PandoraTech Privacy Policy
This Privacy Policy (hereinafter referred to as "the
Policy") applies to all users of the PandoraTech Blockchain
Information Providing Platform (hereinafter referred to as
"the Platform"). We value your privacy and are committed
to protecting your personal information. Please read this Policy
carefully to understand how we collect, use, store, and protect
your personal information.
Article 1: Information Collection
-
Basic Information: Includes, but is not limited to,
name, personal telephone number, mobile number, date of birth,
gender, email address, residential/personal location
information, IP address, etc.
-
Personal Device Information: Includes hardware model,
device MAC address, operating system type, software list, unique
device identifiers such as IMEI/android ID/IDFA/OPENUDID/GUID,
SIM card IMSI information, etc., describing the basic situation
of personal frequently used devices.
-
Non-Personal Information: We may also collect your
non-personal information, such as your browser type, access
time, and pages visited.
-
Information Usage: We follow our privacy policy to
collect and use your information, but we will not collect
personal information in a bundled manner just because you have
agreed to this Privacy Policy.
-
Device Permissions: We may access certain device
permissions, which are not enabled by default and will only be
used when explicitly authorized by you to implement specific
functions or services. You may also withdraw authorization by
disabling the corresponding business features. Below are the
details regarding the access to your device:
-
Access to albums, storage, reading, and phone status
permissions, especially noting that even with your explicit
authorization, we will not collect your information when you
are not using the related functions or services.
-
Third-Party SDKs and Related Information Gathering
-
Third-Party: Umeng SDK
-
Purpose of Cooperation: APP data statistical
analysis based on deep linking technology to help APP
improve user acquisition conversion and APP performance
monitoring
-
Information Collected:
Device information (IMEI/MAC/Android
ID/OAID/IDFA/OpenUDID/GUID/ IP address/ICCID/SIM card IMSI
information), network information, location information
-
Privacy Policy:
https://www.umeng.com/page/policy
-
Third-Party: URORA SDK
-
Purpose of Cooperation: Push messages to users
-
Information Collected:
Device identifier (including Android ID, GAID, OAID,
UAID, IDFA, AAID): used to generate a desensitized unique
identifier of the end-user device to ensure accurate
message push; device hardware information (including
device model, device screen Resolution, device hardware
manufacturer, device product name, device storage space),
operating system information (including operating system
version, system name, system language): used to ensure the
compatibility of services on different devices and ensure
accurate delivery of messages ; Network information
(including network type, operator information, IP address,
WIFI status information): used to determine the network
connection status between the SDK and the server to ensure
the stability and continuity of the service; Push
information log: used to query push service records , to
understand the delivery status of push information.
-
Privacy Policy:
https://www.jiguang.cn/license/privacy
Article 2: Use of Information
-
Registration and Login: When you register and log into
the PandoraTech and accept related services, you can create an
account via mobile number/email and you can complete related
online identity information (avatar, nickname, password, etc.).
We will collect at least your account nickname, mobile
number/email, and password to help you complete the
registration.
-
Information Browsing: We might recommend information
that you might find more interesting. To achieve this, we may
collect necessary log information.
-
Log information used for information display includes:
-
Your actions and usage behavior: clicks, follows,
favorites, searches, browsing, sharing
-
Information you provide: feedback, posts, likes,
comments
-
Geographic location information: GPS data, WLAN access
points, Bluetooth, and cellular base stations, and other
sensor information
-
The above information is collected and used in a
de-identified manner; data analysis corresponds only to
specific codes that cannot directly link to your identity
and are not associated with your real identity.
-
Search: When you use PandoraTech's search services,
we collect your search keywords and log records. To provide
efficient search services, some of the aforementioned
information may temporarily be stored on your local storage
devices and can show you search result content and search
history.
-
Data Analysis: We use non-personal information for data
analysis to improve our services and user experience.
-
Legal Compliance: We will use your personal information
when required or permitted by law.
Article 3: Information Sharing
-
Third-Party Service Providers: We may share your
personal information with third parties that provide data
processing, payment processing, customer support, and other
services. These third parties can only process your personal
information according to our instructions and must comply with
this Policy and applicable privacy laws.
-
Legal Requirements: Under legal requirements or when
permitted, we may disclose your personal information, such as in
response to legal proceedings or government requests.
-
Business Transfers: In the event of a company
reorganization, merger, or sale of all or a portion of our
assets, your personal information may be transferred.
Article 4: Information Security
-
Security Measures: We place great importance on the
security of your personal information and strive to take
reasonable security measures (both technical and managerial) to
protect your personal information from being improperly used or
accessed without authorization, publicly disclosed, used,
altered, damaged, lost, or leaked.
-
We use encryption technologies that comply with legal
standards, anonymization, and other reasonably feasible
means to protect your personal information and security
mechanisms to prevent malicious attacks on your personal
information.
-
We have established a specialized security department,
security management systems, and data security processes to
ensure the security of your personal information. We enforce
strict data use and access regimes to ensure that only
authorized personnel have access to your personal
information, and we conduct security audits of data and
technology as needed.
-
Despite the reasonable and effective measures taken and
compliance with the standards required by relevant legal
regulations, please understand that due to technological
limitations and potential malicious means in the internet
industry, it is not always possible to guarantee 100%
security of information. We will do our utmost to ensure the
security of the personal information you provide to
us.
-
You acknowledge and understand that the systems and
communication networks used to access our services may
encounter issues beyond our control. Therefore, we strongly
recommend that you take proactive measures to protect the
security of your personal information, including but not
limited to using complex passwords, regularly changing
passwords, and not disclosing your account passwords and
related personal information to others.
-
We have established emergency response plans and will
immediately initiate these plans in the event of a security
incident involving user information, striving to prevent the
impact and consequences of such security events from
expanding. Should a security incident involving personal
information occur (such as a leak or loss), we will report
to the relevant authorities as required by law and
regulations, conduct an immediate investigation, and take
emergency measures. We will also inform you of the basic
situation and potential impact of the security event, the
measures we have taken or will take, suggestions for you to
independently prevent and reduce risks, and remedies
available to you. We will promptly notify you of the event
details through push notifications, emails, letters, SMS,
and other relevant forms. If individual notifications are
challenging, we will take reasonable and effective measures
to make announcements. Additionally, we will report the
handling of user information security events to the relevant
regulatory authorities as required.
-
Data Storage: Your personal information will be stored
on secure servers, and we will retain your personal information
for the period mandated by law.
-
Storage Duration: We will retain your personal
information only as long as necessary to provide PandoraTech and
its services. The retention period is strictly in accordance
with legal and regulatory requirements, with a minimum period of
no less than 6 months. Information you post, comments, likes,
and related information will be retained as long as you do not
withdraw, delete, or cancel your account. Beyond the necessary
period, we will delete or anonymize your personal information,
except as otherwise provided by law.
Article 5: User Rights
-
Access and Update: You have the right to access and
update your personal information. You can modify your personal
information by logging into your account or contacting us.
-
Deletion: You have the right to request the deletion of
your personal information unless the law requires us to retain
this information.
-
Withdrawal of Consent: You can withdraw your consent for
us to collect and process your personal information at any time,
but this will not affect the processing that took place before
the withdrawal.
Article 6: Cookies and Similar Technologies
-
Cookies: We use cookies and similar technologies to
collect non-personal information to improve the quality of our
services and user experience.
-
Managing Cookies: You can manage or delete cookies
through your browser settings, but this may affect your
experience using the platform.
Article 7: Child Privacy
-
The Platform is not intended for children under the age of 18.
If we discover that we have collected personal information from
a child under 18, we will take steps to delete this information
promptly.
Article 8: Changes to the Privacy Policy
-
We may update this Policy from time to time. The updated policy
will be posted on the platform and will indicate the date of the
update. Please regularly review this Policy to understand how we
protect your personal information.
Article 9: Contact Us
-
If you have any questions or suggestions about this Policy or
our privacy protection measures, please contact us via the
following means:
Special Note: This privacy policy applies when you access
and use our products and services through the PandoraTech
application or PandoraTech webpage.