Privacy Policy
Last Updated: December 05, 2023
Effective Date: December 05, 2023
1. How We Collect and Use Your Information
When you use our services, we need/may need to collect and use your personal information, including the following two types:
To achieve the basic functions of providing services to you, you must authorize us to collect and use necessary information. If you refuse to provide the corresponding information, you will not be able to use our services normally;
To achieve additional functions of providing services to you, you can choose to authorize us to collect and use information. If you refuse to provide it, you may not be able to use the relevant additional functions or achieve the intended functional effects, but it will not affect your normal use of our basic functions.
The information we collect from you will be used for the following purposes:
- Conducting data statistics to understand operational conditions;
- Analyzing users' usage patterns and habits on the website to improve our services;
- Preventing illegal or potential illegal activities, and preventing violations of website user norms;
- Other purposes disclosed to you when collecting specific information.
We will provide you with specific functional scenarios, including:
(1) Account Management
When you browse the platform website (whether or not you are registered or logged in), we may automatically collect the following information related to you: your browser type and language, operating system type, and broadband type; your IP address, which can sometimes indicate your geographical location; pages, advertisements, and links you have browsed on the website; user behavior logs; and the access requests you make when visiting the website, along with their dates, times, and referral URLs.
To ensure that we are providing services to you personally, we may verify your identity based on the information you provide.
(2) Customer Service and Dispute Resolution
When you contact us or submit after-sales, dispute resolution applications, we need you to provide necessary personal information to verify your user identity for the security of your account and system.
For the convenience of contacting you, assisting you in solving problems promptly, or recording the handling solutions and results of related issues, we may save your communications, communication/call records, and related content (including account information, other information you provide to prove relevant facts, or contact information you leave). If you consult, complain, or provide suggestions regarding specific issues, we will use your account information.
For the reasonable needs of providing services and improving service quality, we may also use other information from you, including information you provide when contacting customer service and questionnaire reply information you send to us.
(3) Other Rules for Collecting and Using Personal Information
If the information you provide contains personal data of other users, before submitting such information to this platform, you must ensure that you have obtained legal authorization. Any legal consequences arising from your failure to obtain proper authorization will be your responsibility. If we use the information for purposes not specified in this privacy policy or if we intend to use the information collected for a specific purpose for any other purposes, we will seek your prior consent.
If we indirectly obtain your information from third parties, we will explicitly request the third party in writing to clarify the source of the personal information and whether they have obtained your legal authorization for collecting, processing, and providing your personal information before collecting. Except in cases expressly permitted by law, we will only collect your personal information from third parties after confirming that the third party has obtained your authorized consent. If the third party's authorization scope cannot cover our processing and use purposes, we will protect your personal information obtained indirectly by our professional security team through measures such as security reinforcement (including sensitive information reporting, sensitive information encryption storage, access control, etc.). We will use protection measures and methods for indirectly obtained personal information that are not lower than those for our own user personal information.
Exceptions to obtaining authorized consent. According to relevant laws and regulations, we may collect and use your personal information without your authorized consent in the following circumstances:
(1) Related to our fulfillment of obligations stipulated by laws and regulations;
(2) Directly related to national security and defense security;
(3) Directly related to public safety, public health, and significant public interests;
(4) Directly related to criminal investigations, prosecutions, trials, and enforcement of judgments by judicial or administrative law enforcement;
(5) Necessary for protecting the vital interests of you or other individuals such as life, property, etc., but it is difficult to obtain your consent;
(6) Personal information that you voluntarily make public;
(7) Personal information collected from legally publicized information, such as legal news reports, government information disclosure channels, etc.
(8) Necessary for the conclusion and performance of relevant agreements or other written documents with you;
(9) Necessary for the safe and stable operation of the services provided, such as discovering and handling service faults;
(10) Other circumstances stipulated by laws and regulations.
Please be aware that according to applicable laws, if we process personal information by technical measures and other necessary measures to make the data recipient unable to re-identify specific individuals and cannot be restored, or if we may de-identify the collected information for research, statistical analysis, and prediction, used to improve the platform's content and layout, and enhance our services (including using anonymous data for machine learning or model algorithm training), the use of such processed data does not require separate notification to you or obtain your consent.
In the event of the platform ceasing operations, we will take reasonable measures to protect the security of your user information, including but not limited to promptly stopping activities related to collecting user information, notifying users in the form of individual delivery or announcement, and deleting or anonymizing the personal information we hold.
2. How We Share, Transfer, and Publicly Disclose Your Personal Information
(1) Sharing
In addition to the usage scenarios mentioned above, we will not share your personal information with companies, organizations, and individuals outside the platform, except in the following cases:
Sharing with explicit consent: With your explicit consent, we will share your personal information with other parties;
Sharing in legal situations: We may share your personal information externally in accordance with legal requirements, litigation dispute resolution needs, or requests made by administrative or judicial authorities in accordance with the law;
Sharing with authorized partners: We may entrust trusted partners to provide services, so we may share certain user information with partners to provide better customer service and optimize user experience. We will only share the necessary user information for providing services for legitimate, lawful, necessary, specific, and explicit purposes. Our partners are not authorized to use the shared user information for any other purposes. For companies, organizations, and individuals with whom we share user information, we will sign strict confidentiality agreements and information protection agreements with them, requiring them to process user information in accordance with our instructions, this privacy policy, and any other relevant confidentiality and security measures.
(2) Transfer
We will not transfer your user information to any company, organization, or individual, except in the following cases:
Transfer with explicit consent: With your explicit consent, we will transfer your user information to other parties;
In the event of a merger, acquisition, or bankruptcy liquidation involving us and other legal entities, or other situations involving mergers, acquisitions, or bankruptcy liquidation, if user information transfer is involved, we will require the new company or organization holding your user information to continue to be bound by this policy. Otherwise, we will require that the company, organization, and individual seek your authorization again.
(3) Public Disclosure
We will only publicly disclose your user information in the following situations:
With your explicit consent or based on your active choice, we may publicly disclose your user information;
To protect the personal and property safety of us, our affiliated companies, users, or the public from infringement, we may disclose your user information in accordance with applicable laws or relevant agreements and rules of this platform.
(4) Exceptions to Obtaining Authorized Consent for Sharing, Transferring, and Publicly Disclosing User Information
According to relevant laws and regulations, there are situations in which sharing, transferring, and publicly disclosing your user information do not require obtaining your authorized consent in advance:
Related to national security and defense security;
Related to public safety, public health, significant public interests;
Related to criminal investigations, prosecutions, trials, and judgment executions;
Necessary for protecting the vital interests of you or other individuals such as life, property, etc., but it is difficult to obtain the individual's consent;
Personal information that you voluntarily make public;
Collecting personal information from legally publicized information, such as legal news reports, government information disclosure channels, etc.;
Other situations stipulated by laws and regulations.
Please be aware that according to applicable laws, if we process personal information by technical measures and other necessary measures to make the data recipient unable to re-identify specific individuals and cannot be restored, then sharing, transferring, and publicly disclosing such processed data do not require separate notification to you or obtaining your consent.
3. How We Store and Protect Your Personal Information Security
(1) Basic Rules for Data Storage
We will take reasonable and feasible measures to avoid collecting irrelevant user information. We will only retain your user information for the period necessary to achieve the purposes stated in this policy, unless permitted by law. After the above-mentioned user information retention period expires, we will delete or anonymize your personal information.
We will store the user information we collect within the territory of the People's Republic of China. If it is necessary to transmit personal information overseas due to business needs in accordance with applicable legal requirements, we will obtain your prior consent and inform you of the purpose of the user information's outbound transfer, the recipient, security measures, security risks, and other relevant circumstances.
(2) Technical Measures for Data Protection
We strive to adopt various reasonable physical, electronic, and managerial security measures to protect your user information. This is done to prevent unauthorized access, public disclosure, use, modification, damage, or loss of user information. For example, we provide secure browsing through the HTTPS protocol on the platform website; we use encryption technology to enhance the security of user information; we employ trusted protection mechanisms to prevent malicious attacks on user information; and we implement access control mechanisms to ensure that only authorized personnel can access user information; we generate the statistical specification of learnware in a privacy-preserving way. The Beimingwu system operations, including learnware upload, search, and deployment, do not require users to upload local data. All relevant statistical specifications are generated locally by users, ensuring data privacy.
(3) Organizational Measures for Data Protection Management
We have established an advanced data security management system centered around data and covering various dimensions such as organizational development, system design, personnel management, and product technology. We have a dedicated department for personal information protection and conduct security and privacy protection training courses to enhance employees' awareness of the importance of protecting personal information.
(4) Response to Personal Information Security Incidents
In the event of an unfortunate user information security incident (such as leakage or loss), we will, in accordance with legal requirements, promptly inform you of the basic situation and possible impact of the security incident, the measures we have taken or will take, suggestions for you to independently prevent and reduce risks, and remedial measures for you. We will notify you of the event-related information via email, letters, phone calls, push notifications, etc. If it is difficult to inform individual data subjects one by one, we will announce the information in a reasonable and effective manner. Additionally, we will report the handling of user information security incidents to regulatory authorities as required.
(5) You Should Also Protect Your Account Security
Please note that the information you voluntarily share or publicly disclose while using this platform may involve personal data, including sensitive information, pertaining to yourself or others. Please exercise caution and carefully consider whether to share or publicly disclose such information while using this platform. Any legal consequences arising from your voluntary public disclosure or sharing of personal information are solely your individual responsibility.
4. How You Can Manage Your Personal Information
You can access and manage your personal information in the following ways:
You can log in to the platform website to query and manage (change, delete) the basic information submitted when using the platform services.
In the following situations, you can request us to delete user information:
(1) If our processing of user information violates laws and regulations;
(2) If we collect and use your user information without obtaining your explicit consent;
(3) If our processing of personal information seriously violates the agreement with you.
For security reasons, you may need to provide a written request or other proof of your identity. We may ask you to verify your identity before processing your request. For your reasonable requests, we generally do not charge fees, but for repeated requests beyond a reasonable limit, we may charge a reasonable fee. We may refuse requests that are not directly related to your identity, involve unreasonably repetitive information, or require excessive technical means (e.g., requiring the development of a new system or fundamental changes to existing practices) and requests that pose risks to the legitimate rights and interests of others or are impractical.
In the following situations, we will be unable to respond to your requests in accordance with legal requirements:
(1) Related to our fulfillment of obligations stipulated by laws and regulations;
(2) Directly related to national security and defense security;
(3) Directly related to public safety, public health, significant public interests;
(4) Directly related to criminal investigations, prosecutions, trials, and execution of judgments;
(5) There is sufficient evidence to indicate subjective malice or abuse of rights by the data subject;
(6) Necessary for protecting the vital interests of you or other individuals such as life, property, etc., but it is difficult to obtain the individual's consent;
(7) Responding to your request would cause serious damage to your or other individuals' legitimate rights and interests;
(8) Involving trade secrets.
Each function requires some basic user information to be completed (see Article 1 of this policy). In addition to this, you can contact us through the contact information provided in Article 8 of this policy to grant or revoke your consent. When you revoke your consent, we will no longer process the corresponding user information. However, your decision to revoke consent will not affect the processing of user information based on your authorization prior to the revocation.
5. How We Use Cookies and Similar Technologies
(1) Use of Cookies
To ensure the normal operation of the website, provide you with a more relaxed browsing experience, and recommend content that may interest you, we may store cookies, Flash cookies, or other local storage provided by your browser on your computer or mobile device. These typically include identifiers, site names, and some numbers and characters (collectively referred to as "Cookies"). With the help of Cookies, the website can store datasets, model data, and other data that you have bookmarked.
If your browser or browser add-ons allow, you can modify the acceptance or rejection of our Cookies. However, if you do so, it may affect your secure access to our website in certain situations, and you may need to change user settings each time you visit our website.
(2) Use of Cookie-Like Technologies
In addition to Cookies, we may also use other similar technologies on the website, such as web beacons, pixel tags, ETags, and more. For example, emails we send to you may contain links to content on our website. If you click on such a link, we will track this click to help us understand your service preferences and improve the user service experience proactively. Web beacons are usually transparent images embedded in websites or emails. With pixel tags in emails, we can know whether the email has been opened. If you do not want your activities to be tracked in this way, you can unsubscribe from our mailing list at any time.
ETags (Entity Tags) are HTTP protocol headers transmitted behind the scenes between internet browsers and servers and can replace Cookies. ETags can help us avoid unnecessary server loads, improve service efficiency, save resources and energy. At the same time, we may use ETags to record your identity so that we can better understand and improve our products or services. Most browsers provide users with the ability to clear browser cache data, and you can perform corresponding data clearing operations in the browser settings. However, please note that if you disable ETags, you may not be able to enjoy a relatively better product or service experience.
6. Special Agreement on Information of Minor Users
We primarily provide services to adults. If you are a minor, we request that you have your parents or guardians carefully read this privacy policy and use our services or provide information to us with the consent of your parents or guardians.
In cases where personal information of minors is collected with the consent of parents or guardians for the use of the website, we will only use, share, transfer, or disclose this information in accordance with laws and regulations, explicit consent of parents or guardians, or when necessary to protect the vital interests of minors.
Please note that if you are under 14 years old, you and your guardian should carefully read this policy before using our services, ensuring that you can use our services under the guidance of your guardian and ensuring your safety when using our services and conducting transactions.
If you are the parent or other guardian of a minor, please pay attention to whether the minor you are supervising is using our services with your authorized consent. If you have any questions about the personal information of the minor you are supervising, please contact us through the contact information provided in Article 8 of this policy.
7. How This Privacy Policy Is Updated
Please carefully and thoroughly read the bolded and black-font sections of this agreement. If, due to personal reasons or negligence on your part, you fail to carefully read the content of this section, all consequences arising from this omission will be your responsibility.
Because our services and technology are continuously updated and optimized based on the needs of you and other users, we may update our privacy policy to inform you of specific changes when new services and business processes are changed. However, without your explicit consent, we will not restrict your rights according to the rights you should enjoy under this policy. We will post any changes to this policy on the website.
For significant changes, we will also provide more prominent notices (including notices through the platform website). Major changes referred to in this policy include but are not limited to:
Significant changes in our service mode, such as the purpose of processing user information, types of user information processed, and ways user information is used;
Major changes in control, organizational structure, etc., such as owner changes caused by business adjustments, bankruptcies, and mergers;
Major changes in the main objects of user information sharing, transfer, or public disclosure;
Major changes in your rights related to the processing of user information and the way they are exercised;
Major changes in the department responsible for user information security, contact information, and complaint channels;
When the user information security impact assessment report indicates a high risk.
We may temporarily suspend or terminate any functions of the platform website, or we may introduce new features or impose restrictions on certain features or limit access to some or all services. When we make significant changes to the platform that may adversely affect you, we will make reasonable efforts to notify you, and your continued use of the platform indicates your agreement to the updated privacy policy. If you do not agree with the updated privacy policy, please stop using the platform immediately.
8. How to Contact Us
If you have any questions, opinions, or suggestions about the content of this policy, you can contact us through the following methods, and we will respond to your request within 3 days: