version 1.0
update date: 2023/04/06
update date: 2023/05/06
Temiao and related services are provided and operated by Huai'an JuGuang Network Technology Co., Ltd. (in China) (hereinafter referred to as "we"). We provide the Temiao (temiao.com) website, and may also provide APP, mini program and client products in the future to serve the community better.
As an operator, we are well aware of the importance of personal information to you, your trust is very important to us, and we will protect your personal information and privacy security in accordance with laws and regulations and with reference to industry best practices.
Please read and fully understand this Privacy Policy carefully before using this platform. The important parts have been highlighted in bold.
If you have any questions about this Privacy Policy, you can contact us at the contact information provided in the "How to Contact Us" section of this description. We may revise the Guidelines from time to time. When this Privacy Policy is substantially changed, we will show you the changed content in the form of push notifications, pop-up windows, system notifications, or private messages on the site after the version is updated.
We will follow the principles of legitimacy, legality and necessity to collect and use personal information that you voluntarily provide during the use of services or generated by the use of products and/or services for the following purposes described in this Privacy Policy. If we want to use your personal information for other purposes not specified in this note, or use the collected information for other purposes, we will inform you in a reasonable way and obtain your consent again.
We will collect and use your personal information in the following scenarios:
The information collected during registration and login is to help you complete registration and protect the security of your account.
We may recommend information of interest to you, and in order to achieve this function, we may collect browsing usage records, device information (device model, MAC address, operating system, network environment, device location information, device network operator, device ID, IMEI, IMSI), IP address, OAID, log information, location information.
The information publish of this product/service is to disseminate knowledge to the public, please be aware of its openness, so that only the information that can be made public should be typed in. In order to serve other users better, we may modify and optimize the content you post, and may remove content that violates the law.
When using on-site search, we may collect your search keyword information and log records to improve functions and content.
In order to understand user needs and improve user experience, we may invite you to participate in questionnaires or product evaluations in order to provide you with better services, and we may collect personal information contained in your feedback content in questionnaires or evaluations according to the actual situation. Since the content of each questionnaire or assessment is different, we will obtain your authorization and consent again before launching the questionnaire or product evaluations to you.
In order to ensure the stability and security of the service, we may collect your hardware model, operating system version number, device name, device configuration, International Mobile Equipment Identity, unique device identifier, network device hardware address, IP address, WLAN access point, IMSI, Bluetooth, base station, software version number, network access method, type, status, network quality data, operation, usage, service logs. We may collect your information described above while running in the background, or we may associate your device information or phone number with your account for identity verification, security prevention, fraud detection, preventing or suppressing illegal activities, risk reduction, archiving and backup purposes.
Please understand that with the development of our business, the functions and services provided by the website and application may be adjusted and changed. In principle, when a new function or service is related to the function or service we currently provide, the personal information collected and used will be directly or reasonably related to the original processing purpose. In scenarios that are not directly or reasonably related to the original processing purpose, we will collect and use your personal information, and will inform you again in accordance with the requirements of laws, regulations and national standards through page prompts, interactive processes, and agreement confirmation, and obtain your consent.
Please understand that in the following circumstances, in accordance with laws and regulations and relevant national standards, we do not need to obtain your authorization and consent in advance to collect and use your personal information:
As our business continues to develop, we may conduct mergers, acquisitions, asset transfers, and your personal information may be transferred as a result. In the event of the aforementioned changes, we will require the successor to continue to perform the obligations of the personal information processor in accordance with laws and regulations and security standards not less than those contained in this Privacy Policy, and if the successor changes the original processing purpose and processing method, we will require the successor to obtain your authorization and consent again.
We will store the user's personal information obtained from the territory of the People's Republic of China in the territory of the People's Republic of China and retain your personal information for the shortest period necessary for the purposes described in this guideline. After the retention period expires, we will delete or anonymize your personal information, unless otherwise required by national laws, regulations, normative documents or government policies, orders, etc., or need to retain your personal information to fulfill our compliance obligations. For example, the E-Commerce Law of the People's Republic of China requires that the retention period of goods and services information and transaction information should not be less than three years from the date of completion of the transaction; The Cybersecurity Law of the People's Republic of China requires the adoption of technical measures to monitor and record network operation status and network security incidents, and to retain relevant network logs for at least six months in accordance with regulations.
We attach great importance to the security of your personal information and will strive to take reasonable security measures (including technical and administrative aspects) to protect your personal information and prevent the personal information you provide from being misused or accessed, publicly disclosed, used, modified, damaged, lost or leaked without authorization.
We will use encryption technology, anonymization processing and related reasonable and feasible means to protect your personal information no less than that of industry peers, and use security protection mechanisms to prevent your personal information from being maliciously attacked.
We will establish a special security department, security management system, and data security process to ensure the security of your personal information. We adopt strict data use and access policies to ensure that only authorized personnel can access your personal information, and conduct timely security audits of data and technology.
Although the above reasonable and effective measures have been taken and the standards required by relevant laws and regulations have been complied with, please understand that due to technical limitations and various malicious means that may exist, in the Internet industry, even if we do our best to strengthen security measures, it is impossible to always guarantee 100% security of information, and we will try our best to ensure the security of personal information you provide to us.
You know and understand that the system and communication network you use to access our services may have problems due to factors beyond our control. Therefore, we strongly recommend that you take active measures to protect the security of personal information, including but not limited to using complex passwords, changing passwords regularly, and not disclosing your account password and related personal information to others.
We will formulate emergency response plans and immediately activate emergency plans when user information security incidents occur, and strive to prevent the impact and consequences of these security incidents from expanding. Once a user information security incident (leakage or loss) occurs, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, suggestions for you to prevent and reduce risks independently, and remedial measures for you. We will promptly inform you of the relevant circumstances of the incident in push notifications, emails, letters, SMS and related forms, and when it is difficult to inform you one by one, we will issue an announcement in a reasonable and effective manner. At the same time, we will also report the handling of user information security incidents in accordance with the requirements of relevant regulatory authorities.
We attach great importance to your management of personal information, and do our best to protect your rights to access, copy, correct, supplement, delete, withdraw consent and authorization, cancel your account, complain and report, and set privacy functions, so that you have the ability to protect your privacy and information security.
Cookies and similar technologies are commonly used on the Internet. When you use this website and related services, we may use relevant technologies to send one or more cookies or anonymous identifiers to your device to collect and store information when you access and use this product. We promise not to use cookies for any purpose other than those described in this Privacy Policy. We use cookies and similar technologies primarily to enable the following functions or services:
We may set authentication and security cookies or anonymous identifiers that allow us to confirm that you are securely logged into the Services or that you have experienced theft, fraud, and other illegal activities. These technologies also help us improve service efficiency, login and responsiveness.
Using such technologies can help you eliminate the need to repeat steps and processes (e.g. record search, form filling) when you fill in personal information and enter your search.
Most browsers provide users with the ability to clear browser cache data, and you can do the corresponding data clearing operation in the browser settings function. If you do so, you may not be able to use the services or corresponding functions provided by the Company relying on cookies because of these modifications.
If you have any questions, comments or suggestions about the content of this Privacy Policy, you can contact us through the email address on the homepage of the website.