We know the importance of personal information to you and will do our best to protect your personal information. We are committed to maintaining your trust in us, abiding by the following principles and protecting your personal information: the principle of unanimity of power and responsibility, the principle of clear purpose, the principle of choice and consent, the principle of minimum utility, the principle of ensuring security, the principle of participation in the main body, the principle of openness and transparency. At the same time, we promise that we will take appropriate security measures to protect your personal information in accordance with the industry's mature security standards.
First, how do we collect and use your personal information?
Personal information refers to all kinds of information recorded electronically or otherwise that can identify a particular natural person or reflect the activities of a particular natural person individually or in combination with other information.
We will collect and use your personal information only for the purposes stated in this policy:
(1) to provide you with online information access, music audition and other services.
1, business function 1: register as a user.
To complete the account creation, you need to provide the following information: your name, e-mail address, created username and password.
During the registration process, if you provide the following additional information, it will help us to provide you with better service and experience: mobile phone number, job position, company, education background. However, if you do not provide this information, you will not affect the basic functions of using this service.
The above information you will provide will continue to authorize us to use it when you use this service. When you cancel your account, we will stop using and delete the above information.
The above information will be stored in People's Republic of China. For cross border transmission, we will get your authorization separately.
2, business function two: commodity display, personalized recommendation, send promotional marketing information.
(2) Develop internal data analysis and research, third-party SDK statistical services, and improve our products or services
We collect data based on your interactions with us and the choices you make, including your privacy settings and the products and functions you use. The data we collected may include SDK/API/JS code versions, browsers, Internet service providers, IP addresses, platforms, timestamps, application identifiers, application versions, application distribution channels, stand-alone device identifiers, iOS advertisement identifiers (IDFAs), Android advertiser identifiers, network card (MAC) addresses, International Mobile Device Identification Code (IMEI), device model, terminal manufacturer, operating system version of terminal device, session start/stop time, language location, time zone and network status (WiFi, etc.), hard disk, CPU and battery usage, etc.
(3) When we want to use the information for other purposes not specified in this strategy, we will ask your permission in advance.
When we want to use information gathered for specific purposes for other purposes, we will ask your permission in advance.
Two. How do we use Cookie and similar technologies?
To make sure the site works properly, we will store a small data file called Cookie on your computer or mobile device. Cookie usually contains identifiers, site names, and numbers and characters. With Cookie, the website can store data in your preferences or merchandise in the shopping basket.
We will not use Cookie for any purpose other than those stated in this policy. You can manage or delete Cookie according to your preferences. You can clear all cookies that are saved on your computer, and most Web browsers have the ability to block cookies. But if you do, you need to change the user settings in person whenever you visit our website.
(two) website beacon and pixel labels
In addition to Cookie, we will use web site beacons and pixel labels and other similar technologies on the website. For example, the e-mail we sent to you may contain clicking URL linked to the content of our website. If you click on this link, we will track this click to help us understand your product or service preferences and improve customer service. Web beacon is usually a transparent image embedded into a website or e-mail. With the help of pixel labels in e-mail, we can learn whether or not e-mail is being opened. If you don't want your activities to be tracked in this way, you can always unsubscribe from our mailing list.
(three) Do Not Track (do not track)
Many Web browsers have a Do Not Track feature that publishes Do Not Track requests to the Web site. At present, the major Internet standards organizations have not set up relevant policies to specify how websites should respond to such requests. But if your browser has Do Not Track enabled, then all our websites will respect your choice.
Three. How do we share, transfer and disclose your personal information publicly?
We do not share your personal information with any other company, organization or individual except the following:
1. Sharing with explicit consent: After obtaining your explicit consent, we will share your personal information with other parties.
2. We may share your personal information with the outside world in accordance with laws and regulations or mandatory requirements of the competent government departments.
We will not transfer your personal information to any company, organization or individual, except in the following circumstances:
1. Assignment with express consent: With your express consent, we will transfer your personal information to other parties.
Three, public disclosure
We will disclose your personal information only in the following circumstances:
1, get your clear consent;
2. Disclosure Based on Law: We may disclose your personal information publicly in cases of law, legal proceedings, litigation or mandatory requirements of the competent government departments.
Four, how do we protect your personal information?
(1) We have used industry-standard security measures to protect your personal information from unauthorized access, public disclosure, use, modification, damage or loss. We will take all reasonable and feasible measures to protect your personal information. For example, SSL encryption protects your browser from exchanging data (such as credit card information) with "services"; we also provide secure HTTPS browsing of our website; we use encryption technology to ensure data confidentiality; we use trusted protection mechanisms to prevent malicious attacks on data; We will deploy access control mechanisms to ensure that only authorized personnel have access to personal information, and we will conduct security and privacy training courses to enhance staff awareness of the importance of protecting personal information.
(two) we will take all reasonable and feasible measures to ensure that no personal information is collected. We will only retain your personal information within the period of time required to achieve the objectives stated in this policy, unless extended or permitted by law.
(3) The Internet is not an absolutely secure environment, and email, instant messaging, and other forms of communication with our users are not encrypted. We strongly recommend that you do not send personal information in this way. Please use complex passwords to help us ensure your account is secure.
(4) The Internet environment is not 100% secure. We will try our best to ensure or guarantee the security of any information you send us. If our physical, technical, or managerial protection facilities are damaged, resulting in unauthorized access to information, public disclosure, tampering, or destruction, resulting in damage to your legitimate rights and interests, we will assume the corresponding legal responsibility.
(5) After the unfortunate occurrence of personal information security incidents, we will inform you in time, in accordance with the requirements of laws and regulations, of the basic conditions and possible impacts of security incidents, the measures we have taken or will take to deal with them, the suggestions that you can prevent and reduce the risks on your own, and the remedial measures for you. We will promptly notify you of the relevant events by mail, letter, telephone, push notification, etc. When it is difficult to inform the subject of personal information one by one, we will adopt a reasonable and effective way to publish the announcement.
At the same time, we will also take the initiative to report the handling of personal information security incidents in accordance with regulatory requirements.
Five, your rights
In accordance with the relevant laws, regulations, standards and practices of other countries and regions in China, we guarantee that you exercise the following rights to your personal information:
(1) visit your personal information.
You have the right to access your personal information except for exceptions provided for by laws and regulations. If you want to exercise data access, you can access it yourself in the following ways:
Account Information - If you want to access or edit personal data and payment information in your account, change your password, add security information, or close your account, you can do this by accessing XXXX.
Search Information - You can access or clear your search history, view and modify interests, and manage other data in a personal center.
If you can't access this personal information through the above links, you can contact us at any time using our Web form, or send an e-mail to firstname.lastname@example.org. We will reply to your request within 30 days.
As long as we don't need too much input, we will provide you with other personal information that you generate during the use of our products or services. If you want to exercise data access, please send e-mail to email@example.com.
(two) correct your personal information.
You have the right to ask us to make corrections when you find that there are errors in our personal information about you. You can apply for correction by way of "(I) visit your personal information".
If you can't correct these personal information through the above links, you can contact with our Web form at any time, or send an e-mail to firstname.lastname@example.org. We will reply to your request within 30 days.
(three) delete your personal information.
In the following circumstances, you can ask us for a request to delete personal information:
1, if we deal with personal information violations of laws and regulations;
2, if we collect and use your personal information, we have not obtained your consent.
3, if we deal with personal information violations of your agreement.
4, if you no longer use our products or services, or you write off your account number.
5, if we no longer provide you with products or services.
If we decide to respond to your request for deletion, we will also notify entities that have obtained your personal information from us to delete it in a timely manner, unless the laws and regulations provide otherwise or these entities are authorized independently by you.
When you delete information from our service, we may not delete the information immediately from the backup system, but we delete it when we backup the update.
(four) change the scope of your authorization agreement.
Each business function requires some basic personal information to complete (see Part 1 of this strategy). For the collection and use of additional personal information, you may at any time give or withdraw your authorization consent.
You can operate yourself in the following ways:
When you withdraw your consent, we will no longer process personal information. However, your decision to withdraw your consent will not affect the personal information processing that has been done on the basis of your authorization.
If you do not want to accept the commercial advertisement we sent you, you may apply for cancellation at any time by the following means:
(five) cancellation of personal information subject
You can cancel the previously registered accounts at any time. You can operate the following ways:
After the cancellation of the account, we will stop providing you with products or services, and delete your personal information according to your request, except as otherwise stipulated by laws and regulations.
(six) personal information subject obtains personal information copy.
You have the right to obtain copies of your personal information, which you can obtain by way of:
If technically feasible, such as data interface matching, we can also transfer a copy of your personal information directly to a third party you specify as required.
(seven) constraint information system automatic decision making
In some business functions, we may only make decisions based on non-manual automatic decision-making mechanisms such as information systems, algorithms, etc. If these decisions significantly affect your legitimate rights and interests, you have the right to ask us for an explanation, and we will provide appropriate remedies.
(eight) respond to your request.
In order to ensure safety, you may need to provide written request or to prove your identity in other ways. We may ask you to verify your identity first and then process your request.
We will reply within thirty days. If you are not satisfied, you can also complain through the following channels:
We do not charge for your reasonable request in principle, but we will charge a certain cost for repeated requests that exceed a reasonable limit. We may reject requests that are unjustifiably duplicated, require too many technical means (e.g., the need to develop new systems or radically change existing practices), pose risks to the legitimate rights and interests of others, or are very impractical (e.g., involve backing up information stored on tape).
In the following circumstances, we will not be able to respond to your request in accordance with the requirements of laws and regulations:
1, related to national security and national defense safety;
2, relating to public safety, public health and major public interests;
3, related to criminal investigation, prosecution and trial;
4, there is ample evidence that you have subjective malice or abuse of rights.
5, in response to your request, you will cause serious damage to the legitimate rights and interests of you or other individuals and organizations.
Six. How do we deal with children's personal information?
In the case of collecting children's personal information with the consent of their parents, we will only use or publicly disclose this information if it is permitted by law, with the explicit consent of the parents or guardians, or if it is necessary to protect the child.
Despite the different definitions of children in local laws and customs, we treat everyone under the age of 14 as a child.
The scope of our collection, sharing, transfer, and public disclosure of children’s personal information is the same as the above-mentioned service scope, but any collection, storage, sharing, transfer, and public disclosure of children’s personal information requires the explicit consent of the child’s guardian in advance If the national laws and regulations on the protection of children's personal information issue new policies to restrict the behaviors related to children's personal information, we will adjust the scope of the collection, sharing, transfer, and public disclosure of children's personal information we provide in accordance with national laws and regulations.
If you are the legal guardian of a child, please pay attention to whether the child under your custody uses Changyou's services or provides personal information after obtaining your authorization. If the child’s guardian expressly refuses us to provide services to the child in the above manner, we will promptly delete the relevant child’s personal information we collect, store, and use in accordance with the law and stop providing services to the child.
The personal information of children we collect is defined as sensitive information, and all personal information of children collected is stored in mainland China. Children’s personal information will be protected by strict technical safeguards. In addition, Changyou has also established a strict data security management process, and strictly restricts the access and use of sensitive data. All access or permission applications for sensitive information are required After application, approval and record keeping.
If we find ourselves collecting children's personal information without prior and verifiable parental consent, we will try to delete the data as soon as possible.
Seven, how can your personal information be transferred globally?
In principle, the personal information we collect and produce in the territory of the People's Republic of China will be stored in the territory of the People's Republic of China.
Since we provide products or services through resources and servers all over the world, this means that with your authorization, your personal information may be transferred to, or accessed from, the countries/regions in which you use the products or services.
Such jurisdictions may have different data protection laws, or even do not establish relevant laws. In such cases, we will ensure that your personal information is sufficiently and equally protected within the territory of the People's Republic of China. For example, we'll ask you for permission to transfer personal information across borders, or to implement security measures such as data de-identification prior to a cross-border data transfer.
Nine, how to contact us
Under normal circumstances, we will reply within thirty days.