Privacy Statement
The FerroAlloyNet APP respects and protects the personal privacy of all users. In order to provide you with more accurate and personalized services, FerroAlloyNet APP will use and disclose your personal information in accordance with the provisions of this Privacy Policy. However, FerroAlloyNet APP will treat this information with a high degree of diligence and prudence. Except as otherwise provided in this Privacy Statement, FerroAlloyNet APP will not disclose or provide your information to third parties without permission. FerroAlloyNet APP will update this privacy statement from time to time. When you agree to the service agreement, you are deemed to have agreed to the entire content of this privacy statement. This privacy statement is an integral part of FerroAlloyNet APP service use agreement.
I. Scope of application (information collection)
i. In order to provide you with continuous and stable services and to ensure the security of your use of the APP, you are required to provide basic registration or login information, including personal user identity information (name, gender, contact information, etc.) or corporate user information (company name, address, etc.), e-mail, contact information, etc., and create your account, username and password. At the same time, during your use of the service, in order to provide you with better services, understand the suitability of your products, identify abnormal account status, ensure network and operational security, and maintain the normal operation of basic functions, we may directly or indirectly collect, store and associate information about the services you use and how you use them, including:
a. Log information: When you use the "FerroAlloyNet" service, we will automatically collect your usage of our service and save it as relevant network logs, including but not limited to data such as your IP address, browser type, language used, date and time of access, software and hardware feature information, and web page records you need, etc.
b. Device information: In order to verify the commonly used login devices of your account and prevent account leakage, we will receive and record the relevant information of the devices you use, including hardware device serial number, operating system and version, client version, unique device identification code (such as IMEI/AndroidID/device MAC address), and obtaining installed applications and other information.
c. Third-party information collection (Aurora SDK (push), MobTech SDK (share)): At the same time, during use, we will share the device information we have collected, including but not limited to: hardware device serial number, operating system and version, client version, unique device identification code (such as IMEI/AndroidID/device MAC address) and other information, with third-party services (Aurora SDK (push), MobTech SDK (share)) to ensure the accuracy of the content we share and the push information we receive during the use of the app. (For more third-party information collection, please refer to Articles 5 and 6).
d. Third-party SDK information collection:
Aurora SDK: For information collection rules, please refer to the third-party SDK information collection and use in Article 5 or enter the relevant third-party privacy agreement terms through the link in Article 6.
MobTech SDK: For information collection rules, please refer to the third-party SDK information collection and use in Article 5 or enter the relevant third-party privacy agreement terms through the link in Article 6.
ii. User personal data obtained by FerroAlloyNet APP from business partners through legal channels.
iii. Dial: used to directly contact the official customer service
iv. Mobile phone storage, reading, writing, and taking pictures: (for picture download and upload)
v. Use of cookies: used to verify whether the login information is invalid, to collect your article browsing information
vi. Application installation list: In order to prevent other applications from pulling up this application and the services in FerroAlloyNet APP through push notification (Aurora SDK)
vii. Device information (such as IMEI/AndroidID/device MAC address, etc.): In order to verify the common login device of the account, prevent account leakage
viii. Log information: as an internal article browsing preference data statistics, to protect the security of information
ix. When running in the background: obtain (device MAC address, etc.), in order to ensure the security of user account information, You understand and agree that this Privacy Policy does not apply to the following information:
a. The keyword information you enter when using the search service provided by this application platform;
b. The relevant information data collected by this application that you publish in this application, including but not limited to supply, purchasing information and comment details;
c. Violation of legal provisions or violations of the rules of this application and the measures this application has taken against you.
II. Information use
i. FerroAlloyNet APP will not provide, sell, rent, share or trade your personal information to any unrelated third party, unless obtained your permission in advance, or the third party and FerroAlloyNet APP (including this application affiliates) provide you individually or jointly service, and after the end of the service, it will be prohibited from accessing all such materials including its previous access.
ii. FerroAlloyNet APP also does not allow any third party to collect, edit, sell or disseminate your personal information for free by any means. If any user of FerroAlloyNet platform engages in the above activities, once discovered, FerroAlloyNet has the right to immediately terminate the service agreement with the user.
iii. For the purpose of serving users, FerroAlloyNet APP may use your personal information to provide you with information that is of interest to you, including but not limited to sending you product and service information, or sharing information with this app's partners so that they can send you information about their products and services (the latter requires your prior consent).
III. Information disclosure
In the following cases, FerroAlloyNet APP will disclose your personal information in whole or in part according to your personal wishes or the provisions of the law:
i. Disclosure to third parties with your prior consent;
ii. In order to provide the products and services you have requested, it is necessary to share your personal information with third parties;
iii. In accordance with the relevant provisions of the law, or the requirements of administrative or judicial institutions, disclosure to third parties or administrative or judicial institutions;
iv. If you violate relevant Chinese laws, regulations or this application service agreement or related rules, it is necessary to disclose to a third party;
v. If you are a qualified intellectual property complainant and have filed a complaint, it is necessary to disclose it to the respondent at the request of the respondent, so that both parties can deal with possible rights disputes;
vi. In a transaction created on this application platform, if any party to the transaction fulfills or partially fulfills the transaction obligation and makes a request for information disclosure, FerroAlloyNet APP has the right to decide to provide the user with the necessary information such as the contact information of the counterparty to facilitate the completion of the transaction or the resolution of disputes.
vii. Other disclosures that FerroAlloyNet APP deems appropriate in accordance with laws, regulations or website policies.
IV. Information storage and exchange
The information and data about you collected by this application will be saved on the servers of FerroAlloyNet APP and/or its affiliates. Such information and data may be transmitted to and accessed, stored and displayed abroad in your country, region or outside the location where the application collects information and data.
V. Collection and use of third-party SDK information
1) Aurora SDK (for the message push function of the app)
Information Gathering (Aurora):
In accordance with the relevant laws and regulations mentioned in the introduction, and following the principles of legitimacy, legality and necessity, for the following purposes described in this policy, we will collect and use the personal information of you and/or your end users that you voluntarily provide during the use of this platform, that arise from your use of this platform, and that we obtain from third parties.
Regardless of the above scenarios for collecting and using your personal information and/or your end users, we will generally only do so with your consent, except in certain circumstances where personal information is collected from you and/or your end users based on a legal obligation or where it may be necessary to protect the vital interests of you or others.
Please understand that due to changes in business strategies, the functions of products and/or services on this platform may also be changed and developed. If we want to use your and /or your end user's personal information for other purposes not specified in this policy, or the personal information collected for a specific purpose will be used for other purposes, we will inform you through this platform in a reasonable manner and obtain your consent again before use.
i. Your Personal Information as a Aurora Developer Client (or Potential Developer Client)
In order to realize the basic business functions of this platform, we may need to collect and use your relevant personal information. The following will describe in detail our basic business functions and the types of personal information required to achieve this function. If you refuse to provide it, you will not be able to use the relevant products and/or services of this platform.
Register, log in
When you register/log in to your Aurora account, you may need to provide us with your name, company name, province and city, email address, and mobile phone number so that we can communicate with you about product usage and payment. According to the "Network Security Law", when you use information publishing, instant messaging and other services, you are also required to provide ID card information for real-name authentication.
Log information
In order to ensure the security of your account and system operation, and to prevent phishing website fraud more accurately, when you visit and browse the Aurora website, we will automatically collect the details of your use of Aurora products and/or services and save them as network logs, including Internet Protocol (IP) address, browser type, Internet Service Provider (ISP), referring/exit pages, operating system , date/time stamp and click data stream to judge your account risk, ensuring that Aurora provides services for you normally, count traffic, troubleshoot abnormal information, and detecting, preventing and investigating fraud, abuse or security incidents.
ii. Your end user's personal information
In order to realize the basic business functions of this platform, we may need to collect and use the relevant personal information of your end users. The following will list in detail our basic business functions and the types of information necessary to achieve this function. The collection and use of such personal information will only be carried out on the premise that you have obtained the consent of the end user:
(1) Aurora Push: Aurora Push service gives APP the push capability of messages and notifications. After your APP integrates the Aurora Push SDK, the Aurora Push SDK will collect the personal information necessary to use the service, and push messages and notifications to your end users through encrypted channels. The personal information collected and used by Aurora Push SDK includes: 1.Device information: It is used to identify unique users and ensure the accurate delivery of message push; to optimize push channel resources, we will integrate the channel resources of message push according to the activity of different APPs on the device to improve the message delivery rate for developers; to provide developers with smart labels and services for displaying business statistics; ②Network information and location information: Optimize the network connection request between the SDK and Aurora server to ensure the stability and continuity of the service and realize the function of regional push.
(2) Aurora Statistics: Aurora Statistics service helps developers understand user attributes and usage through concise and intuitive data reports, optimize user experience, and provide effective data support for corporate decision-making. The personal information collected and used by Aurora Statistics SDK includes: 1.APP application page and functional event related information: It is used to count the detailed access situation and accurate page flow details of the APP page, and provide developers with statistical information of relevant dimensions; ②Device information: used to identify unique users and ensure the accuracy of statistical information; display multi-dimensional statistical information for developers; ③Network information and location information: Optimize the network connection request between SDK and Aurora server to ensure the stability and continuity of services; provide location information group statistics services.
(3) Aurora authentication: Aurora Authentication integrates the number authentication capabilities of the three major operators, providing developers with the function of quickly verifying the consistency of the mobile phone number entered by the user and the SIM card number of the machine, improving user experience and security. The personal information collected and used by Aurora Authentication includes: 1. SDK certification related request results: used to judge whether developers use illegally, and to monitor the stability of online one-key authentication; ②Device information: used to identify unique users, detect and prevent fraudulent activities, and help developers avoid unnecessary losses; ③Network information and location information: Optimize the network connection request between the SDK and Aurora server to ensure the stability and continuity of the service; analyze the reasons for the failure of the authentication request; ④Mobile phone number: In the one-key authentication scenario, it is provided by the APP developer actively. The APP developer obtains the authentication result of the telecom operator through the Aurora channel and displays the result to the end user; In the one-key login scenario, after obtaining the authorization of the end user, we will obtain the phone number corresponding to the end user's sim card from the operator, and return the phone number to the APP developer for number verification to complete the one-key login.
(4) Aurora Magic Chain: Aurora Magic Chain provides developers with the ability to jump to short links, wakes up silent users, and helps developers increase the growth and activity of mobile users. The personal information collected and used by Aurora Magic Chain includes: 1. Device information: used to identify unique users and ensure accurate link jumping; provide developers with smart labels and services to display business statistics; ②Network information and location information: Optimize the network connection request between the SDK and the Aurora server to ensure the stability and continuity of the service; provide developers with statistical information in the geographic dimension.
Please note and know that in order to realize the above business functions, Aurora SDK collects "device information", "network information" and/or "location information" from your end users on the premise that the end user authorizes and agrees to enable "read and write SD card permissions", "network access permissions", "device information permissions" and/or "location permissions". If your end users do not want the above information to be collected, you can do so by turning off "read and write SD card permissions", "network access permissions", "device information permissions" and/or "location permissions".
It should be noted that we establish a Aurora database based on the developer service agreement, the data collected with the express consent of the end user, and the (statistical) data obtained through legal channels (the personal information in the database has been de-identified or anonymized. ), used for Aurora products and providing data services for third parties, including Aurora iApp, Aurora Anti-Fraud, Aurora iAudience, Aurora iZone, Aurora Research, Aurora Alliance and other services.
When "Aurora Push", "Aurora Statistics", "Aurora Magic Chain" or products with similar functions are integrated into different apps by different developers, the app can start other apps to keep active to improve message delivery rate, etc. You should inform end users of the existence of such functions, the necessary personal information collected to implement such functions, and how to disable or enable such functions according to the different settings of terminal manufacturers such as mobile phones.
We promise that we will never collect or ask you to provide sensitive personal information including but not limited to personal race, political orientation, religion, belief, personal genetic data or biometric data, sexual orientation, etc.
When we want to use personal information for other purposes not specified in this policy, we will notify you in advance and ask you to notify your end users and ask for their consent. When we want to use the information collected for a specific purpose for other purposes, we will also notify you in advance and ask you to notify your end user and ask for the end user's consent.
iii. Your personal information that we obtain from third parties
1. We may collect and use your personal information from third parties (our partners) within the scope of your authorization and consent. We guarantee to process your personal information in strict accordance with the contracts signed with third parties and relevant laws and regulations, and please read the third party's privacy policy and user agreement in detail. If you refuse the collection, use or transmission of your personal information by third parties when providing services, it may cause you to be unable to use the corresponding services of Aurora.
2. We may obtain and appropriately use public information about you through public channels such as web pages, or obtain operational information about your company that has been publicized from third-party providers to help us better understand our customer base, such as your industry, the size of your business, and your business website URL.
iv. Exceptions to Authorized Consent
Please understand that in the following cases, in accordance with laws and regulations and relevant national standards, we do not need your and / or your end users' authorization to collect and use your personal information and/or your end users:
A. Directly related to public safety, public health, and major public interests;
B. In order to protect your or other personal life, property and other major legitimate rights and interests, but it is difficult to obtain your consent;
C. The collected personal information of you and/or your end users is disclosed to the public by you;
D. Personal information of you and/or your end users collected from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels;
E. Necessary to enter into or perform a contract at your request;
F. Necessary for maintaining the safe and stable operation of software and related services, such as discovering and dealing with failures of software and related services;
G. Other circumstances stipulated by laws and regulations.
You are specially reminded to note that if the information cannot identify you and/or your end user individually or in combination with other information, it does not belong to you and/or your end user’s personal information in the legal sense; When information about you and/or your end users can, alone or in combination with other information, personally identify you and/or your end users, or when we use data that cannot be linked to any specific personal information in combination with other personal information of you and/or your end users, during the combined use, this information will be treated and protected as your and/or your end user's personal information in accordance with this policy.
Information use (Aurora):
i. Share information
Except as described in this policy, information about you and/or your end users will not be shared with third parties in an identifiable form. Except in the following cases:
1. Shared with explicit consent. We will share your and/or your end user's information with other parties with your and/or your end user's express consent;
2. We may share information about you and/or your end users in accordance with laws and regulations;
3. To the extent required or permitted by law, in order to protect the interests, property or safety of you or the public from damage, it is necessary to provide personal information of you and/or your end users to third parties (including industry organizations such as consumer rights protection departments);
4. Personal information that you and/or your end users disclose by yourselves or that we can obtain from other lawful public sources;
5. We may share data with third parties in ways that do not identify you and/or your end-user personal information (eg, anonymize it);
6. Sharing with our affiliates: Information about you and/or your end users may be shared with Aurora's affiliates. We will only share necessary information and subject to the purposes stated in this Privacy Policy. If the affiliated company wants to change the purpose of processing the information, it will seek the authorization and consent of you and/or your end user again;
7. We may engage trusted third-party suppliers, consultants or other service providers ("Contractual Partners") to provide us with the necessary maintenance, support and services to provide better customer service and optimize user experience. We will only share information about you and/or your end users for legitimate, legitimate, necessary, specific, and explicit purposes, and will only share information necessary to provide services. Our partners are not authorized to use the shared information for any other purpose.
If you refuse our partner to collect personal information necessary to provide services when providing services, it may cause you to be unable to use the services provided by this platform through the partner.
Currently, our partners include the following types:
Ø Advertising and promotion partners: In order to more accurately target people and place advertisements, we may provide the IMEI number of your end users to advertising and promotion service providers.
Ø Information service partners: In order to provide Jiguang IM users with the ability to store large files offline, we may provide information service providers with real-time chat content (pictures, videos, files) of your end users.
Ø Social media partners: In order to realize the cross-platform sharing function of Jiguang Sharing, we may provide end-user sharing content to social media partners.
ii. Transfer information
We will not transfer your and/or your end user's information to any company, organization or individual, except in the following cases:
1. with the express consent of you and/or your end users;
2. Personal information that you and/or your end users disclose to us or that we can obtain from other legitimate public sources.
In the event of a merger, acquisition or bankruptcy liquidation, the transfer of personal information may be involved. In this case, we will require new companies and organizations that hold your personal information to continue to be bound by this statement. If there is any change in the collection and processing of personal information agreed in this statement, the company or organization will seek your authorization and consent again.
iii. Public disclosure
Subject to applicable laws and regulations, we will not publicly disclose your and / or your end user's personal information unless we obtain your and/or your end user's express consent
Information Protection (Aurora):
1. We have used industry-standard security safeguards to protect the information you provide against unauthorized access, disclosure, misuse, alteration, damage or loss. We will take all reasonably practicable steps to protect the security of your and / or your end user data. For example, when data is exchanged between your browser and the "service", it is protected by SSL encryption; we also provide https secure browsing for the jiguang.cn website; we will use encryption technology to ensure the confidentiality of data; We will use trusted protection mechanisms to prevent malicious attacks on data; We will deploy access control mechanisms to ensure that only authorized personnel can access personal information; and we will conduct regular security and privacy protection training courses to enhance employees' awareness of the importance of protecting personal information.
2. We have obtained the following certifications: "Information System Level 3 Protection", "ISO 27001 Information Security Management System Certification", "SDK Information Security Certificate"
3. Our data security capabilities: Build security defenses around the data life cycle, covering data processing stages such as data collection, transmission, storage, use, circulation, archiving, and deletion.
4. We will take all reasonably practicable steps to ensure that irrelevant personal information is not collected. We will only retain information about you and/or your end users for as long as is necessary to achieve the purposes described in this Privacy Policy, unless an extended retention period is required or permitted by law.
5. The Internet is not a completely secure environment, and email, instant messaging, and communications with other users are not encrypted, and we strongly recommend that you do not send personal information through such means. Please use a complex password and change it regularly to help us keep your account secure.
6. We will regularly update and disclose the relevant content of reports such as security risks and personal information security impact assessments. You can also get related content by consulting support@jiguang.cn.
7. The internet environment is not 100% secure and we will do our best to ensure or guarantee the security of any information you send us. Although we have made necessary and reasonable efforts, there is still a risk of personal, property and reputation loss to you and your users due to misappropriation, illegal possession or misuse. You should understand the above risks and voluntarily assume them.
8. In the event of an unfortunate personal information security incident, we will promptly inform you in accordance with the requirements of laws and regulations: The basic situation and possible impact of security incidents, the measures we have taken or will take, suggestions for you to prevent and reduce risks on your own, remedial measures for you, etc. We will promptly notify you of the relevant information of the event by email, push notification, etc. When it is difficult to inform the subject of personal information one by one, we will publish an announcement in a reasonable and effective way.
9. At the same time, we will also proactively report the handling of personal information security incidents in accordance with the requirements of regulatory authorities.
2) MobTech SDK (for in-app sharing function)
Information Collection (MobTech SDK)
In addition to this policy, we also collect data (de-identify or anonymize personal information immediately after collection) based on the "MobTech Developer Service Agreement General Terms and Conditions" with the developer, and with the authorization of the end user, and through legal The (statistical) data information obtained from the channel establishes a MobTech data service system, provides data services (such as brand marketing, commercial real estate, risk control and other services) for you or third parties, and makes applications in publishers, industries, specific regions and markets. Industry reports such as performance evaluations or behavioral pattern analysis reports. Industry reports will be presented in unidentifiable aggregated form, both self-published by MobTech and customized to your needs. In special cases, we will also make an evaluation result of a certain end user or a certain type of end user according to MobTech's statistical model, and the evaluation result may be derived from the data obtained from your application and thus show a certain consistency with your application. These evaluation results are calculated based on our data model for evaluation purposes and are aggregated and anonymous.
With your consent, we will cooperate with third parties to use MobTech's processed and processed data for commercial purposes in various forms, including but not limited to advertising and marketing services. For example, in cooperation with advertisers, advertising alliances or other advertising operators and communication operators, the data is used for advertising by querying and analyzing the data of authorized users' Internet advertising behavior preferences. The data we share with third parties does not contain any personal privacy or identifiability.
The personal information we collect and use in the course of providing products and/or services to you is detailed below. The collection of these personal information will only be carried out on the premise that you have confirmed that you have obtained the consent of the end user, and the end user has not refused to accept the service to us, nor has he requested us to change the authorization/delete personal information/cancel the account:
1. For our basic business functions and the personal information that must be collected for the network services provided by this function, we will collect the information of your end users by calling the relevant interface of the system. If you or your end user refuses to provide it, you cannot use the relevant products and/or services of this platform. The terminal information we obtain is as follows:
Ø Based on the compatibility processing we provide you with end-user services, we will obtain: system operation information;
Ø Based on our selection and optimization of network links, we will obtain: network status information;
Ø Based on our unique identification for your end user device, we will obtain: iOS Advertising Identifier (IDFA), MAC address, International Mobile Equipment Identity (IMEI), Anonymous Equipment Identifier (OAID), International Mobile Subscriber Identity ( IMSI);
Ø Based on our service of detecting and implementing ID synchronization and merging links for you, we will obtain: application list information;
Ø Based on our services for detecting different areas, we will obtain: base station information.
2. In addition to the information listed in item 1 of this article, based on the functional differences of different products or services in the developer services we provide, the information we collect in the specific scenarios of each product or service is as follows:
ShareSDK is a social sharing service provided by us, which supports one-click sharing and third-party login authorization services in accounts on 40+ global mainstream social platforms such as WeChat, Douyin, QQ, Weibo, Facebook, and Twitter. It not only greatly facilitates the service experience of your end users, but also conducts statistical analysis on data such as the number of shares, the number of reflows, and the sharing of intentions of end users in real time. In order to trace the source of your closed-loop sharing function and conduct statistics on geographic dimensions to help you operate more precisely, we will collect the geographic location of your end users' personal sensitive information. In order to activate the social platform APP on your end user's device to achieve third-party login and social sharing, we will collect the information of your end user's system installed application list. In order to complete third-party login and social sharing statistical services, we will collect your end user's social platform OpenID. When your end user needs to share a password, we will read the clipboard information of the end user, which is not a collection of information and will not be persisted. In addition, we will also use the GET_TASK permission to judge whether your app is pre-positioned to assist in judging whether the sharing jump is successful.
3. Although the personal information of your end users is collected in the form stipulated in paragraphs 1 and 2 of this article, when necessary, we may directly and explicitly ask your end users to decide whether to authorize us to collect personal information of end users in the form of, but not limited to, pop-up windows and links.
4. In order to meet the basic requirements of laws and regulations and the provision of services, ensure the security of your account and system operation, and more accurately prevent phishing website fraud, we will collect relevant information generated by you or your end users in the process of using MobTech services to judge your account risk, ensure that MobTech can provide you with normal services, count traffic, troubleshoot abnormal information, and detect, prevent and investigate fraud, abuse or security incidents, etc. This information includes:
(1). Log information
When you or your end users visit and browse the MobTech website or use MobTech products and/or services, we will automatically collect the details of your or your end users' use of MobTech products and/or services and save them as web logs, including Internet Protocol (IP) address, browser type, Internet Service Provider (ISP), reference/exit Page, OS, date/time stamp and click stream.
(2). Device Information
We may use the developer services listed in item 2 of this article [namely, social sharing (ShareSDK), short message verification (SMSSDK), deep link (MobLink), message push (MobPush), seconds check and other free/paid SDK services and advertisements SDK] collects your end users' [system operation information, network status information, iOS Advertising Identifier (IDFA), MAC address, International Mobile Equipment Identity (IMEI), Anonymous Equipment Identifier (OAID), International Mobile Subscriber Identity ( IMSI), application list information, base station information] for security incident investigations, and for detection and prevention of fraudulent activities to detect and prevent cyber attacks and abuse, and ensure network security and operational security.
Information use (MobTech SDK)
We will not share your and / or your end-user's personal information in an identifiable form with any companies, organizations and individuals outside of MobTech, except in the following cases:
1. Sharing with express consent: We will share your and / or your end user's information with other parties after obtaining your and / or your end user's express consent.
2. We may share your and / or your end users' personal information externally in accordance with laws and regulations, or as mandated by government authorities.
3. To the extent required or permitted by law, in order to protect the interests, property or safety of you or the public from damage, it is necessary to provide personal information of you and/or your end users to third parties (including industry organizations such as consumer rights protection departments);
4. Sharing personal information about you and/or your end users is necessary to protect national security, public safety, and the vital legitimate rights and interests of you and other individuals;
5. Sharing with our affiliates: Personal information about you and/or your end users may be shared with MobTech's affiliates. We will only share necessary personal information and subject to the purposes stated in this Privacy Policy. If the affiliated company wants to change the purpose of processing personal information, it will seek the authorization and consent of you and/or your end user again.
Our affiliates include: Guangzhou Zhangtao Network Technology Co., Ltd., Shanghai Zhenshu Network Technology Co., Ltd., Shanghai Songyu Network Technology Co., Ltd., Nanjing Youkun Information Technology Co., Ltd., Shanghai Likun Network Technology Co., Ltd., Shanghai Samakun Network Technology Co., Ltd.
6. We may engage trusted third-party suppliers, consultants or other service providers ("Partners") to provide us with the necessary maintenance, support and services to provide better customer service and optimize user experience. We will only share information about you and/or your end users for legitimate, legitimate, necessary, specific, and explicit purposes, and will only share information necessary to provide services. Our partners are not authorized to use the shared information for any other purpose.
Currently, our partners include the following types:
(1) Authorized partner for advertising and analytics services. We will not share your and / or your end user's personally identifiable information (meaning information that can identify you and/or your end user, such as name or electronic e-mail, through which you and/or your end users can be contacted or to identify you and/or your end users) with partners who provide advertising and analytics services. You and/or your end users agree that we provide these partners with information about the reach and effectiveness of their ads, such as device information of end users who click on ads, but we do not provide you and/or your end users' personal identifying information, or we aggregate this information so that it does not personally identify you and/or your end user. For example, we may only tell advertisers how effective their ads are, or how many people viewed their ads or installed apps after seeing them, or provide these partners with non-personally identifiable demographic information (e.g., "a 25-year-old male in Beijing who likes software development") to help them understand their audience or customers.
(2) Suppliers, service providers and other partners. We send information to suppliers, service providers and other partners who support our business globally, including providing technical infrastructure services, analyzing how our services are used, measuring the effectiveness of advertising and services, providing customers services, payment facilitation, or the conduct of academic research and surveys.
(3) Data service consulting partners.
With the permission of you and/or your end users, we have the right to share your and / or your end users' personal information with partners who need us to provide data service consultation. For example, the partner will hand over the encrypted data provided by us to the media end of its cooperation to perform group data collision matching, and push the information to the end user.
The encryption technology we use is a common technology in the industry, so there is no need to decrypt it in any link, and technically speaking, these encryption technologies cannot be decrypted, and even if decrypted, the result is not unique.
(4) Personal Finance Business Analytics Partner.
With the permission of you and/or your end users, we have the right to share your and / or your end users' personal information with partners who need us to provide personal financial business analysis. For example, according to the requirements of personal financial business partners, we will match their authorized end users with confidence labels in our database (confidence labels are based on the big data model analysis results of the data obtained from our various channels, we cannot fully guarantee the authenticity and accuracy of the data of each channel, and the confidence label does not have high accuracy), and calculates the rating for the authorized end users of the partner according to the label set and algorithm.
We will sign strict confidentiality agreements with companies, organizations and individuals with whom we share personal information, requiring them to process personal information in accordance with our instructions, this policy and any other relevant confidentiality and security measures.
Transfer
We will not transfer you or your end user's personal information to any company, organization or individual, except in the following cases:
1. Transfer with express consent: We will transfer your personal information to other parties with your express consent;
2. The transfer is necessary to protect national security, public safety, and the significant legitimate rights and interests of you and other individuals;
3. When it comes to merger, acquisition or bankruptcy liquidation, if it involves the transfer of personal information, we will require new companies and organizations that hold your personal information to continue to be bound by this Privacy Policy, otherwise we will require the companies and organizations to seek authorization from you again. If there is any change in the collection and processing of personal information agreed in this statement, the company or organization will seek your authorization and consent again.
Public Disclosure
We will only publicly disclose your or your end user's personal information in the following circumstances:
1. with your express consent;
2. Legal-Based Disclosure: We may publicly disclose your or your end-user's personal information when required by law, legal process, litigation, or governmental authority.
Personal information exempted by law from sharing, transferring, and public disclosure with consent
Please understand that in the following cases, according to laws, regulations and national standards, we do not need your authorization and consent to share, transfer, and publicly disclose your and/or your end users' personal information:
1. Those directly related to national security and national defense security;
2. Directly related to public safety, public health, and major public interests;
3. Directly related to criminal investigation, prosecution, trial and execution of judgments;
4. In order to protect your or other personal life, property and other major legitimate rights and interests, but it is difficult to obtain your consent;
5. Your personal information disclosed to the public by yourself;
6. Collect personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels.
Information Protection (MobTech SDK):
i. We have used industry-standard security safeguards to protect the personal information provided by you and your end users from unauthorized access, public disclosure, use, modification, damage or loss. We will take all reasonably practicable steps to protect your personal information and that of your end users. For example, when data (such as credit card information) is exchanged between your browser and the "service", it is protected by SSL encryption; we also provide https secure browsing methods for the official website; we will use encryption technology, anonymization and other means to ensure the confidentiality of data; we will use trusted protection mechanisms to prevent data from being maliciously attacked; we will establish special management systems, processes and organizations to ensure information security. For example, we strictly limit the scope of people who have access to information, require them to comply with confidentiality obligations, and conduct reviews; and we conduct security and privacy protection training courses to enhance employees' awareness of the importance of protecting personal information. In the event of a security incident such as personal information leakage, we will activate an emergency plan to prevent the expansion of the security incident, and notify you in the form of push notifications, announcements, etc.
ii. We have obtained the following certifications: "Information System Security Level Protection Recording Certificate" (Level 3) issued by Shanghai Public Security Bureau.
iii. Our data security capabilities: Build security defenses around the data life cycle, covering data processing stages such as data collection, transmission, storage, use, circulation, archiving, and deletion.
iv. We will take all reasonably practicable steps to ensure that irrelevant personal information is not collected. We will only retain your and/or your end user's personal information for as long as is necessary to achieve the purposes described in this policy, unless an extended retention period is required or permitted by law.
v. The Internet is not a completely secure environment, and email, instant messaging, and communications with other users are not encrypted, and we strongly recommend that you do not send personal information through such means. Please use a complex password to help us keep your account secure.
vi. We will regularly update the relevant content of reports on security risks and personal information security impact assessments. You can get it by sending an email to notice@mob.com.
vii. The internet environment is not 100% secure and we will do our best to ensure or guarantee the security of any information you and/or your end users send us. If our physical, technical, or management protection facilities are damaged, resulting in unauthorized access, public disclosure, tampering, or destruction of information, resulting in damage to your legitimate rights and interests, we will assume corresponding legal responsibilities.
viii. In the event of an unfortunate personal information security incident, we will promptly inform you in accordance with the requirements of laws and regulations: The basic situation and possible impact of security incidents, the measures we have taken or will take, suggestions for you to prevent and reduce risks on your own, remedial measures for you, etc. We will promptly notify you of the relevant information of the event by email, telephone, push notification, etc. When it is difficult to inform the subject of personal information one by one, we will publish an announcement in a reasonable and effective way.
ix. At the same time, we will also proactively report the handling of personal information security incidents in accordance with the requirements of regulatory authorities.
1. Information Security
a. This app account has security protection functions, please keep your user name and password information properly. This application will ensure that your information is not lost, abused and altered by encrypting user passwords and other security measures. Despite the aforementioned security measures, please note that there are no "perfect security measures" on the information network.
b. When using this application network service for online transactions, you will inevitably disclose your personal information, such as contact information or postal address, to the counterparty or potential counterparty. Please properly protect your personal information and only provide it to others when necessary. If you find that your personal information is leaked, especially the user name and password of this application, please contact the customer service of this application immediately so that this application can take corresponding measures.
c. We use the third-party (Shanghai Youkun Information Technology Co., Ltd., hereinafter referred to as "MobTech") MobTech SDK service to provide you with the sharing function. In order to implement this function smoothly, you need to authorize MobTech SDK to provide corresponding services; after your authorization, MobTech will collect your relevant personal information. For the types and purposes of information collected by MobTech, the rules of personal information protection and the exit mechanism, please refer to the privacy policy (https://www.mob.com/) on the MobTech official website (https://www.mob.com) for details. about/policy) terms.
d. We use the third-party (Shenzhen Hexunhuagu Information Technology Co., Ltd. (Aurora Mobile, NASDAQ: JG), hereinafter referred to as "Aurora") Aurora SDK service to provide you with the article push function. In order to realize this function smoothly, you need to authorize Jiguang SDK to provide corresponding services; after your authorization, Jiguang will collect your relevant personal information. For the types and uses of information collected by MobTech, the rules for personal information protection and the exit mechanism, etc., please refer to the privacy policy (https://www.jiguang.cn/ license/privacy) terms.
2. Changes to this Privacy Policy
a. If we decide to change the Privacy Policy, we will post those changes in this Policy, on our website, and where we deem appropriate so that you can understand how we collect and use your personal information, who has access to it, and under what circumstances we will disclose it.
b. The company reserves the right to modify this policy at any time, so please review it frequently. If there are major changes to this policy, the company will notify it through a website notice.
vi. Changes to our privacy policy
Any changes we may make to our privacy policy in the future will be posted on this page and, where appropriate, notified to you by e-mail.
vii. Account cancellation
You can submit an account cancellation application for your account through our account cancellation page (https://m.ferroalloynet.com/Infos/AccountLogOff.htm). After the background review is passed, all your account information will be deleted. When using our app or website again, you need to register an account again.
Company Name: Chengdu Felo Internet Tech. Co., Ltd
Address: 8-10, F14, Block 1, Laimeng Duhui, No.51, Section 4, South Second RingRoad, Wuhou District, Chengdu, Sichuan, China
Contact: +86-28-85217008