According to common practice in the relevant Chinese laws, regulations, standards, and other countries and regions, we exercise the right to protect your own personal message:
(A) access to your personal information
Except you have access to your personal information, laws and regulations of exceptions. If you wish to exercise the right to access data, free to visit the following ways:
Account Information – If you want to access or edit profile information and payment information in your account, change your password, add security information or close your account, etc., you can perform such operations by accessing firstname.lastname@example.org.
Search information – you can access or clear your search history, view and edit their interest and manage other data in email@example.com.
If you can not access personal information via the above link, you can always use the Web form to contact us, or send an email to firstname.lastname@example.org. We will respond to your access request within 30 days.
For other personal information that you generated in the use of our product or service process, as long as we do not need too much investment, we will provide to you. If you wish to exercise the right to access data, please send an email to[email@example.com].
(B) correct your personal information
When you find that we are dealing with your personal information on an error, you have the right to ask us to make corrections. You can make corrections apply through “(a) access to your personal information” listed in the way.
If you can not correct such personal information via the above link, you can always use the Web form to contact us, or send an email to firstname.lastname@example.org. We will respond to your request for rectification within 30 days.
(C) remove your personal information
In the following cases, you can request to delete personal information to us:
1, behavior if we handle personal information in violation of laws and regulations;
2, if we collect, use your personal information, but did not have your consent;
3, behavior if we handle personal information in violation of the agreement with you;
4. If you no longer use our products or services, or if you log out of the account;
5, if we do not provide you with products or services.
If we decide to respond to your removal request, we will notify the entity to obtain your personal information from us, asking them to promptly remove, unless otherwise provided by laws and regulations, or the entity authorized to receive your independence.
When you delete information from our services, we may not immediately back up the system deletes the corresponding information but will delete this information at the time of the backup update.
(D) changes in the scope of your license agreement
Each business function requires some basic personal information in order to be completed (see this strategy, “the first part”). For the collection and use of personal information collected extra, you can give your authorization or withdraw consent at any time.
You can do this yourself in the following ways:
When you withdraw consent, we will not deal with the corresponding personal information. But the personal information that you decided to withdraw consent will not affect previously based on your authorization to carry out the process.
If you do not want to accept commercial advertising we sent you, you can cancel at any time in the following ways:
(E) personal information subject to cancellation accounts
You can log out at any time after registering an account, you can do this yourself in the following ways:
After the cancellation account, we will cease to provide you with products or services, and according to your requirements, except as otherwise provided delete your personal information, laws and regulations.
(F) personal information subject to obtain a copy of Personal Information
You have the right to obtain a copy of your personal information, you can do this yourself in the following ways:
Under the premise of technically feasible, such as data interfaces match, we can according to your request, your personal information will be directly transferred to a copy of your designated third party.
(G) constraint information system automated decision
Non-manual automatic decision-making mechanisms in certain business functions, we may only based on information systems, algorithms, etc., to make a decision. If these decisions significantly affect your legal rights, you have the right to ask us to explain, we will also provide an appropriate remedy.
(H) respond to your above request
For security, you may need to provide a written request, or otherwise prove your identity. We may first ask you to verify your identity before processing your request.
We will respond within 30 days. If you are not satisfied, they can complain through the following channels:
For your reasonable request, we charge in principle, but repeated, beyond the limits of reasonable request, as appropriate, we will charge a cost. For those endless repetition, require disproportionate technical means (for example, the need to develop a new system or fundamentally changing an existing practice), risk to the legal rights of others or extremely impractical (for example, involving information stored on backup tapes) of request, we may be rejected.
In the following cases, in accordance with legal and regulatory requirements, we will be unable to respond to your request:
1, national security, national defense and security-related;
2, and public safety, public health, major public interest;
3, with the criminal investigation, prosecution and trial and other related;
4, there is ample evidence that you have subjective bad faith or abuse of rights;
5, in response to your request will cause you or other legitimate rights and interests of individuals, organizations suffer severe damage.