1. Scope of application
a) When you use this software network service or visit the platform web page, we will automatically receive and record the information on your browser and mobile client, including but not limited to IP address, browser type, language used, access date and time , software and hardware feature information, web page records and other data;
b) We may lawfully obtain user personal data from business partners.
a) The keyword information you enter when using this software to search for services;
b) The relevant data we collect that you publish on this software, including but not limited to participation in activities, transaction information and evaluation details;
c) Violation of legal provisions or the rules of this software and the measures we have taken.
2. Use of information
a) We will not provide, sell, rent, share or trade your personal information to any unrelated third party unless you obtain your permission in advance, or the third party and this software (including affiliated companies) provide services to you individually or jointly , after the service ends, it will be prohibited from accessing all such information including previously accessible information.
b) We do not allow any third party to collect, edit, sell or disseminate your personal information for free in any way. We have the right to immediately terminate the service agreement for any user who violates this provision.
c) In order to provide better services, we may use your personal information to send you information of interest, including but not limited to product and service information or share information with partners so that they can send you information about their products and services information (the latter requires your prior consent).
3. Information disclosure
Under the following circumstances, we will disclose all or part of your personal information in accordance with legal requirements or personal wishes:
a) Disclose to third parties with your prior consent;
b) Your personal information must be shared with third parties in order to provide you with the requested products and services;
c) Disclose to third parties or administrative or judicial agencies in accordance with relevant provisions of law, administrative or judicial requests;
d) If you violate the relevant laws and regulations of the country where you are located, or this software service agreement or related rules, you need to disclose it to a third party;
e) If you are a qualified intellectual property complainant and have filed a complaint, you should disclose it to the respondent at the request of the respondent so that both parties can handle possible rights disputes;
f) In a transaction created on this software platform, if any party to the transaction fulfills or partially fulfills its transaction obligations and makes a request for information disclosure, we have the right to decide to provide the user with the necessary information such as the contact information of the counterparty to facilitate the transaction. Completion of transactions or resolution of disputes.
g) Other disclosures deemed appropriate in accordance with laws, regulations or website policies.
4. Information storage and exchange
Your information and materials will be stored on our and/or its affiliated companies' servers. These information and materials may be transferred to your country, region or overseas where we collect information and materials, and will be accessed, stored and stored overseas. exhibit.
b) You have the right to choose to accept or refuse to accept cookies. You can refuse to accept cookies by modifying your browser settings. However, if you choose to refuse to accept cookies, you may not be able to log in or use services or functions that rely on cookies.
c) This policy will apply to relevant information obtained through cookies.
6. Information security
a) We will take security protection measures for your account, including encryption. Please note that there are no "perfect security measures" on information networks.
b) Please keep your username and password safe. Despite the aforementioned security measures, we still recommend that you note that there are no "perfect security measures" on information networks.
c) After an unfortunate personal information security incident occurs, we will promptly inform you in accordance with the provisions of Article 42, Paragraph 2 of the Cybersecurity Law: the basic situation and possible impact of the security incident, and the measures we have taken or will take. Measures, suggestions for you to prevent and reduce risks independently, remedial measures for you, etc. We will promptly notify you of the incident-related information through emails, letters, phone calls, push notifications, etc. When it is difficult to inform the personal information subjects one by one, we will issue announcements in a reasonable and effective manner. At the same time, we will also proactively report the handling of personal information security incidents in accordance with the requirements of regulatory authorities.