$USD
country icon
¥-CNY

Chinese Yuan

country icon
$-USD

United States Dollar

country icon
-KRW

South Korean Won

country icon
-RUB

Czech Koruna

Privacy Agreement


Coinlook ("Company" or "We") operates a Coinlook Big Data Analysis platform ("Coinlook"), which includes the domain name com, Coinlook App, Coinlook Weibao Weibo Weibo Weibo, etc. which may provide you with the following personal information when you read carefully.

Coinlook offers professional blockchain data information, real-time market information, trend analysis, and personal home page, asset bookkeeping, information dissemination, community exchange, etc.Hopefully, you will read carefully before using the products and/or services provided by Coinlook and confirm that you have fully understood what this privacy policy says and that you can make what you think is appropriate in accordance with the guidelines of this privacy policy.The relevant terms in this privacy policy are described in a concise way so that you can better understand them.Your tick "I have read and agreed to" or "I have read and agreed to" after we update this privacy policy (we will prompt you in time) and continue to use the products and/or”services provided by Coinlook”, which means that you agree to this privacy policy (including updates) and that you agree to keep your information and share it in accordance with our privacy policy.

If you have any questions, comments, or suggestions about this Privacy Policy, you can contact us at any time through the contact specified in this Privacy Policy and get feedback; if you do not agree with this Privacy Policy, you should immediately stop using the products and/or services provided by Coinlook.We would like to explain to you through this Privacy Policy the safeguards we take against your information and the rights you enjoy when using the products and/or services provided by Coinlook.In particular, you are reminded that we may automate the processing of your personal data after collecting your personal information.In this case, we will demarcate the data to form a user database according to the technical standards commonly used by the state. Using information that meets the de-recognition criteria does not violate your privacy or personal information protection policy. We have the right to analyze and commercialize the user database.

All content on this website can be used in a number of languages, such as user convenience, conflict or omission, whichever is English.

1. Rules for Personal Information Collection and Use

1-1) courtesy of Coinlookcore business functions of the products and/or services of the company To implement core business functions, use them at your disposalWe may need to collect from you the products and/or services provided by Coinlook.Collect personal information. The following list of core business functions and personal information gathered for the purpose of implementing the function is not available if you refuse to collect it.

(a) When you browse information: You do not need to You can use the browse information function by registering your Coinlook account. Browse content includes Cryptocurrency market information, index information, information information information, and during the browsing process we may collect information about your device using Coinlook (including device model, operating system version, resolution, telecommunications operator, device settings, device positioning) to provide you with the lowest possible information display.Excellent solution. In addition, we will automatically collect details about your use of Coinlook and save them as related logs, including but not limited to the search keyword information and click links you entered, the content you visited, the date and time you visited, and the web page records you requested, operating system, software version number, login IP information.

(b) We may request authorization to useDevices store read and write permissions to load information, etc. necessary material.Coinlook does not abuse the device's storage read and write permissions to access files in other applications.

1-2) courtesy of CoinlookAdditional business functions of the products and/or services of the Company

In order to provide you with better quality products and/or services, we may need to collect the following information.If you refuse to provide the following information, no.Affects your normal use of the core business functions described in Part I of this Privacy Policy (I), but we are unable to provide you with certain specific features and services.

a) When you log on to Coinlook account: During the process of registering you as a Coinlook user, you mightNeed to provide us with a cell phone number to create a user name and password.You can provide additional information in your user registration, such as your real name, date of birth, place of residence, hobby, educational background, job career, which will help us to give you more personal informationservices, but not provided and will not affect your basic services provided by Coinlook.

b) When you use Coinlook Open Platform releases information: First you need to submit related authentication information, authentication informationIncluding the subject's real name information, head image LOGO, address information, subject identity information, third party social account information, mobile phone number, mailbox, authentication application, we have approved you can use the services provided by Coinlook.In the process of publishing information, we mayAccess to your device's storage read and write permissions, photo album permissions, camera permissions, geographic location permissions, and the information and permissions you provide will help Coinlook provide you with Coinlook open platform publishing information services, if you do not provide and will not affect your use of the basic services provided by Coinlook, but will render you unable to use the pre-mentioned services provided by Coinlook.

c) When you share Coinlook Content: We may have access to your Sina Weibo, WeChat or other shared websites.Relevant information. Certain personal information is possible because of its particularity.Personal sensitive information is deemed to be personal; personal sensitive information is to be illegally provided or abused in the event of leakagePersonal sensitive information in this Privacy Policy includes your personal identity information; network identity information (including account name, account nickname, account name); and personal information that may endanger your personal reputation, physical and mental health, or discriminatory treatment.information (including telephone numbers, web browsing history, accurate positioning of information).Your prior consent will be sought when we want to use the information for other purposes not specified in this Privacy Policy.Your prior consent will also be sought when we want to use the information collected for other purposes.

1-3) Exception of Consent

In the following cases, we may not be able to make it.Get your permission first for related information:

a) Straightening with National Security and National Securityassociated;

b) with public safety, public health,directly related to major public interests;

c) To investigate, prosecute and try criminal offencesdirectly related to execution of the judgment;

d) To protect your life or someone else's.but it is difficult to obtain your own consent in time;

e) The personal information collected is from you.public disclosure of the public;

f) From Legal and Open DisclosureYour personal information collected, such as legitimate news reporting, government information disclosure, etc.

g) For maintenance of Bixiaobnecessary for the safe and stable operation of products or services provided by ao, e.g. discovery, disposalbreakdown of products or services;

h) For the sake of academic research, andPersonal information contained in the results of an academic study or description is given to the outside world.de-identification treatment;

(9) Other circumstances as stipulated in the law and regulations。

2. how do we use Cookie and the like?

2-1) Cookie

When you use CoinlookTi with a Web browserwhen the products and/or services are suppliedYou will put one or more cookies into your computer.If you log in using the Coinlook account, we will set up or read one or more other cookies.Cookies usually contain identifiers, site names, and some numbers and characters.With the help of Cookie, we are able to store data such as your preferences or favorites; we will not use cookies for any purpose other than the purposes described in this privacy policy.

2-2) Site Map and pixel tags

In addition to cookies, we will also use website beacons and pixelsand other similar technologies such as labeling.For example, the email or push information we sent to you may contain URLs that link to products and/or services provided by Coinlook.If you click on

the link, we will follow this click to help us understand your product or service preferences in Coinlook and improve customer service.

Many web browsers have Do Not Truckfunction, which can be accessed from the website atPublish Do Not Rack Request.At present, major Internet standards bodies have not established relevant policies to specify how websites should respond to such requests.But if your

browser enables Do Not Truck, then all of our websites will respect your choice.You can also use your browser settings to delete or block cookies on your computer.

3. How do we share, transfer and disclose your personal information publicly

(3-1) Sharing (3-3) Do Not Tack (please Do Not Track)

We will not share it with any business, organisation or individual other than the companyYour personal information, but the following:Exceptions:

a) Share with your explicit consent;

b) Under the provisions of laws and regulations, or in accordance with the strength of the competent department of government,You're required to share it with the outside world.personal information;

c) Share with our affiliates: Your personal information may be possiblewill share with our subsidiariesWe share only the necessary personal information and are bound by the purpose stated in this Privacy Policy.If the subsidiary wants to change the purpose of processing personal information, it will seek your authorization consent again.

d) Share with Authorized Partners: Only for this Privacy PolicyPurpose of the declaration, Bix.Certain products and/or services provided by the IABO will be provided by authorized partners.We may share some of your personal information with partners to provide better customer service and user experience.We will share your personal information only for legitimate, just, necessary, specific, and explicit purposes, and will only share the personal information necessary to provide services.Our partners are not authorized to use shared personal information for any other purpose.

to the enterprises, organizations and individuals that share personal information with us,We will sign a strict insurance policy with him.A secret agreement requiring them to handle personal information in accordance with our instructions, this Privacy Policy and any other relevant confidentiality and security measures.

3-2) Transfer

We will not transfer your personal information to any enterprise, organization or organization.Individuals, except in the following circumstances:

a) transfer with your explicit consent;

b) Conformity with the relevant agreements signed with you (including those signed online)Electronic Protocol and the corresponding Bor other legal document conventions.

3-3. Public disclosure

We will disclose your personal information only in the following circumstances:

a) with your explicit consent;

b) You have taken the initiative to disclose your personal information publicly

c) In the case of law, proceedings, litigation or competent government department, the Secretary for Financial Services and the Commissioner of Inland Revenue, the Commissioner of Inland Revenue, the Commissioner of Inland Revenue, the Commissioner of Inland Revenue, the Commissioner of Inland Revenue, Mr Donald Tsang, and the Commissioner of Inland Revenue.subject to regulatory requirements, I have to inform the Inland Revenue Department (IRD)We may disclose your personal information publicly; when we receive a request for such disclosure, we will require that legal documents, such as summonses or letters of inquiry, be produced.

4. How do we protect your personal information

We have adopted various types of security measures that meet the industry standard.Full technology and protection protect your personal information from unauthorized access, use, or leakage. For example, when you exchange data with Coinlook servers, we use a variety of technologies such as HTTPS, SSL, AES to ensure data security and confidentiality; we will strictly follow domestic and foreign security standards for security system construction, and combine leading-edge, mainstream security technologies to prevent users from being accessed and accessed without authorization.We have established a complete security defense system that enables us to intercept attacks on time when we are exposed to external cyber attacks and when we are infected

We've established and sound data security management systems.We will organize security and privacy protection training regularly to enhance the staff's awareness of personal information protection.However, you should understand that in the Internet industry, due to technical limitations and possible malicious practices, information leakage may occur due to factors outside our control. We will follow the example of personal information security.The law and regulations require that you be informed of the basic situation and possible effects of the safety event through the Coinlook station letter/ the contact you have reserved, etc. We have taken or will take emergency response and other related measures, your remedial measures, etc.If it is difficult to inform the subject of personal information one by one, we will issue a public announcement in a reasonable and effective manner and will take the initiative to report to the relevant regulatory authorities on the disposition of personal information security incidents.

If you find your personal information leaking, pleaseYou immediately contact us through the contact agreed upon in this Privacy Policy so that we can take timely action.

5. How do you manage your personal information

We'll do our best to take the right technique.means to ensure that you can access, correct, supplement and delete your own registration information or other personal information provided by Coinlook when using the products and/or services provided by Coinlook.

5-1) Access your personal information

You have access to your personal information, the law.Exceptions provided for by the statute.If you want to exercise your data access rights, contact us and in principle we will reply within 15 days.Contact details are described in Part 9 of this Privacy Policy, "How to Contact Us."

5-2) Correcting or supplementing your personal information

When you find out what we're dealing with about you,You can ask us to correct or supplement human information when there is a mistake.Contact details are described in Part 9 of this Privacy Policy, "How to Contact Us."

5-3) Delete Your Personal Information

You can change your authorization by contacting us.The range of your personal information that we collect and use, and cancel the account, cancel our full authorization to collect and use your personal information."After you have cancelled your account, we have made a written agreement with you, except as otherwise provided by law and regulations, or as otherwise agreed in writing."will stop using and delete your personalinformation.

You may refer to us in the following cases:To issue a request to delete your personal information:

a) We handle your personal informationact in violation of the law and regulations or of an agreement with you;

b) Our collection of your personal informationthe collection and use of the collection and use of the materials, which have not been expressly agreed with you;

c) We terminate our offer to you or your Lord.or services provided by Coinlook.

You may pass this Privacy Policy No. 9 at any time.Some of the contacts in "How to Contact Us" are contacted with us and we will, in principle, reply to your request within 15 days.

After you delete your personal information, weIt may not immediately delete the corresponding information from the backup system, but this information will be deleted during the backup update.We will delete your personal information when you cancel your account, but have been used to process information anonymously for user portraits or under the lawexcept where the statute may not be deleted.

We process or delete your personal name anonymously.In information, if your personal information has been shared, we will also inform the relevant business, organization, or individual concerned to make anonymous or delete your personal information.

5-4) Change the scope of your delegation's consent

You can change the photos in your mobile phone deviceAccess permissions such as computer, location, etc. change browser function settings, change settings options.If you are not willing to accept the push message we sent you, you may contact us through the link in

Part 9 of this Privacy Policy.We will, in principle,Reply to your request within fifteen days.

5-5) Cancellation of Account Number

You can cancel your account at any time by contacting us.Or contact us to cancel your previously registered account. See "How to Contact Us" in Part 9 of this Privacy Policy. We will, in principle, respond to your request within 15 days and Coinlook will cease to be a non-resident after cancellation.You offer products and/or services, IWe will delete your personal information according to your request, except as otherwise provided in the law and regulations.

5-6) Obtain a copy of your personal information

You have the right to pass through Part 9 of this Privacy PolicyContact us as listed in "How to Contact Us" for copies of your personal information, such as your basic personal data, your personal identity information, etc.

5-7) Constraints information system automatic decision making

In some of our business functions, we may be onlyDecisions are made based on non-artificial automatic decision-making mechanisms such as information systems and algorithms.If these decisions significantly affect your legitimate rights and interests, you have the

right to ask us for an explanation and we will also provide appropriate relief.

5-8) Responding to your above request

In order to ensure safety,the above requirements are put forward.We may request to verify your identity before processing your request.Normally, we will reply to your request within fifteen days.We do not charge you in principle for your reasonable request,but please repeat it several times beyond the reasonable limit.Please, we'll charge you a certain percentage.This cost. Requires too many technical means (e.g., development of new systems or fundamental changes to existing practices), risks to others' legitimate rights and interests, or very unrealistic requests (e.g. involving information stored on backup tapes)we may refuse.

We will not be able to respond in the following cases:Your request:

a) Performance with us in accordance with the provisions of the laws and regulationsrelated to the obligations of the employer;

b) Straightening with National Security and National Securityassociated;

c) with public safety, public health,directly related to major public interests;

d) To investigate, prosecute, or try a crimedirectly related to the execution of a judgment, etc.

e) We have sufficient evidence that userssubjectively malicious or abusing one's rights;

f) for the purpose of maintaining users or other individualssuch as life and property, but it is difficult to obtain the consent of the person;

g) Responding to a user's request will result in usein cases where the legitimate rights and interests of the household or other individuals or organizations are seriously impaired;

h) involving trade secrets.

6. How do we handle children's personal information

without the consent of parents or other guardians,Children are not allowed to create their own user accounts.In the case of collecting personal information of children with the consent of parents or other guardians, we will only use or disclose it publicly if it is legally permitted, and where it is necessary for parents or other guardians to expressly agree with or protect children.

Although local laws and customs do not define children,However, we consider anyone under the age of 14 as a child.

If we find ourselves unproven,If the child's personal information is collected with the consent of the actual parent or other guardian, the child will be deleted as soon as possible.If the parent or other guardian expressly disagrees with the child's user account creation behaviour, he or she may contact us through the contacts specified in Part 9 of this Privacy Policy, and what is necessary to protect the child.In his case, we will suspend or restrict the use of Coinlook products and/or services by children.

7. Storage of your personal information

within the territory of the People's Republic of ChinaThe personal information of the user will be stored within the territory of the People's Republic of China.

Because we've passed all over the world.Resources and servers provide Coinlook products and/or services, which means that, in the event of obtaining your authorization,Your personal information may be transferred to overseas jurisdictions where you use Coinlook

products and/or services, or be visited from these jurisdictions, after a safety assessment of your data's cross-border activities.

This type of jurisdiction may be differentdata protection laws, even without relevant laws.In such cases, we will ensure that your personal information is available.Equal protection is sufficient within the territory of the People's Republic of China.For example, we will ask for your consent to transfer your personal information across borders, or for security measures such as data de-recognition before cross-border data transfers.

8. How this Privacy Policy Update

We may revise our privacy from time to time.Policies, without your explicit consent, will not reduce your rights under this Privacy Policy; we will also inform you in more significant ways such as cell phone client push notifications, pop-up windows, mail, etc., so that you can understand the changes in this Privacy Policy in time.Significant changes refer to major changes in Coinlook's service model and important adjustments to your rights and obligations in this Agreement.The changed version of privacy policy will be published on Coinlook.

Please note that we may not have joined you.Intended to make necessary corrections to paragraphs and errors in this Privacy Policy; we will archive various versions of the Privacy Policy for you to compare them when necessary.

9. How to Contact Us

The company has special regulations.Department monitors personal information protection. Questions relating to this privacy policy or our privacy measures can be contacted by:

9-1) If you have any personal information about thisContact us if you have any questions, comments, or suggestions regarding the policy or your personal information.

Personal Information Protection OfficerMailboxes: [email protected] ;

9-2) Generally speaking,We will reply within fifteen days.If you are not satisfied with our response, especially if our personal information processing has compromised your legitimate rights and interests, you can also access the Internet.Complaints or reports are made by the regulatory authorities such as letters, telecommunications, public security and industrial and commercial sectors.

10. Supplementary Provisions

We may work with different third-party partners, including but not limited to promoting third-party products and/or services, and we cannot exhaust this third-party category here; however, it requires your special attention that the relevant provisions of this Privacy Policy apply only to products and/or services provided by Coinlook and do not apply to products and/or services directed by third-party links provided through Coinlook.In this case, it is recommended that you read and understand third-party privacy policies carefully.

The full terms of this Privacy Policy fall under one of the important components of the Coinlook Service Agreement and any dispute arising from this Privacy Policy will be referred to the competent people's court at the site of Coinlook for settlement.