privacy policy

FOREWORD has a solemn commitment to protecting the privacy of its users. When you use the service, we may collect and use information about you.

This Privacy Policy applies to all services we provide. Please note that we review our policies from time to time, so the measures are subject to change. We kindly ask that you visit this page regularly to ensure that you are always aware of the latest version of our Privacy Policy. After reading this policy, if you have any questions about this Privacy Policy or matters related to this Privacy Policy, please contact [email protected].

By using or continuing to use the service, you agree to our collection, use, storage and sharing of your information in accordance with this Privacy Policy.

1. Information we may collect

(1) Information not related to personal identity:

When you use the service, we may collect and aggregate information such as the user’s source route, access sequence, etc., for example, record the source route, browser software, etc. of each user who uses the service.

(2) Personally identifiable information:

When you use services, we may collect and aggregate or ask you to provide information about personal phone numbers, network identifiers (IP addresses); operation logs; device information (including device model, operating system type); unique software list Device identification code (such as IMEI/android ID/IDFA/OPENUDID/GUID basic information).

We collect your information primarily so that you and other users can use the service more easily and satisfactorily. The goal of is to provide all Internet users with a safe, fun and educational online experience. And this information helps us achieve that.

Please note that if you disclose your personal information in the information you upload or post in public areas of the service that are visible to other users, and in your responses to information uploaded or posted by others, such information may be subject to collected and used by others. When you discover that a user of is improperly collecting or using your or others’ information, please contact [email protected].

2. How we collect and use information

(1) We will collect and obtain your information through the following channels:

1. The information you provide. E.g:

(1) The information you provide to us when you register an account for the service or use the service;

(2) The shared information you provide to other parties through the service, and the information you store when you use the service.

2. Your information shared by other parties. That is, the shared information about you provided by other parties when using the service.

3. Your information obtained by us. When you use services, we collect, aggregate and record information, such as log information, location information, device information, etc.

(2) COOKIES, log files and WEB BEACON

We or our third-party partners may obtain and use your information through COOKIES and WEB BEACON, and store such information as log information.

By using COOKIES and WEB BEACON, we provide users with a simple and personalized web experience. A COOKIES is a small amount of data that is sent to your browser from a web server and stored on your computer’s hard drive. We use COOKIES and WEB BEACON for the benefit of their users. For example, in order to make the login process of the virtual community faster, you can choose to save the user name in a COOKIES. This will make it easier and faster to log in to the service next time. COOKIES and WEB BEACON help us determine the pages and content you connect to, the time you spend on specific services and the services you choose.

COOKIES and WEB BEACON allow us to serve you better, faster, and to personalize your experience. However, you should be able to control whether and how COOKIES and WEB BEACON are accepted by your browser. Please consult the documentation that came with your browser for more information on this.

We and third-party partners may collect and use your information through COOKIES and WEB BEACON, and store such information.

We use our own COOKIES and WEB BEACON for the following purposes:

(1) Remember your identity. For example: COOKIES and WEB BEACON help us identify you as our registered user, or save the preferences or other information you provide to us;

(2) Analyze your use of our services. We may use COOKIES and WEB BEACON to understand what activities you use services, or which services or services are most popular;

(3) Advertising optimization. COOKIES and WEB BEACON help us to provide you with advertisements that are relevant to you based on your information rather than general advertising.

While we use COOKIES and WEB BEACON for the above purposes, we may provide aggregated non-personally identifiable information collected through COOKIES and WEB BEACON to advertisers and other partners for the purpose of analyzing how you and other users use services and for advertising purposes Serve.

There may be COOKIES and WEB BEACONs placed by advertisers and other partners on the service. These COOKIES and WEB BEACON may collect non-personally identifiable information about you to analyze how users use these services, to send you advertisements that may be of interest to you, or to evaluate the effectiveness of advertising services. The collection and use of such information by these third-party COOKIES and WEB BEACON are not governed by this Privacy Policy, but by their own personal information protection statement, and we are not responsible for the third-party COOKIES and WEB BEACON.

You can refuse or manage COOKIES and WEB BEACON through your browser or user choice mechanism. However, please note that if you disable COOKIES and WEB BEACON, we may not be able to provide you with the best service experience, and some services may not work properly. At the same time, you will still receive ads, they will just be less relevant to you.

(3) We will collect and use your information for the following purposes:

1. Help you complete the registration

In order for us to provide you with services, you need to provide basic registration information, such as mobile phone number, email address, etc., and create your username and password. In some single services, if you only need to use basic services such as browsing, you do not need to register as a user and provide the above information.

2. To provide you with goods or services

The information we collect and use is a necessary condition to provide you with services. Without relevant information, we will not be able to provide you with the core content of services, such as:

(1) In some service items, in order to facilitate the delivery of goods or services to you, you need to provide the consignee’s personal identification information, name, delivery address, zip code, consignee, contact number, payment status and other information. If you refuse to provide such information, we will not be able to complete the delivery. If you order goods or services for others through the service, you need to provide the aforementioned information of the actual orderer. Before providing us with the aforementioned information of the actual orderer, you need to ensure that you have obtained their authorization and consent.

(2) In order to display the order information of your account, we will collect the order information generated in the process of using the service to show you and facilitate your order management;

(3) When you contact us, we may save information such as your communication/call records and content or the contact information you leave in order to contact you or help you solve problems, or record the solutions and solutions for related problems. result.

(4) In order to confirm the transaction status and provide you with after-sales and dispute resolution services, we will collect your transaction, payment and logistics information related to the transaction progress through the transaction object, payment institution, logistics company, etc. selected by you based on the transaction. Or share your transaction information with the above service providers.

3. Push messages to you

(1) Display and push products or services for you. We may use your information, your browsing and search records, device information, location information, order information, extract your browsing, search preferences, behavior habits, location information and other characteristics, and send emails, text messages or other Send you marketing communications, offer or promote our or third-party goods and services.

(2) Notice to you. We may send you service-related notices when necessary (for example, when we suspend, change, or terminate a single service due to system maintenance).

If you do not want to continue to receive our push messages, you can ask us to stop pushing, for example, requesting us to stop sending promotional SMS messages according to the SMS unsubscription guidelines, or setting your mobile device to stop receiving our push messages, etc.; Except when we send messages in accordance with the law or the service agreement of a single service.

4. Provide you with security

In order to ensure the authenticity of your identity and provide you with better security, you can provide us with sensitive personal information such as identification, facial features and other biometric information to complete real-name authentication.

In addition to identity verification, we may use your information for customer service, security, fraud detection, archiving and backup purposes to ensure the security of the services we provide to you; we may use or integrate your Information, as well as the information that our partners have obtained your authorization or shared in accordance with the law, to comprehensively judge your account and transaction risks, perform identity verification, detect and prevent security incidents, and take necessary recording, auditing, analysis, and disposal measures in accordance with the law.

5. To improve our services

We may use information collected through a service for our other services. For example, your information collected when you use one service may be used in another service to provide you with specific content or to show you relevant, rather than general, feeds information; we may allow you to participate in surveys about services, help us improve existing services or design new services; at the same time, we may use your information for software updates.

You understand and agree that after collecting your information, we will de-identify the data through technical means, and the de-identified information will not be able to identify you. In this case, we have the right to use the de-identified information. information, analyze the user database and make commercial use.

If we use your information for other purposes not specified in this Privacy Policy, we will seek your prior consent.

6. Exceptions to authorization and consent

According to relevant laws and regulations, your authorization and consent are not required to collect your information in the following situations:

(1) Related to national security and national defense security;

(2) Those related to public safety, public health, and major public interests;

(3) related to criminal investigation, prosecution, trial and execution of judgments;

(4) It is difficult to obtain your consent for the purpose of safeguarding the important legitimate rights and interests of the information subject or other individuals such as life and property;

(5) The information collected is disclosed to the public by you;

(6) Collecting information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels;

(7) Necessary to conclude a contract according to your request;

(8) Necessary for maintaining the safe and stable operation of services, such as discovering and disposing of product or service failures;

(9) Necessary for legitimate news reporting;

(10) When it is necessary for academic research institutions to conduct statistical or academic research based on public interests, and when the results of academic research or description are provided externally, the information contained in the results is de-identified;

(11) Other circumstances stipulated by laws and regulations.

3. Information we may share, transfer or disclose

(1) Sharing

We will not share your information with any third party outside of without your consent, except in the following cases:

1. To provide you with our services and to maintain and improve our services. We may share your information with partners and other third parties to achieve the core functions you need or provide the services you need, and to help us provide you with more targeted services;

2. The following is the situation of the third-party SDKs we use. We will update this list from time to time to more clearly show the situation of cooperating with third parties or using third-party functions to improve the product and service experience. Please understand that even though we try to update this list as timely as possible, it may still lag behind actual usage under certain circumstances. At the same time, in order to keep our business information and technical means confidential, some SDKs used for platform risk control or special cooperation may not be in this list, but when such SDKs need to obtain your important privacy information or device permissions, we will pass reasonable way to obtain your authorization.

3. To achieve the purposes described in the “How We Collect and Use Information” section of Article 2 of this “Privacy Policy”;

4. Fulfill our obligations and exercise our rights in this Privacy Policy or other agreements we have reached with you;

5. Sharing with third parties such as partners who entrust us to carry out promotion, but we will only provide information on the coverage and effectiveness of promotion to these entrusting parties, and will not provide information that can identify you, such as name, phone number or electronic email; or we aggregate this information so that it does not personally identify you. For example, we can tell the client how many people have seen their promotional information or purchased the client’s products after seeing the information, or provide them with non-personally identifiable statistical information to help them understand their audience or customers.

6. To the extent permitted by laws and regulations, in order to comply with the law, protect us and our affiliates or partners, you or other users or the public interest, property or safety from damage, such as to prevent fraud and other illegal activities activities and to reduce credit risk, we may exchange information with other companies and organisations. However, this does not include information that is sold, rented, shared or otherwise disclosed for profit in violation of the commitments made in this Privacy Policy.

7. In response to your legitimate needs, assist in handling disputes or disputes between you and others;

8. Provide your information at the legal request of your guardian;

9. Provided according to the single service agreement signed with you (including the electronic agreement signed online and the corresponding platform rules) or other legal documents;

10. Provided based on academic research;

11. Provided based on social and public interests that comply with laws and regulations.

We will only share your information for legitimate, legitimate, necessary, specific and explicit purposes. We will sign strict confidentiality agreements with companies, organizations and individuals with whom we share information, requiring them to process information in accordance with our instructions, this Privacy Policy and any other relevant confidentiality and security measures.

(2) Transfer

1. As our business continues to develop, we may conduct mergers, acquisitions, asset transfers or similar transactions, and your information may be transferred as part of such transactions. We will require new companies and organizations that hold your information to continue to be bound by this “Privacy Policy”, otherwise, we will require the company and organization to seek your authorization and consent again.

2. After obtaining your explicit consent, we will transfer your information to other parties.

(3) Disclosure

We will only disclose your information under the following circumstances and subject to industry-standard security measures:

1. According to your needs, disclose the information you specify in the disclosure method you expressly agree to;

2. When it is necessary to provide your information according to the requirements of laws, regulations, mandatory administrative law enforcement or judicial requirements, we may disclose your information according to the requested information type and disclosure method. Under the premise of compliance with laws and regulations, when we receive the above-mentioned request for information disclosure, we will require the recipient to issue corresponding legal documents, such as subpoenas or investigation letters. We strongly believe in being as transparent as possible about the information we are asked to provide, to the extent permitted by law. All requests are carefully reviewed to ensure they have a legitimate basis and are limited to data law enforcement has a legitimate right to obtain for specific investigative purposes.

4. How we retain, store and protect information

We will only retain your information for the period necessary for the purposes described in this “Privacy Policy” and for the time limit required by laws and regulations

Information that we collect and generate in our California operations is stored in the United States, except in the following cases:

1. There are clear provisions in laws and regulations;

2. Obtain your authorization and consent;

3. The products and services you use involve cross-border, and needs to provide your personal information overseas.

In response to the above situations, we will ensure adequate protection of your personal information in accordance with this policy and the requirements of national laws and regulations.

We will take the following measures to protect your information:

(1) Data security technical measures

We will adopt industry-standard security protection measures, including establishing reasonable system specifications and security technologies to prevent your information from being accessed, used and modified without authorization, and to avoid data damage or loss. Network services adopt a variety of encryption technologies. For example, in some services, we will use encryption technology (such as SSL) to protect your information, adopt encryption technology to encrypt and store your information, and isolate it through isolation technology. When using information, such as information display and information association calculation, we will adopt a variety of data desensitization technologies to enhance the security of information in use. Strict data access authority control and multi-factor authentication technology are used to protect information and prevent data from being used illegally.

(2) Other security measures we take to protect information

We manage the storage and use of normative information by establishing a data classification and grading system, data security management specifications, and data security development specifications.

We have comprehensive security controls over data through contact confidentiality agreements, monitoring and auditing mechanisms. Strengthen safety awareness. We also conduct security and privacy protection training sessions to enhance employee awareness of the importance of protecting information.

(3) We only allow employees and partners who need to know this information to access your information, and set up strict access control and monitoring mechanisms for this purpose. We also require all personnel who may have access to your information to fulfill corresponding confidentiality obligations. Failure to fulfill these obligations may result in legal liability or suspension of the partnership with

(4) We will take all reasonable and feasible measures to ensure that irrelevant information is not collected.

(5) The Internet is not an absolutely safe environment, and it is impossible to determine whether the communication with other users such as email, instant messaging, social software or other service software is completely encrypted. We recommend that you use complex passwords when using such tools, and Take care to protect the security of your information.

(6) The Internet environment is not 100% secure, and we will try our best to ensure or guarantee the security of any information you send to us. If our physical, technical, or management protection facilities are damaged, resulting in unauthorized access, public disclosure, tampering, or destruction of information, resulting in damage to your legitimate rights and interests, we will assume corresponding legal responsibilities.

(7) Handling of security incidents

When communicating with third parties or purchasing goods and services through the service, you will inevitably disclose your information, such as contact information or postal address, to the counterparty or potential counterparty. Please properly protect your information and only provide it to others when necessary.

In order to deal with possible risks such as information leakage, damage and loss, we have formulated a number of systems to clarify the classification and grading standards of security incidents and security vulnerabilities and the corresponding processing procedures. We have also established a special emergency response team for security incidents. In accordance with the requirements of security incident handling specifications, we have launched security plans for different security incidents, stopped losses, analyzed, positioned, formulated remedial measures, and cooperated with relevant departments to trace and combat the source.

In the event of an unfortunate information security incident, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, and your suggestions for self-prevention and risk reduction , remedies for you, etc. At the same time, we will promptly inform you of the relevant information of the event by email, letter, telephone, push notification, etc. When it is difficult to inform the information subjects one by one, we will publish announcements in a reasonable and effective way. At the same time, we will also proactively report the handling of information security incidents in accordance with the requirements of regulatory authorities.

Please understand that due to technical limitations and risk prevention limitations, even if we have strengthened security measures as much as possible, we cannot always guarantee 100% information security. You need to understand that the system and communication network you use to access the service may have problems due to circumstances beyond our control.

5. How to manage your information

(1) Access, update and deletion

We encourage you to update and revise your information to make it more accurate and effective. You can access your information through the service, and complete it by yourself or ask us to modify, supplement and delete it according to the management method of the corresponding information. We will take appropriate technical measures to ensure that you can access, update and correct your own information or other information provided when using the service as much as possible.

When accessing, updating, correcting and deleting the aforementioned information, we may require you to authenticate to ensure information security. Regarding your information collected through COOKIES, we also describe the choice mechanism provided to you in the second section “COOKIES, log files and WEB BEACON” of this “Privacy Policy”. If you want to query, modify or delete some of your information, please log in to the account center or follow the specific guidelines for individual services.

(2) Open and share

Many of our services allow you to publicly share information about you not only with your social network, but also with all users of the service, such as the information you upload or post on the service, the information you share with others In response to information uploaded or posted, upload or post your personal information via email or in a public area of the service that is not visible to specific users, and includes location data and log information related to such information. As long as you do not delete the information you have disclosed or shared, the relevant information may remain in the public domain; even if you delete the shared information, the relevant information may still be independently cached, copied or stored by other users or third parties not controlled by us, or kept in the public domain by other users or such third parties. If you disclose or share your information through the above channels, we will not be held responsible for the disclosure of your information. Therefore, we remind and ask you to carefully consider whether to disclose or share your information through the above channels.

(3) Cancellation

Your account of this service may be cancelled or deleted in compliance with the conditions stipulated in the service agreement of the individual service and the relevant national laws and regulations. When the account is cancelled or deleted, all service materials and data related to the account and under the single service will be deleted or processed in accordance with the service agreement of the single service.

(IV) Change the scope of your authorization and consent

You can always choose whether to disclose information. Some information is required to use the service, but the provision of most other information is at your discretion. You can change the scope of your authorization to continue to collect information or withdraw your authorization by deleting information, turning off device functions, etc.

After you withdraw your authorization, we cannot continue to provide you with the services corresponding to the withdrawn authorization, and we will no longer process your corresponding information. However, your decision to withdraw the authorization will not affect the previous information processing based on your authorization.

(5) Tips on sensitive information

Certain information may be considered sensitive information due to its particularity, such as your race, religion, personal health and medical information, etc., as well as identification documents, personal biometric information, property information, whereabouts, information on minors, etc. .

Please be aware that the content and information you provide, upload or post on the service (such as photos or information about your social activities) may reveal your sensitive information. You need to carefully consider whether to disclose your sensitive information using the service.

You agree that your sensitive information will be processed for the purposes and methods described in this Privacy Policy.

6. Third-party services

The service may link to social media or other services (including websites or other forms of service) provided by third parties. include:

(1) You can use the “Share” button to share certain content to the service, or you can use a third-party service to log in to the service. These functions may collect your information (including your log information), and may install COOKIES on your computer, so that the above functions can function normally;

(2) We provide you with links through advertisements or other means of our services that allow you to access third-party services or websites; and

(3) Other situations of accessing third-party services.

Such third party social media or other services are operated by the relevant third party. Your use of such third party’s social media services or other services (including any information you provide to such third party) is subject to the third party’s own terms of service and information protection statement (not this Privacy Policy), You need to read its terms carefully. This Privacy Policy applies only to any information we collect, and does not apply to the services provided by any third party or the rules for the use of information by third parties, and we are not responsible for any third party’s use of the information provided by you.

7. Age limit

We suggest that any minors participating in online activities should obtain the consent of their parents or their legal guardians (hereinafter referred to as “guardians”) in advance. We will protect the relevant information of minors in accordance with the relevant national laws and regulations.

We encourage parents or guardians to instruct minors in the use of services. We recommend that minors encourage their parents or guardians to read this Privacy Policy and advise minors to seek parental or guardian consent and guidance before submitting information.

8. Notice and Amendment

We may revise the terms of this Privacy Policy from time to time, and such revisions form part of this Privacy Policy. For major changes, we will provide a more prominent notice, and you can choose to stop using the service; in this case, if you continue to use the service, you agree to be bound by this revised Privacy Policy “Constraints.

Any modification will put your satisfaction first. We encourage you to review our Privacy Policy each time you use the services.

We may issue service-related announcements when necessary (such as when we suspend a service due to system maintenance). You may not be able to cancel these service-related announcements that are not promotional in nature.

Finally, you must keep your account and password information confidential. In any case, please keep it carefully.

9. How to contact us

If you have complaints and reports about online information security, or you have any questions, comments or suggestions about this Privacy Policy, your information, and questions about this Statement or the privacy practices of, please contact reelfinancial .com coordinator contact. The address is [email protected].