties.