Coinlook ("Company" or "We") operates a Coinlook Big Data Analysis platform ("Coinlook"), which includes the domain name com, Coinlook App, Coinlook Weibao Weibo Weibo Weibo, etc. which may provide you with the following personal information when you read carefully.
All content on this website can be used in a number of languages, such as user convenience, conflict or omission, whichever is English.
1. Rules for Personal Information Collection and Use
1-1) courtesy of Coinlookcore business functions of the products and/or services of the company To implement core business functions, use them at your disposalWe may need to collect from you the products and/or services provided by Coinlook.Collect personal information. The following list of core business functions and personal information gathered for the purpose of implementing the function is not available if you refuse to collect it.
(a) When you browse information: You do not need to You can use the browse information function by registering your Coinlook account. Browse content includes Cryptocurrency market information, index information, information information information, and during the browsing process we may collect information about your device using Coinlook (including device model, operating system version, resolution, telecommunications operator, device settings, device positioning) to provide you with the lowest possible information display.Excellent solution. In addition, we will automatically collect details about your use of Coinlook and save them as related logs, including but not limited to the search keyword information and click links you entered, the content you visited, the date and time you visited, and the web page records you requested, operating system, software version number, login IP information.
(b) We may request authorization to useDevices store read and write permissions to load information, etc. necessary material.Coinlook does not abuse the device's storage read and write permissions to access files in other applications.
1-2) courtesy of CoinlookAdditional business functions of the products and/or services of the Company
a) When you log on to Coinlook account: During the process of registering you as a Coinlook user, you mightNeed to provide us with a cell phone number to create a user name and password.You can provide additional information in your user registration, such as your real name, date of birth, place of residence, hobby, educational background, job career, which will help us to give you more personal informationservices, but not provided and will not affect your basic services provided by Coinlook.
b) When you use Coinlook Open Platform releases information: First you need to submit related authentication information, authentication informationIncluding the subject's real name information, head image LOGO, address information, subject identity information, third party social account information, mobile phone number, mailbox, authentication application, we have approved you can use the services provided by Coinlook.In the process of publishing information, we mayAccess to your device's storage read and write permissions, photo album permissions, camera permissions, geographic location permissions, and the information and permissions you provide will help Coinlook provide you with Coinlook open platform publishing information services, if you do not provide and will not affect your use of the basic services provided by Coinlook, but will render you unable to use the pre-mentioned services provided by Coinlook.
1-3) Exception of Consent
In the following cases, we may not be able to make it.Get your permission first for related information:
a) Straightening with National Security and National Securityassociated;
b) with public safety, public health,directly related to major public interests;
c) To investigate, prosecute and try criminal offencesdirectly related to execution of the judgment;
d) To protect your life or someone else's.but it is difficult to obtain your own consent in time;
e) The personal information collected is from you.public disclosure of the public;
f) From Legal and Open DisclosureYour personal information collected, such as legitimate news reporting, government information disclosure, etc.
g) For maintenance of Bixiaobnecessary for the safe and stable operation of products or services provided by ao, e.g. discovery, disposalbreakdown of products or services;
h) For the sake of academic research, andPersonal information contained in the results of an academic study or description is given to the outside world.de-identification treatment;
(9) Other circumstances as stipulated in the law and regulations。
2. how do we use Cookie and the like?
2-2) Site Map and pixel tags
In addition to cookies, we will also use website beacons and pixelsand other similar technologies such as labeling.For example, the email or push information we sent to you may contain URLs that link to products and/or services provided by Coinlook.If you click on
the link, we will follow this click to help us understand your product or service preferences in Coinlook and improve customer service.
Many web browsers have Do Not Truckfunction, which can be accessed from the website atPublish Do Not Rack Request.At present, major Internet standards bodies have not established relevant policies to specify how websites should respond to such requests.But if your
browser enables Do Not Truck, then all of our websites will respect your choice.You can also use your browser settings to delete or block cookies on your computer.
3. How do we share, transfer and disclose your personal information publicly
(3-1) Sharing (3-3) Do Not Tack (please Do Not Track)
We will not share it with any business, organisation or individual other than the companyYour personal information, but the following:Exceptions:
a) Share with your explicit consent;
b) Under the provisions of laws and regulations, or in accordance with the strength of the competent department of government,You're required to share it with the outside world.personal information;
We will not transfer your personal information to any enterprise, organization or organization.Individuals, except in the following circumstances：
a) transfer with your explicit consent;
b) Conformity with the relevant agreements signed with you (including those signed online)Electronic Protocol and the corresponding Bor other legal document conventions.
3-3. Public disclosure
We will disclose your personal information only in the following circumstances:
a) with your explicit consent;
b) You have taken the initiative to disclose your personal information publicly
c) In the case of law, proceedings, litigation or competent government department, the Secretary for Financial Services and the Commissioner of Inland Revenue, the Commissioner of Inland Revenue, the Commissioner of Inland Revenue, the Commissioner of Inland Revenue, the Commissioner of Inland Revenue, Mr Donald Tsang, and the Commissioner of Inland Revenue.subject to regulatory requirements, I have to inform the Inland Revenue Department (IRD)We may disclose your personal information publicly; when we receive a request for such disclosure, we will require that legal documents, such as summonses or letters of inquiry, be produced.
4. How do we protect your personal information
We have adopted various types of security measures that meet the industry standard.Full technology and protection protect your personal information from unauthorized access, use, or leakage. For example, when you exchange data with Coinlook servers, we use a variety of technologies such as HTTPS, SSL, AES to ensure data security and confidentiality; we will strictly follow domestic and foreign security standards for security system construction, and combine leading-edge, mainstream security technologies to prevent users from being accessed and accessed without authorization.We have established a complete security defense system that enables us to intercept attacks on time when we are exposed to external cyber attacks and when we are infected
We've established and sound data security management systems.We will organize security and privacy protection training regularly to enhance the staff's awareness of personal information protection.However, you should understand that in the Internet industry, due to technical limitations and possible malicious practices, information leakage may occur due to factors outside our control. We will follow the example of personal information security.The law and regulations require that you be informed of the basic situation and possible effects of the safety event through the Coinlook station letter/ the contact you have reserved, etc. We have taken or will take emergency response and other related measures, your remedial measures, etc.If it is difficult to inform the subject of personal information one by one, we will issue a public announcement in a reasonable and effective manner and will take the initiative to report to the relevant regulatory authorities on the disposition of personal information security incidents.
5. How do you manage your personal information
We'll do our best to take the right technique.means to ensure that you can access, correct, supplement and delete your own registration information or other personal information provided by Coinlook when using the products and/or services provided by Coinlook.
5-1) Access your personal information
5-2) Correcting or supplementing your personal information
5-3) Delete Your Personal Information
You can change your authorization by contacting us.The range of your personal information that we collect and use, and cancel the account, cancel our full authorization to collect and use your personal information."After you have cancelled your account, we have made a written agreement with you, except as otherwise provided by law and regulations, or as otherwise agreed in writing."will stop using and delete your personalinformation.
You may refer to us in the following cases:To issue a request to delete your personal information:
a) We handle your personal informationact in violation of the law and regulations or of an agreement with you;
b) Our collection of your personal informationthe collection and use of the collection and use of the materials, which have not been expressly agreed with you;
c) We terminate our offer to you or your Lord.or services provided by Coinlook.
After you delete your personal information, weIt may not immediately delete the corresponding information from the backup system, but this information will be deleted during the backup update.We will delete your personal information when you cancel your account, but have been used to process information anonymously for user portraits or under the lawexcept where the statute may not be deleted.
We process or delete your personal name anonymously.In information, if your personal information has been shared, we will also inform the relevant business, organization, or individual concerned to make anonymous or delete your personal information.
5-4) Change the scope of your delegation's consent
You can change the photos in your mobile phone deviceAccess permissions such as computer, location, etc. change browser function settings, change settings options.If you are not willing to accept the push message we sent you, you may contact us through the link in
5-5) Cancellation of Account Number
5-6) Obtain a copy of your personal information
5-7) Constraints information system automatic decision making
In some of our business functions, we may be onlyDecisions are made based on non-artificial automatic decision-making mechanisms such as information systems and algorithms.If these decisions significantly affect your legitimate rights and interests, you have the
right to ask us for an explanation and we will also provide appropriate relief.
5-8) Responding to your above request
In order to ensure safety,the above requirements are put forward.We may request to verify your identity before processing your request.Normally, we will reply to your request within fifteen days.We do not charge you in principle for your reasonable request,but please repeat it several times beyond the reasonable limit.Please, we'll charge you a certain percentage.This cost. Requires too many technical means (e.g., development of new systems or fundamental changes to existing practices), risks to others' legitimate rights and interests, or very unrealistic requests (e.g. involving information stored on backup tapes)we may refuse.
We will not be able to respond in the following cases:Your request:
a) Performance with us in accordance with the provisions of the laws and regulationsrelated to the obligations of the employer;
b) Straightening with National Security and National Securityassociated;
c) with public safety, public health,directly related to major public interests;
d) To investigate, prosecute, or try a crimedirectly related to the execution of a judgment, etc.
e) We have sufficient evidence that userssubjectively malicious or abusing one's rights;
f) for the purpose of maintaining users or other individualssuch as life and property, but it is difficult to obtain the consent of the person;
g) Responding to a user's request will result in usein cases where the legitimate rights and interests of the household or other individuals or organizations are seriously impaired;
h) involving trade secrets.
6. How do we handle children's personal information
without the consent of parents or other guardians,Children are not allowed to create their own user accounts.In the case of collecting personal information of children with the consent of parents or other guardians, we will only use or disclose it publicly if it is legally permitted, and where it is necessary for parents or other guardians to expressly agree with or protect children.
Although local laws and customs do not define children,However, we consider anyone under the age of 14 as a child.
7. Storage of your personal information
within the territory of the People's Republic of ChinaThe personal information of the user will be stored within the territory of the People's Republic of China.Because we've passed all over the world.Resources and servers provide Coinlook products and/or services, which means that, in the event of obtaining your authorization,Your personal information may be transferred to overseas jurisdictions where you use Coinlook
products and/or services, or be visited from these jurisdictions, after a safety assessment of your data's cross-border activities.
This type of jurisdiction may be differentdata protection laws, even without relevant laws.In such cases, we will ensure that your personal information is available.Equal protection is sufficient within the territory of the People's Republic of China.For example, we will ask for your consent to transfer your personal information across borders, or for security measures such as data de-recognition before cross-border data transfers.
9. How to Contact Us
9-1) If you have any personal information about thisContact us if you have any questions, comments, or suggestions regarding the policy or your personal information.
Personal Information Protection OfficerMailboxes: [email protected] ;
9-2) Generally speaking,We will reply within fifteen days.If you are not satisfied with our response, especially if our personal information processing has compromised your legitimate rights and interests, you can also access the Internet.Complaints or reports are made by the regulatory authorities such as letters, telecommunications, public security and industrial and commercial sectors.
10. Supplementary Provisions