Fox.One Privacy Policy

Overview

FoxOne regards protecting user privacy as a basic policy. We may collect and use your information when you use our products or services. This Privacy Policy will explain how we collect, use, store, share and transfer this information. This policy also applies to products or services that use our affiliates, partners/institutions.

This policy will help you understand the following:

  • I. How do we collect and use your personal information.
  • II. How do we use similar technologies such as cookies and Beacon.
  • III. How do we share,transfer,disclose publicly your personal information.
  • IV. How do we store and protect personal infomation.
  • V. How do you manage your personal infomation.
  • VI. Application and revision of this policy
  • VII. Protection the infomation of minors
  • VIII. Terminology

This Privacy Policy is closely related to your use of the services we provide and the various features included in the Service (hereinafter referred to as our products and / or services).Please read carefully before using our products and / or services.Completely understand the full content of this Privacy Policy and make the choices you deem appropriate.The relevant terms that may be covered by this Privacy Policy, we will try to use an easy-to-understand expression so that you can better understand. In particular, please pay attention to the content/terms marked in bold or underlined in the text. These contents/terms have a significant relationship with your rights. By using or continuing to use our products and/or services after we update this Privacy Policy, you agree to the content of this Privacy Policy and agree to the collection, use, storage and sharing of your information in accordance with this Privacy Policy.

I. How do we collect and use your personal information

(I) From your active authorization

In some scenarios, you may be able to provide us with personal information to obtain a more complete functional experience, and we will provide an entry point for information submission in the corresponding function.If you do not provide this information, you can still use our related services, but some additional features may not be available. E.g:

  1. Personalization based on location information. We will collect your geographical location information to determine your location, and automatically provide you with network environment optimization, friend recommendation, regional ranking and other services.
  2. Additional features based on address book information. Some of our features may suggest or require you to provide your contacts for social relationship services such as friend matching.
  3. As well as some of our other applications or web pages that display additional features that allow you to license and collect personal information.

These features may require you to turn on access to our app on your device. (If your device/operating system supports it) You can decide whether to turn the above functions on or off at any time. Please note that once you have opened the relevant permissions or submitted the information, you are deemed to have authorized us to collect and use the above information. If you turn off the relevant rights, you will cancel these authorizations and we will no longer continue to collect and use your personal information. Your decision to close the permissions does not affect the processing of personal information previously performed based on your authorization.

(II) Required for the products and/or services we provide to you

When you use our products and / or services, you should be aware of the function of the product or service, improve the functionality of the product or service, and ensure the safety and compliance of the product or service. We may collect, store and use the following information about you to implement the above functions. If you do not provide relevant information, you will not be able to enjoy our products and / or services. These features mainly include:

  1. User registration: You need to register as our user before using most of the products and / or services we provide. When you register as our user, you need to at least provide us with your nickname, password, your own mobile number or your email address. We will verify your identity by sending SMS verification code or email verification.
  2. Information Retrieval: In order to quickly retrieve some information, such as market information, article information, etc., we may collect the query keywords and personal device information you enter to optimize the service experience we provide to you.
  3. Purchase Payment: We may record your information when you use the services provided by us or our affiliates, partners/institutions. We will apply this information to analyze your usage status and provide an optimized reference for you or for our services.
  4. After-sales service: Our customer service staff will contact you through the mobile phone number or other communication method reserved by your account.
  5. Service Improvements: We may collect your personal information for data analysis to provide you with a personalized service or to make future improvements and adjustments to our services.
  6. Safeguarding: In order to improve the security of your system when using our products and / or services, to more accurately prevent phishing scams and protect account security, we may know your browsing information, order information, and your commonly used software information. , device information, user behavior information and other means to determine your account risk, and may record some technically abnormal link address; we will also collect your device information for problem analysis, statistical traffic and troubleshooting possible risk.

(III) Collect and use information without the need for your consent

You fully understand that we do not require your authorization and consent to collect and use personal information in the following situations:

  1. Related to national security and national defense security;
  2. Related to public safety, public health, and major public interests;
  3. Related to criminal investigation, prosecution and trial;
  4. There is sufficient evidence to prove that you have subjective malice or abuse of rights;
  5. Responding to your request will result in serious damage to the legitimate rights and interests of other individuals and organizations;
  6. The information subject actively disclosed to the public;
  7. At the request of the State’s competent authority;
  8. It is difficult to obtain the consent of the person who defends the personal rights and interests of the subject of personal information or other individuals’ lives and property;
  9. Required to maintain the safe and stable operation of the products and/or services provided;
  10. Other circumstances as stipulated by laws and regulations.

(IV)Personal information from third parties

We may obtain personal information that you authorize to share from third parties.(For example, from a third-party login, bring your avatar, third-party login account, nickname, etc.)And bind this information to your account after you agree to this policy. We will use your personal information in accordance with the relevant laws and regulations after confirming the legality of the source of personal information in accordance with the agreement with the third party.

(V)Anonymization of personal information

After collecting your personal information, we will anonymize the data through technical means, and the anonymized information will not identify the subject.Please understand and agree that in this case we have the right to use information that has been anonymized,and without prejudice your personal information, we have the right to analyze and commercialize the user database.

II. How do we use similar technologies such as cookies and Beacon.

When you use our products and/or services, we may identify you by means of a data file that is unique to one or more data files that can only be read and used by our servers. These data files may be cookies/Flash cookies or other similar technologies. The purpose of sending such data files to you is to simplify your login process, store your preferences, help determine your login status, and protect your account, data security, and more.

You can manage or delete such data files yourself based on your preferences or settings for your browser or operating system. For example, you can clear cookies stored on your computer, or you can set your browser to refuse cookies. Once you have implemented this “cleanup” operation, in some cases you may be repeatedly asked to verify your identity or affect your secure access to our products and/or services.

In addition, our products and / or services may also contain some special electronic images (called Beacon). We will collect information about your activities on our website through Beacon, such as the address of the page you visit, some basic parameters of your browser, and so on.

III. How do we share,transfer,disclose publicly your personal information.

We are committed to keeping your personal information confidential. Except for the scenarios stipulated in this policy or other contracts with you, we only share the necessary information with third parties in the following situations:

  1. Provide you with our products and / or services;
  2. Have obtained your explicit consent or authorization;
  3. When required by state agencies, authorized departments, or administrative or judicial requirements;
  4. When you deal with a dispute or dispute with others at your request;
  5. Achieve the purpose described in the ‘How do we use your personal information’ section;
  6. If you participate in a sweepstakes, contest or similar marketing operations, we will use the information you provide to manage such events. If the event is co-organized with a third party, we may share personal information that is necessary to complete the event, such as the list of winning users, the contact information of the winning users, etc., so that the third party can award you a prize or provide product service;
  7. In order to comply with laws, regulations and industry practices, we may provide your information to relevant entities when we plan to engage in mergers with other companies or other capital market activities, and in other scenarios where we need to accept due diligence from other entities;
  8. In the use of our products and / or services, if you and our other users generate transactions based on our products and / or services, in order to maintain transaction security or confirm transactions, you and your counterparty may be in the transaction process In the middle of the transaction or after the transaction is completed, you can see some information of the other party or some information after desensitization;
  9. When you actively contract with our other users, institutions or partners through our products and / or services, we will provide you with the necessary personal information (such as real name, ID number, contact information, etc.) for the purpose of entering into the contract. All associated personnel;
  10. To the extent permitted by laws and regulations, it is necessary to provide for the protection of FoxOne, FoxOne affiliates or partners, you and other FoxOne users or the public interest, property or security from loss.

IV. How do we store and protect personal messages

(I)Personal information collected and generated by us within the territory of the People’s Republic of China will be stored in the territory of the People’s Republic of China unless otherwise agreed or otherwise provided by law. Personal information collected and generated outside the People’s Republic of China will be stored in accordance with the laws, regulations, international rules or international practices recognized by the People’s Republic of China.

(II)We promise you that we will use the following measures to achieve a reasonable level of information security protection:

  1. Technical measures: We will adopt security measures that comply with industry standards, including encryption technologies such as transport layer security protocols for network services to ensure the security of user data during transmission, and to isolate stored data through isolation technology. In some scenarios where you use your personal information (such as personal information display, personal information confirmation, etc.), we will use a variety of data desensitization techniques including content replacement, one-way hashing, etc. to enhance your personal information in use. safety. We also use strict access control, multi-factor authentication and other technologies to protect your personal information, to avoid data being violated. We have established system specifications such as information security systems, data grading management practices, and security/development specifications to manage the storage, access, and use of your personal information.We have signed confidentiality agreements with our contacts and applied access logs, behavior monitoring and specialized audit measures to fully control the data. In the training of employees’ safety awareness, we regularly hold safety and privacy-related preaching trainings and exams. We also only allow employees, partners, and personal information from FoxOne and FoxOne affiliates who need to be aware of this information to apply and apply all of the technical measures and regulatory limitations mentioned above. We require relevant personnel to perform relevant confidentiality obligations. If these obligations are not fulfilled, they may be dismissed or suspended from our partnership until they are held liable.
  2. Access specification: We will adopt security measures that comply with industry standards, including encryption technologies such as transport layer security protocols for network services, to ensure the security of user data during transmission, and to isolate stored data through isolation technology. In some scenarios where you use your personal information (such as personal information display, personal information confirmation, etc.), we will use a variety of data desensitization techniques including content replacement, one-way hashing, etc. to enhance your personal information in use. safety. We also use strict access control, multi-factor authentication and other technologies to protect your personal information, to avoid data being violated. We have established system specifications such as information security systems, data grading management practices, and security/development specifications to manage the storage, access, and use of your personal information.We have signed confidentiality agreements with our contacts and applied access logs, behavior monitoring and specialized audit measures to fully control the data. In the training of employees’ safety awareness, we regularly hold safety and privacy-related preaching trainings and exams. We also only allow employees, partners, and personal information from FoxOne and FoxOne affiliates who need to be aware of this information to apply and apply all of the technical measures and regulatory limitations mentioned above. We require relevant personnel to perform relevant confidentiality obligations. If these obligations are not fulfilled, they may be dismissed or suspended from our partnership until they are held liable.
  3. Other protection methods: We will adopt security measures that comply with industry standards, including encryption technologies such as transport layer security protocols for network services, to ensure the security of user data during transmission, and to isolate stored data through isolation technology. In some scenarios where you use your personal information (such as personal information display, personal information confirmation, etc.), we will use a variety of data desensitization techniques including content replacement, one-way hashing, etc. to enhance your personal information in use. safety. We also use strict access control, multi-factor authentication and other technologies to protect your personal information, to avoid data being violated. We have established system specifications such as information security systems, data grading management practices, and security/development specifications to manage the storage, access, and use of your personal information. We have signed confidentiality agreements with our contacts and applied access logs, behavior monitoring and specialized audit measures to fully control the data. In the training of employees’ safety awareness, we regularly hold safety and privacy-related preaching trainings and exams.We also only allow employees, partners, and personal information from FoxOne and FoxOne affiliates who need to be aware of this information to apply and apply all of the technical measures and regulatory limitations mentioned above. We require relevant personnel to perform relevant confidentiality obligations. If these obligations are not fulfilled, they may be dismissed or suspended from our partnership until they are held liable.

(III)The Internet environment is not an absolutely secure environment. You can’t determine whether you have been properly protected by communicating with other users through various communication methods. We recommend that you use personal communication tools to protect your personal information, not to disclose personal information or private information about your account, and to enable complex passwords on related tools.

(IV)Please understand that due to technical limitations and possible malicious means, there may be problems due to factors beyond our control. In accordance with the requirements of laws and regulations, after the unfortunate incident of personal information security, we will promptly inform you: the basic situation and possible impact of the security incident; the disposal measures we have taken or will take; the advice you can take to prevent and reduce risks ; remedies for you, etc. Our colleagues will promptly inform you about the incident by email, letter, phone call, push notification, and on-site news. If it is difficult to inform the personal information subject one by one, we will issue a notice in a reasonable and effective manner, and in accordance with the requirements of the regulatory authorities, proactively report the disposal status of personal information security incidents.

V. How do you manage your personal information

(I) We will endeavour to protect your right to access, update, and correct your personal information, and you have the right to exercise this right at any time, except as required by laws and regulations.

(II)You can ask us to delete your personal information when any of the following conditions occur:

  1. If we deal with personal information in violation of laws and regulations;
  2. If we deal with personal information in violation of your agreement;
  3. If we terminate the service and operation.

(III) In some scenarios, you may actively authorize or revoke authorization to obtain your personal information through the device or operating system settings. Please understand that when you withdraw your authorization or do not authorize us to obtain this part of your personal information, we are unable to continue to provide you with the necessary services for this part of the information. However, your decision to withdraw the authorization will not affect the personal information processing that was previously performed based on your authorization.

(IV)We were unable to respond to your request in the following situations:

  1. Related to national security and national defense security;
  2. Related to national security and national defense security related to public safety, public health, and major public interests;
  3. Related to criminal investigation, prosecution and trial;
  4. There is sufficient evidence to prove that you have subjective malice or abuse of rights;
  5. Responding to your request will result in serious damage to the legitimate rights and interests of other individuals and organizations;
  6. At the request of the State’s competent authority;
  7. Other circumstances as stipulated by laws and regulations.

VI. Application and revision of this policy

This Privacy Policy is the privacy policy uniformly used by FoxOne and is applicable to all FoxOne products and/or services. Other products and/or services in the FoxOne section may have specific product and/or service-specific privacy policies, and these specific privacy policies will more specifically describe how we use your information and the specific privacy Policy is an integral part of this policy; if there are inconsistencies between the specific privacy policies of these products and/or services and this policy, the privacy policy of that particular product and/or service will prevail.

As the FoxOne business evolves, our products and/or services may be upgraded and adjusted. We may revise this policy as appropriate in the light of changes in functionality, changes in usage rules, changes in applicable laws and regulations, or changes in regulatory requirements.

Once we have revised this policy, we will remind you of the updated content through our products and / or services, and please pay attention to us to keep up to date with the latest privacy policy. If you continue to use our products and/or services after the revision of this policy, you have read, understood and accepted the revised Privacy Policy and are willing to accept the revised policy, otherwise you will not be able to continue using our Products and / or services.

VII. Protection the information of minors

We attach great importance to the protection of personal information of minors. If you are a minor under the age of 18, you should ask your parent or guardian to read this policy. You should stop using our products and/or services until you have your parents or guardians expressly or in writing agree to the content of this Privacy Policy. If your parent or guardian does not agree to your use of our products and / or services or provide information to us in accordance with this policy, please immediately terminate the use of our products and / or services, and notify us in time so that we can take appropriate measures .

VIII. Terminology

The personal information referred to in this policy mainly includes:

  1. Basic personal information (including personal name, birthday, gender, address, phone number, email address);
  2. Personally identifiable information (ID card and other valid ID information);
  3. Network identity information (including system account number, IP address, email address, related passwords, passwords, password information, etc.);
  4. Personal property information (transaction records, consumption records, digital asset account information, etc.);
  5. Personal online records (web browsing history, software usage records, click records, etc.);
  6. Personal device information (including hardware model, device hardware parameters, operating system type and basic information, software unique device identification code, SIM card information, etc.);
  7. Personal location information (including location information, sports records, etc.).

The anonymization of information referred to in this policy refers to the process of making personal information subject unrecognizable and the processed information cannot be restored through technical processing of personal information.