PandoraTech Privacy Policy

This Privacy Policy (hereinafter referred to as "the Policy") applies to all users of the PandoraTech Blockchain Information Providing Platform (hereinafter referred to as "the Platform"). We value your privacy and are committed to protecting your personal information. Please read this Policy carefully to understand how we collect, use, store, and protect your personal information.

Article 1: Information Collection

  1. Basic Information: Includes, but is not limited to, name, personal telephone number, mobile number, date of birth, gender, email address, residential/personal location information, IP address, etc.
  2. Personal Device Information: Includes hardware model, device MAC address, operating system type, software list, unique device identifiers such as IMEI/android ID/IDFA/OPENUDID/GUID, SIM card IMSI information, etc., describing the basic situation of personal frequently used devices.
  3. Non-Personal Information: We may also collect your non-personal information, such as your browser type, access time, and pages visited.
  4. Information Usage: We follow our privacy policy to collect and use your information, but we will not collect personal information in a bundled manner just because you have agreed to this Privacy Policy.
  5. Device Permissions: We may access certain device permissions, which are not enabled by default and will only be used when explicitly authorized by you to implement specific functions or services. You may also withdraw authorization by disabling the corresponding business features. Below are the details regarding the access to your device:
    • Access to albums, storage, reading, and phone status permissions, especially noting that even with your explicit authorization, we will not collect your information when you are not using the related functions or services.
  6. Third-Party SDKs and Related Information Gathering
    • Third-Party: Umeng SDK
    • Purpose of Cooperation: APP data statistical analysis based on deep linking technology to help APP improve user acquisition conversion and APP performance monitoring
    • Information Collected: Device information (IMEI/MAC/Android ID/OAID/IDFA/OpenUDID/GUID/ IP address/ICCID/SIM card IMSI information), network information, location information
    • Privacy Policy: https://www.umeng.com/page/policy

    • Third-Party: URORA SDK
    • Purpose of Cooperation: Push messages to users
    • Information Collected: Device identifier (including Android ID, GAID, OAID, UAID, IDFA, AAID): used to generate a desensitized unique identifier of the end-user device to ensure accurate message push; device hardware information (including device model, device screen Resolution, device hardware manufacturer, device product name, device storage space), operating system information (including operating system version, system name, system language): used to ensure the compatibility of services on different devices and ensure accurate delivery of messages ; Network information (including network type, operator information, IP address, WIFI status information): used to determine the network connection status between the SDK and the server to ensure the stability and continuity of the service; Push information log: used to query push service records , to understand the delivery status of push information.
    • Privacy Policy: https://www.jiguang.cn/license/privacy

Article 2: Use of Information

  1. Registration and Login: When you register and log into the PandoraTech and accept related services, you can create an account via mobile number/email and you can complete related online identity information (avatar, nickname, password, etc.). We will collect at least your account nickname, mobile number/email, and password to help you complete the registration.
  2. Information Browsing: We might recommend information that you might find more interesting. To achieve this, we may collect necessary log information.
    1. Log information used for information display includes:
      • Your actions and usage behavior: clicks, follows, favorites, searches, browsing, sharing
      • Information you provide: feedback, posts, likes, comments
      • Geographic location information: GPS data, WLAN access points, Bluetooth, and cellular base stations, and other sensor information
    • The above information is collected and used in a de-identified manner; data analysis corresponds only to specific codes that cannot directly link to your identity and are not associated with your real identity.
  3. Search: When you use PandoraTech's search services, we collect your search keywords and log records. To provide efficient search services, some of the aforementioned information may temporarily be stored on your local storage devices and can show you search result content and search history.
  4. Data Analysis: We use non-personal information for data analysis to improve our services and user experience.
  5. Legal Compliance: We will use your personal information when required or permitted by law.

Article 3: Information Sharing

  1. Third-Party Service Providers: We may share your personal information with third parties that provide data processing, payment processing, customer support, and other services. These third parties can only process your personal information according to our instructions and must comply with this Policy and applicable privacy laws.
  2. Legal Requirements: Under legal requirements or when permitted, we may disclose your personal information, such as in response to legal proceedings or government requests.
  3. Business Transfers: In the event of a company reorganization, merger, or sale of all or a portion of our assets, your personal information may be transferred.

Article 4: Information Security

  1. Security Measures: We place great importance on the security of your personal information and strive to take reasonable security measures (both technical and managerial) to protect your personal information from being improperly used or accessed without authorization, publicly disclosed, used, altered, damaged, lost, or leaked.
    • We use encryption technologies that comply with legal standards, anonymization, and other reasonably feasible means to protect your personal information and security mechanisms to prevent malicious attacks on your personal information.
    • We have established a specialized security department, security management systems, and data security processes to ensure the security of your personal information. We enforce strict data use and access regimes to ensure that only authorized personnel have access to your personal information, and we conduct security audits of data and technology as needed.
    • Despite the reasonable and effective measures taken and compliance with the standards required by relevant legal regulations, please understand that due to technological limitations and potential malicious means in the internet industry, it is not always possible to guarantee 100% security of information. We will do our utmost to ensure the security of the personal information you provide to us.
    • You acknowledge and understand that the systems and communication networks used to access our services may encounter issues beyond our control. Therefore, we strongly recommend that you take proactive measures to protect the security of your personal information, including but not limited to using complex passwords, regularly changing passwords, and not disclosing your account passwords and related personal information to others.
    • We have established emergency response plans and will immediately initiate these plans in the event of a security incident involving user information, striving to prevent the impact and consequences of such security events from expanding. Should a security incident involving personal information occur (such as a leak or loss), we will report to the relevant authorities as required by law and regulations, conduct an immediate investigation, and take emergency measures. We will also inform you of the basic situation and potential impact of the security event, the measures we have taken or will take, suggestions for you to independently prevent and reduce risks, and remedies available to you. We will promptly notify you of the event details through push notifications, emails, letters, SMS, and other relevant forms. If individual notifications are challenging, we will take reasonable and effective measures to make announcements. Additionally, we will report the handling of user information security events to the relevant regulatory authorities as required.
  2. Data Storage: Your personal information will be stored on secure servers, and we will retain your personal information for the period mandated by law.
  3. Storage Duration: We will retain your personal information only as long as necessary to provide PandoraTech and its services. The retention period is strictly in accordance with legal and regulatory requirements, with a minimum period of no less than 6 months. Information you post, comments, likes, and related information will be retained as long as you do not withdraw, delete, or cancel your account. Beyond the necessary period, we will delete or anonymize your personal information, except as otherwise provided by law.

Article 5: User Rights

  1. Access and Update: You have the right to access and update your personal information. You can modify your personal information by logging into your account or contacting us.
  2. Deletion: You have the right to request the deletion of your personal information unless the law requires us to retain this information.
  3. Withdrawal of Consent: You can withdraw your consent for us to collect and process your personal information at any time, but this will not affect the processing that took place before the withdrawal.

Article 6: Cookies and Similar Technologies

  1. Cookies: We use cookies and similar technologies to collect non-personal information to improve the quality of our services and user experience.
  2. Managing Cookies: You can manage or delete cookies through your browser settings, but this may affect your experience using the platform.

Article 7: Child Privacy

  1. The Platform is not intended for children under the age of 18. If we discover that we have collected personal information from a child under 18, we will take steps to delete this information promptly.

Article 8: Changes to the Privacy Policy

  1. We may update this Policy from time to time. The updated policy will be posted on the platform and will indicate the date of the update. Please regularly review this Policy to understand how we protect your personal information.

Article 9: Contact Us

  1. If you have any questions or suggestions about this Policy or our privacy protection measures, please contact us via the following means:

Special Note: This privacy policy applies when you access and use our products and services through the PandoraTech application or PandoraTech webpage.