1. Scope and Methods of Collection of Personal Information
When you use our website and related services, we will collect, store and use the following data related to your personal information, which can be used for your registration, login, account binding, and password retrieval to receive verification codes, etc. If If you do not provide relevant information, you may not be able to register as our user or enjoy some of the services we provide, or you may not be able to achieve the intended effect of the relevant services. When you use it, according to the laws of the People's Republic of China, you should provide your real identity information through your account, and we will assist you to choose an appropriate method to complete real-name verification based on your identity attributes.
1. 1 Information You Provide to Us
1.1.1 The information you fill in and provide when you register, log in or use our website and services, which may include name, mobile phone number, email address, address and other information that identifies the user individually or in combination. You may choose not to provide certain information or information, but doing so may prevent you from using our relevant special features or services.
1.1.2 If you log in to us in other ways, we will request your personal information from a third party, and we will still ask you to provide the personal information that we need but the third party cannot provide. If you refuse to provide it, you will not be able to use some of our services.
1.2 Information obtained from your use of our website and services
1.2.1 Log information, when you use our website and services, we will automatically collect your usage of our website and save it as relevant web logs. For example, your search query content, IP address, browser type, language used, date and time of accessing services, cookies, web beacon, etc.
1.2.2 Device or app information, some mobile devices or apps contain a unique app number. For example, the configuration information, device version number, device identification code, IP address, etc. provided by your mobile device, browser or other programs you use to access our services.
In order to provide better services and improve user experience, our website may record hardware model, operating system version number, International Mobile Equipment Identity (IMEI), Media Access Control Address (MAC) and other information data.
1.3 Your information we obtain from third parties
1.4 When you use the identity authentication service provided by Matchexpo, we will also collect information such as your name, ID number, occupation, and relevant identity certificates. We will protect your privacy information to the greatest extent possible. If you do not provide this information, we will not be able to provide related features or services.
1.5 When you participate in our related gift exchange activities, we will collect your name, mailing address, contact information, bank account number and other information. This information is the basis for the transfer or gift you receive, if you refuse to provide this information, we will not be able to transfer or give out the gift to you.
2. Storage of Personal Information
2.1 Where the information is stored
In accordance with the provisions of laws and regulations, we store your personal information collected within the territory of the People's Republic of China.
2.2 Storage period
3. Possible Ways of Using Personal Information
3.2 When we provide services, for identity verification, customer service, security prevention, fraud detection, archiving and backup purposes, to ensure the security of the website and services we provide to you.
3.3 In order to ensure the security of the service and help us better understand the operation of our website, we may record relevant information data, such as the frequency of your use, crash data, overall usage, performance data, etc. We do not combine the information we store in analyzing software with any personally identifiable information you provide on the website.
3.4 After collecting your personal information, we will de-identify the data through technical means, and the de-identified information will not be able to identify the subject. Please understand and agree that in this case, we have the right to use the de-identified information; and on the premise of not disclosing your personal information, we have the right to analyze the user database and make commercial use.
3.5 Please note that all personal information you provide when using our products and services will continue to be authorized during your use of our products and services unless you delete or refuse our collection through system settings We use. After you cancel your account, we will stop providing you with the website or service, delete your personal information according to your request, or anonymize it, unless otherwise provided by laws and regulations.
3.6 We will collect statistics on the usage of our website, products and services, and may share these statistical information with the public or third parties to show the overall usage trends of our website, products and services. However, these statistics do not contain any identifying information about you.
4. Possible Ways of Sharing Personal Information
We and our affiliates and controlling companies will not share your personal information with any third party without your consent, except in the following cases:
4.2 We will not share, transfer or publicly disclose your personal information to any third party without your permission, except in the following cases:
(1) Obtain your express authorization and consent in advance;
(2) You share, transfer or disclose to third parties by yourself;
(3) Those directly related to national security, national defense security, public security, public health, and public interests;
(4) Disclosure or provision is made in accordance with applicable laws and regulations, requirements of regulatory procedures, mandatory administrative and judicial requirements, or directly related to criminal investigation, prosecution, trial and execution of judgments; Types and disclosures of personal information required to publicly disclose your personal information. Under the premise of compliance with laws and regulations, when we receive the above-mentioned request for information disclosure, we will require the issuance of corresponding legal documents, such as subpoenas or investigation letters. We will carefully review all requests to ensure that they have a lawful basis and are limited to data that the administrative and judicial departments have the legal right to obtain for specific investigation purposes;
(6) The company files a lawsuit or arbitration against the user in order to safeguard the legitimate rights and interests;
(8) Personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels;
(9) For academic research purposes, or for academic research institutions, when it is necessary to carry out statistical or academic research in the public interest, and when the results of academic research or description are provided externally, the personal information contained in the results shall be de-identified. of;
(10) Other circumstances stipulated by laws and regulations.
5. Personal Information Security Protection
5.1 We attach great importance to information security, and we strive to take various reasonable physical, electronic and management security measures to protect your personal information and prevent your information from being improperly used or accessed, used or leaked without authorization.
5.2 We will use encryption technology, anonymization and other means to protect your personal information; we will use trusted protection mechanisms to prevent malicious attacks on personal information.
5.3 We have established a special security department, security management system, and data security process to ensure the security of your personal information. We adopt strict data usage and access systems, and conduct security audits on data and technology. Formulate emergency response plans. For security incidents such as personal information leakage, we will immediately activate emergency plans to prevent the expansion of security incidents.
5.4 Although the above reasonable and effective measures have been taken and the standards required by relevant laws and regulations have been complied with, please understand that due to technical limitations and various malicious means that may exist, in the Internet industry, even if we do our best to strengthen security measures, it is not always possible to ensure that information is 100% secure. You need to understand that the systems and communication networks you use to access our website may have problems due to factors beyond our control. Therefore, you should take active measures to protect the security of personal information, such as: using complex passwords, changing passwords regularly, and not disclosing your account password and other personal information to others.
5.5 Once a user information security incident (leakage, loss, etc.) occurs, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, your Recommendations for self-prevention and mitigation of risks, remedies for you, and more. We will promptly notify you of the relevant information of the event in the form of push notifications, emails, letters, text messages, etc. When it is difficult to inform users of the information one by one, we will take a reasonable and effective way to publish announcements.
5.6 At the same time, we will also report the handling of user information security incidents in accordance with the requirements of regulatory authorities. Please be aware that the personal information protection measures we provide only apply to our platform. Once you leave us and browse or use other websites, services and content resources, we have no ability and obligation to protect any information you submit on websites other than ours. Personal information, whether or not you log in or browse the above websites based on our links or directions.
6. Management of Personal Information
We attach great importance to your concerns about personal information, and do our best to protect your rights to access, correct, delete, and withdraw consent to your personal information, so that you have adequate capabilities to protect your privacy and security.
6.1 After you complete the account registration of Matchexpo and perform reasonable and necessary authentication, you can view, modify, and delete your personal information submitted to us. Under normal circumstances, you can browse, modify, and delete the information submitted by yourself at any time, but for security and identification (such as number appeal service) considerations, you may not be able to modify some of the initial registration information submitted during registration.
6.2 You have the right to update or correct your personal information on your own. Before you update or correct your information, we will first verify your identity, and then correct and update your information.
6.3 You can apply to cancel your account by logging in to the Matchexpo website (www.matchexpo.com or APP). Before you cancel your account, we will verify your personal identity, security status, device information, etc. The act of canceling your account is irreversible. Once you cancel your account, we will stop using it for you and delete all information about your account according to your request, unless otherwise provided by laws and regulations.
6.4 When your information falls under one of the following circumstances, we may not be able to respond to your request in accordance with the requirements of laws and regulations:
6.4.1 Related to national security and national defense security;
6.4.2 Related to public safety, public health, major public interests, etc.;
6.4.3 Related to criminal investigation, prosecution, trial and execution of judgments;
6.4.4 There is sufficient evidence to show that you have subjective malice or abuse your rights;
6.4.5 Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations;
6.4.6 Involving commercial secrets;
6.4.7 Circumstances stipulated by other laws and regulations