{"id":31896,"date":"2022-01-29T11:12:04","date_gmt":"2022-01-29T03:12:04","guid":{"rendered":"http:\/\/www.deepin.org\/?page_id=31896"},"modified":"2022-03-23T14:21:35","modified_gmt":"2022-03-23T06:21:35","slug":"privacy","status":"publish","type":"page","link":"https:\/\/www.deepin.org.cn\/en\/agreement\/privacy\/","title":{"rendered":"deepin Privacy Policy"},"content":{"rendered":"<div>\n<p style=\"line-height: 22pt; margin: 15.6pt 0pt 6pt; orphans: 0; text-align: center; text-indent: 18pt; widows: 0;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 22pt; font-weight: bold;\">deepin Privacy Policy<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 15.6pt 0pt 6pt; orphans: 0; text-align: center; text-indent: 18pt; widows: 0;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 22pt; font-weight: bold;\">\u00a0<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">Last Update Date: <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">March 17<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">, 202<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">2<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">\u00a0<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">The deepin Privacy Policy (\"this Privacy Policy\") describes the personal information <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">and how and for what purposes when<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\"> UnionTech Software Technology Co., Ltd. and its affiliates (including but not limited to Wuhan Deepin Technology Co., Ltd.) (\"UnionTech Software\" or \"we\") <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">provide deepin ID service, deepin community, <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">deepin Operation System and related applications (hereinafter referred to as the \u201cSe<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">rvice<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">\") <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">.<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">Out of special concern for children's privacy, <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">we<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\"> do not knowingly accept<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">, collect or ask <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">personal information from children under the age of 1<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">4<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">. If you are under 14, you and your guardian shall carefully read the <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-style: italic; font-weight: bold;\">UnionTech Software Guidelines for Protection of Children's Privacy<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\"> and you shall not use <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">the Service<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\"> or provide personal information to us unless with the consent of or u<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">nder the supervision of your guardian.<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">This Privacy Policy may be available in multiple languages, but regardless of which language version you have<\/span> <span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">receive<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">d<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">, the <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">s<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">implified Chinese version <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">shall prevail<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">.<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">If you have any questions, opinions or suggestions regarding this Privacy Policy, you can contact us in the following ways:<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">UnionTech Software Technology Co., Ltd.<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">[Address] 18\/F, Building 12, No.10 Yard, Kegu 1st Street, Beijing Economic-Technological Development Area, Beijing<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">[E-mail] privacy@uniontech.com<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">[Tel] <\/span><a name=\"OLE_LINK5\"><\/a><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">4<\/span><a name=\"_Hlk35959529\"><\/a><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">00-8588-48<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">8<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">We understand the importance of personal information to you, and we will protect your personal information and privacy in accordance with laws and regulations, and ensure that you are the ultimate controller of the personal information you provide to us. We are committed to maintaining your trust in us and will protect your personal information with full abidance to the principles of \u201ckeeping consistency between power and responsibility, having clear objectives, offering options for acceptance, collecting the least information required, and ensuring security, subject participation, openness and transparency\u201d. Meanwhile, we undertake that we will take corresponding security measures to protect your personal information in line with the mature security standards in the industry.<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">We endeavor to present this Privacy Policy in a concise, clear and understandable manner. With a view to facilitate your reading and understanding, we have defined special terms associated with the protection of individual information. Please go to \"Appendix <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">1<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">: Definitions\" of this Privacy Policy to know the specific contents of these terms, so that you can grasp the information we wish to express to you in an accurate manner.<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">This Privacy Policy will familiarize you with the following: <\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"color: #2e75b6; font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">I. How We Collect and Use Your Personal Information <\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"color: #2e75b6; font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">II. How We Use Cookies and Other Technologies <\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"color: #2e75b6; font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">III. How We Publicize, Transfer and Disclose to the Public Your Personal Information <\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"color: #2e75b6; font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">IV. How We Protect Your Personal information <\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"color: #2e75b6; font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">V. How We Store Your Personal Information<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"color: #2e75b6; font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">VI. Your Rights <\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"color: #2e75b6; font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">VII. How this Privacy Policy is Updated <\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"color: #2e75b6; font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">VIII. Our Department for Personal Information Protection\/Responsible Person for Personal Information Protection<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"color: #2e75b6; font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">IX. Your Right to Complain or File a Lawsuit with the Regulatory Authorities and Governing Law<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">Please read and comprehend this Privacy Policy carefully before making use of our products or services, particularly the black and bold parts, so that you can get a better understanding of the products and services furnished by us and make corresponding authorization and consent based on full understanding of the contents hereof.<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 14pt;\">\u00a0<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 7.8pt 0pt 6pt; text-align: justify;\"><span style=\"color: #2e75b6; font-family: CESI\u5b8b\u4f53-GB13000; font-size: 14pt; font-weight: bold;\">I. How We Collect and Use Your Personal Information <\/span><\/p>\n<p style=\"line-height: 22pt; margin: 7.8pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">\u00a0<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">If you use <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">the Service<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">, we will follow the principles of legality, legitimacy, necessity and good faith, collect only the information that is necessary to achieve a specific, particular, explicit and lawful purpose, and ensure that such information is not further processed in any manner inconsistent with such purpose.<\/span><\/p>\n<h2 style=\"margin: 12pt 0pt; page-break-after: avoid; page-break-inside: avoid; text-align: justify; text-indent: 0pt;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">1.<\/span><span style=\"font: 7.0pt 'Times New Roman';\">\u00a0 <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">deepin ID Service<\/span><\/h2>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">You can register a<\/span> <span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">deepin ID<\/span> <span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">through the deepin User Center at (account.deepin.org) and use this account to log in to <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">the Service<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\"> or products provided by our partners. After logging in to your deepin ID, <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">we will also collect the information stored in your deepin ID (which we will treat as personal information).<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\"> For specific rules regarding your use of your account, please follow the <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-style: italic;\">deepin <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-style: italic;\">ID<\/span> <span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-style: italic;\">Service<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-style: italic;\"> Agreement<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\"> and other special rules issued by us for this purpose.<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify; text-indent: 0pt;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">1.1.<\/span><span style=\"font: 7.0pt 'Times New Roman';\">\u00a0 <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">Registration of deepin ID<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">In order to comply with the relevant regulatory requirements of <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">accounts in various regions<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">, <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">w<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">hen you register your <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">d<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">eepin ID, we <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">will <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">collect your <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">IP address<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\"> to determine your regional location and provide you <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">corresponding<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\"> registration.If you are located outside of the People's Republic of China, you need to provide your <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">personal email address<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\"> to complete the <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">d<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">eepin ID<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\"> registration<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">.<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">1.2. <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">Login of deepin ID<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: normal;\">We will <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: normal;\">collect<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: normal;\"> your <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">IP address<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: normal;\"> every time you log in to <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: normal;\">deepin ID to achieve <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: normal;\">secure, fraud detection, and account management <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: normal;\">so that <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: normal;\">make sure there is no suspicious login or account connection, <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: normal;\">which<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: normal;\"> will be <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: normal;\">completely<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: normal;\"> used <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: normal;\">for<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: normal;\"> your login security.<\/span><\/p>\n<ol style=\"margin: 0pt; padding-left: 0pt;\" start=\"2\" type=\"1\">\n<li style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold; line-height: 22pt; list-style-position: inside; margin: 0pt 0pt 6pt; text-align: justify; text-indent: 0pt;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">deepin Community<\/span><\/li>\n<\/ol>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">2.1. Information Release and Interaction<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">When you use deepin community to post, reply, send a private message to other users or do other interactive behaviors, we will collect the <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">content (including text, pictures or videos) <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">and <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">your behavior information (ie, Like<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">s<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">, Collection<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">s<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">, Comment<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">s<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\"> and <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">R<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">eport<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">ing<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\"> information)<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\"> to achieve relevant regulatory requirements in various regions.<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">When you edit your personal homepage, we will collect <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">your personal profile <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">that you fill in <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">according to the actual situation. <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">Your refusal to provide the aforementioned information does not affect the normal use of other services in deep community<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">.<\/span><\/p>\n<ol style=\"margin: 0pt; padding-left: 0pt;\" start=\"3\" type=\"1\">\n<li style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold; line-height: 22pt; list-style-position: inside; margin: 0pt 0pt 6pt; text-align: justify; text-indent: 0pt;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">deepin Operation System and Related Applications <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">(<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">the Software<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">)<\/span><\/li>\n<\/ol>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">3.1. <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">System Update<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">When you upgrade <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">the Software<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">, we will collect information about your <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">operation system version, device ID, CPU<\/span> <span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">information<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">, so that we can clarify your operation system information to help you update accurately.<\/span><\/p>\n<h2 style=\"line-height: 22pt; margin: 12pt 0pt; page-break-after: avoid; page-break-inside: avoid; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">4<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">. Information of Third Parties<\/span><\/h2>\n<p style=\"line-height: 22pt; margin: 0pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">We may obtain your personal information from third parties if permitted by law. For example:<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">4<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">.1. With your consent (e.g., when you log in and use deepin ID through a third-party account), we may collect and use certain information obtained from third-party social networking services, such as nicknames, avatars and regions;<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">4<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">.2. We may collect and use the aforementioned information if the information shared by other users contains your information;<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">4<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">.3. We may collect and use your personal information that you have disclosed or that has otherwise been lawfully disclosed to a reasonable extent, unless you have expressly denied. If we collect and use your personal information that you have disclosed and that has a significant impact on your personal rights and interests, we will ask for your consent again.<\/span><\/p>\n<h2 style=\"line-height: 22pt; margin: 12pt 0pt 6pt; page-break-after: avoid; page-break-inside: avoid; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">5<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">. Other Uses<\/span><\/h2>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; text-decoration: none;\">We will strictly abide by the provisions of laws and regulations and the agreement with you, and shall use the collected information of you for other purposes as below:<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; text-decoration: none;\">5<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; text-decoration: none;\">.1. Internal audit, big data analysis and research <\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; text-decoration: none;\">5.<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; text-decoration: none;\">1.1. We will use the personal information collected to conduct requisite internal audits within UnionTech Software when necessary.<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; text-decoration: none;\">5.<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; text-decoration: none;\">1.2. We will use the personal information collected for big data analysis. For example, we will use the information collected for analysis, to form statistical products that do not contain any personal information, to show the overall picture of the services of us, to analyze the behavior patterns of different groups and so on. For big data analysis information without identification after statistical processing, we may disclose and share with our affiliates and partners.<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; text-decoration: none;\">5<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; text-decoration: none;\">.2. Security Protection <\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">We will also safeguard your personal equipment security, account security, our operation security, and fulfill our legal obligations with your individual information (such as retaining information that may relate to illegal and criminal activities).<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold; text-decoration: none;\">6.<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold; text-decoration: none;\"> In the event that we need to collect personal information of you under your custody beyond the above-mentioned purpose of use, we will explain to you and seek your consent anew. <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; text-decoration: none;\">However, according to relevant laws, regulations and national standards, in any of the following circumstances, we may collect and use your personal information without seeking your consent:<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; text-decoration: none;\">6.<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; text-decoration: none;\">1. Where it is necessary for performance of our statutory duties or legal obligations;<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; text-decoration: none;\">6.<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; text-decoration: none;\">2. When it involves national security, national defense security and other national interests directly and when it involves public security, public health, public right to know and other major public interests;<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; text-decoration: none;\">6.<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; text-decoration: none;\">3. When it directly relates to criminal investigation, prosecution, trial and execution of judgments;<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; text-decoration: none;\">6.<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; text-decoration: none;\">4. When it is collected to protect the life, property, reputation or other major legal rights of you or other individuals in the situation where it is difficult to obtain your own authorization or consent;<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; text-decoration: none;\">6.<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; text-decoration: none;\">5. When it is required for execution and performance of contracts at your request;<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; text-decoration: none;\">6.<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; text-decoration: none;\">6. When it is necessary for maintaining the safe and stable operation of <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; text-decoration: none;\">the Service<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; text-decoration: none;\">, such as identifying and resolving failures of products or services;<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; text-decoration: none;\">6.<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; text-decoration: none;\">7. Where it is necessary for news reporting, media supervision and performing other acts in the public interest to the extent reasonable;<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; text-decoration: none;\">6.<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; text-decoration: none;\">8. When it is necessary for academic research institutions to collect statistics or conduct academic research in the public interest, provided that any personal information contained in the results of such academic research or descriptions thereof has been de-identified; or<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; text-decoration: none;\">6.<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; text-decoration: none;\">9. Other circumstances as stipulated by laws and regulations.<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 14pt;\">\u00a0<\/span><\/p>\n<h1 style=\"line-height: 22pt; margin: 12pt 0pt 6pt; page-break-after: avoid; page-break-inside: avoid; text-align: justify;\"><span style=\"color: #2e75b6; font-family: CESI\u5b8b\u4f53-GB13000; font-size: 14pt; font-weight: bold;\">II. How We Use Cookies and Other Technologies <\/span><\/h1>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">\u00a0<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold; text-decoration: none;\">1. Cookie <\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; text-decoration: none;\">1.1. We may place a text file known as Cookie on your computer or mobile device. The text in a cookie often consists of identifiers, site names, and some numbers and characters. We undertake that we will not use such Cookies for any purposes other than those described herein. We use Cookie primarily for providing the following functions or services:<\/span><\/p>\n<ul>\n<li style=\"line-height: 22pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; text-decoration: none;\">Ensure the safety of products or services<\/span><\/li>\n<\/ul>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; text-decoration: none;\">We may set Cookie or anonymous identifiers for authentication and security purposes, with a view to confirm whether you have securely logged in to your deepin ID or other service account and to detect hacker theft, fraud and other unlawful acts.<\/span><\/p>\n<ul>\n<li style=\"line-height: 22pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; text-decoration: none;\">Provide better products or services<\/span><\/li>\n<\/ul>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; text-decoration: none;\">With Cookie, you are not required to repeat such steps and processes as filling in your personal information and entering search content, thus increasing your efficiency.<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; text-decoration: none;\">1.2. Cookie Management<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; text-decoration: none;\">Most browsers have the function of Cookie management, such as cache data clearing, and you can perform the appropriate data clearing operations in \u201csettings\u201d of the browser. Please note that if you perform data clearing, you may not be able to use the services or corresponding functions provided by us that depend on Cookie.<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold; text-decoration: none;\">2. Do Not Track <\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">When you browse the web <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">through UnionTech Browser<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">, you can send a request to the website and ask <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">i<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">t <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">not to <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">collect or not trac<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">e<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\"> your browsing data. This f<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">unction<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\"> is in a closed state by default. You can set this f<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">unction<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\"> through \"[Settings] -\" [Privacy and Security] \"in the <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">UnionTech Browser<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">.<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">3. Software Development Kit<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">In order to ensure the realization of the related functions of <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">the Service<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\"> and the safe and stable operation thereof, we may access <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">the Service<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\"> development kit (\u201cSDK\u201d) provided by a third party and provide the third party with the information need to know to implement and improve the relevant functions. We will carry out strict auditing and safety monitoring on the access and use of SDKs provided by third parties, in order to secure your personal information. Please understand, we will try our best to update the list of third-party SDKs, but in some cases, it may lag behind. In the meantime, in order to keep confidential our business information and technological means, some SDKs used for platform risk control or special cooperation may not be included in this list, but if your important privacies or device permissions are required by such SDKs, we will get your authorization in a reasonable manner.<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">The following is a list of Third Party SDKs We Use:<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">Please note, third-party SDKs may change the type of personal information due to such reasons as version upgrade and policy adjustment. Please refer to the corresponding publicized official instructions.<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">SDK name: T-Sec Text Content Security <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 10.5pt;\">SDK<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">Third <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">p<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">arty <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">n<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">ame<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">: <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">Shenzhen Tencent Computer System Co., Ltd.<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">Service type: Text Content Security<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">Type of personal information collected: User input text content (including user nickname, personal profile, etc.) <\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">Privacy Policy Link:<\/span> <span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">https:\/\/cloud.tencent.com\/document\/product\/301\/11470<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">SDK name: SendCloud Mail Notification <\/span><a name=\"_Hlk87533446\"><\/a><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">SDK<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">Third <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">p<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">arty <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">n<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">ame<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">: <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">Wuhan SendCloud Technology Co., Ltd.<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">Service type: Mail Notification<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">Type of personal information collected: E-mail Address<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">Privacy Policy Link: https:\/\/www.sendcloud.net\/#\/friendlyLink?tab=protocal<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">\u00a0<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">SDK name: Lianlu Information Notification <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">SDK<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">Third <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">p<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">arty <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">n<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">ame<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">: Shanghai Lianlu e-commerce Co., Ltd.<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">Service type:Notification SMS<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">Type of personal information collected: Personal Mobile Number<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">Privacy Policy Link: <\/span><a style=\"color: #000000;\" href=\"http:\/\/sms.shlianlu.com\/reg.aspx\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; text-decoration: underline;\">http:\/\/sms.shlianlu.com\/reg.aspx<\/span><\/a><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 14pt;\">\u00a0<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 7.8pt 0pt 6pt; text-align: justify;\"><span style=\"color: #2e75b6; font-family: CESI\u5b8b\u4f53-GB13000; font-size: 14pt; font-weight: bold;\">III. How We Publicize, Transfer and Disclose to the Public Your Personal Information <\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">\u00a0<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold; text-decoration: none;\">1.<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold; text-decoration: none;\"> Publicization<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><a name=\"GX\"><\/a><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; text-decoration: none;\">1.1. We will not provide your personal information to any third party except as permitted by laws, regulations, normative documents and regulatory provisions or with your prior consent, except in the following cases:<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; text-decoration: none;\">1.1.1. We may publicize your personal information as required by laws and regulations, or according to the compulsory requirements of the competent government authorities. <\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; text-decoration: none;\">1.1.2. Entrusted processing: In order to achieve our service functions, we will entrust external suppliers to assist us in providing relevant services to you. In the case of entrusted processing, the third party receiving personal information is only entitled to provide services to you on our behalf as we instruct, and we are liable to you for their acts to the extent we have entrusted.<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; text-decoration: none;\">1.2. In order to fulfill the agreement with you or for other reasonable purposes, we may provide some of your personal information to a third-party personal information processor, and such processor has the right to process the personal information received only when such information as the purpose of processing, manner of processing and type of personal information has been notified to you. If the recipient changes the original purpose or manner of processing, the recipient shall ask for your consent again.<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; text-decoration: none;\">1.3. What needs to be drawn to your attention is that, <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold; text-decoration: none;\">when the relevant service providers render services to you by means of third-party access such as page jumping to the service provider\u2019s page, the corresponding service providers shall directly reach the corresponding usage license of personal information authorization with you, and such personal information collected directly by the service providers is not within the scope of personal information we make public for them. <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; text-decoration: none;\"> In such cases where services are directly furnished by third parties, we will clearly identify the third-party information in the specific service page. To avoid ambiguity, you ought to know and understand that the links of websites, applications, products and services operated by an independent third party mentioned above are only furnished for users to browse relevant pages. When you visit such third-party websites, applications, products and service links, you shall separately assent to this Privacy Policy or the terms on the protection of individual information furnished by them. <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold; text-decoration: none;\">We and such third-party websites, applications, product and service providers shall assume independent responsibilities for the protection of personal information to you within the scope specified by law and agreed by the Parties.<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold; text-decoration: none;\">2. Transfer <\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">We will not transfer your personal information to any companies, organizations or individuals, except under the following circumstances: <\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; text-decoration: none;\">2.1. Transfer with prior separate consent: With your prior separate consent, we will, in accordance with the provisions of laws and regulations, transfer your personal information to other parties;<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; text-decoration: none;\">2.2. When it involves mergers, acquisitions or bankruptcy or liquidation, and involves transfer of personal information, we will require the new company or organization which holds your personal information to continue being bound by this privacy policy, or we will require such company or organization to get your authorization and consent anew. <\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold; text-decoration: none;\">3. Public Disclosure <\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">We will only make public disclosure of your personal information under the following circumstances with safety protection measures in line with industrial practice: <\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; text-decoration: none;\">3.1. To disclose the specified personal information as required by you via the disclosure means separately agreed upon by you; <\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; text-decoration: none;\">3.2. To disclose your personal information according to the required information type and disclosure means when such disclosure is made under laws and regulations, compulsory administrative law enforcement or judicial requirements. Under the premise of compliance with laws and regulations, when we receive the aforesaid request for information disclosure, we will require that it is a prerequisite to provide corresponding legal documents, such as summons or investigation letter. We firmly believe that the information we are required to provide should be as transparent as possible to the extent permitted by law. We have reviewed all requests with due diligence to ensure that they have legitimacy basis and are restricted to data that law enforcement authorities have the legitimate right to obtain for specific investigative purposes. Without prejudice to laws and regulations, the documents we disclose are protected by encryption keys.<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">\u00a0<\/span><\/p>\n<h1 style=\"line-height: 22pt; margin: 12pt 0pt 6pt; page-break-after: avoid; page-break-inside: avoid; text-align: justify;\"><span style=\"color: #2e75b6; font-family: CESI\u5b8b\u4f53-GB13000; font-size: 14pt; font-weight: bold;\">IV. How We Protect Your Personal information <\/span><\/h1>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">\u00a0<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold; text-decoration: none;\">1. We have adopted all types of security technologies and protective measures in line with industry standards in order to protect users\u2019 personal information from unauthorized access, use or leakage. We strictly observe domestic and foreign security standards to set up a security system, and implement such standards in combination with cutting-edge and mainstream security technologies to prevent users\u2019 personal information from unauthorized access, use or leakage. A perfect security defense system has been set up so that when we are attacked by external network and infected by viruses, the attack behaviors can be intercepted actively in a prompt manner. <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold; text-decoration: none;\">the Service<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold; text-decoration: none;\"> shall be subject to <\/span><a name=\"_Hlk10476548\"><\/a><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold; text-decoration: none;\">HTTPS<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold; text-decoration: none;\"> encryption protocol transmission in the course of network communication, which can effectively avoid the information being stolen by a third party in the course of communication. The privacy and sensitive personal information involving users shall be stored by encryption in <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold; text-decoration: none;\">the Service<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold; text-decoration: none;\"> and backed up in real time.<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold; text-decoration: none;\">2. We have set up a sound data security management system, including hierarchical classification, encryption and storage of user information, and division of data access rights. The internal data management system and operation procedures are worked out, which raise stringent process requirements from data acquisition, use and destruction, in a bid to avoid illegal use of user privacy data. Determine the security management responsibilities of all departments as well as their persons in charge who contact the personal information of users; set up the workflow and security management system for the collection, use as well as other relevant activities of users\u2019 personal information; carry out authority management for staff and agents, review information exported, copied and destroyed in batches, and take measures to prevent leakage; properly keep paper media, optical media, electromagnetic media and other carriers that record users\u2019 personal information, and take corresponding safe storage measures; conduct access review for information systems that store users\u2019 personal information, and take anti-invasion and anti-virus measures; record the personnel, time, place, events and other information that operate users\u2019 personal information; formulate and organize the implementation of emergency plans for personal information security incidents; hold regular training on security and privacy protection to raise employees\u2019 awareness of the protection of personal information.<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; text-decoration: none;\">3. In accordance with laws and regulations and the requirements of competent authorities, we will, establish a special department for personal information protection and designate persons responsible for the protection of personal information to supervise the processing of personal information and the protection measures taken, and, on a regular basis, update and publicize the relevant contents of reports such as security risks and security impact assessment of personal information. For more information about the department and the person in charge of personal information protection, please refer to [Section VIII] of this Privacy Policy.<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; text-decoration: none;\">4<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold; text-decoration: none;\">. Currently, we have passed the evaluation on and completed the filling for classified protection of national cybersecurity (Level 3)<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold; text-decoration: none;\"> in China<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold; text-decoration: none;\">. In terms of information security, we have met the international certification standards in ISO27001. Also, we have obtained the corresponding certification.<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; text-decoration: none;\"> But we need to remind you that the Internet environment is not 100% secure. We will use our best efforts to ensure or guarantee the security of any information you send to us. We will be liable for any damage to your legal rights and benefits resulting from unauthorized access, public disclosure, alteration or destruction of information due to any damage to our physical, technological or administrative protection facilities.<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; text-decoration: none;\">5. If unfortunately, a personal information safety event occurs, we will, according to the requirements of laws and regulations, inform you of the basic situation of the safety event and possible impact in a timely way, the emergency response we have already taken or are about to take and other relevant disposals, remedies for you via messages\/your reserved contact information. If it is difficult to notify the subjects of personal information one by one, we will make a public announcement in a reasonable and effective manner, and take the initiative to report the handling of security incidents of personal information to the regulatory authorities concerned.<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold; text-decoration: none;\">6. If you raise any questions concerning our protection of personal information, you can contact us via the contact ways in [Section VIII] of this Privacy Policy. If you learn that your personal information is leaked, please contact us forthwith through the contact ways specified in this Privacy Policy so as to facilitate up to take corresponding measures in a prompt manner.<\/span><\/p>\n<p style=\"font-size: 14pt; line-height: 103%; margin: 0pt 0pt 7.8pt; text-align: justify; text-indent: 18pt;\"><span style=\"font-family: 'Arial Unicode MS'; font-size: 14pt;\">\u00a0<\/span><\/p>\n<h1 style=\"line-height: 22pt; margin: 0pt 0pt 6pt; page-break-after: avoid; page-break-inside: avoid; text-align: justify;\"><span style=\"color: #2e75b6; font-family: CESI\u5b8b\u4f53-GB13000; font-size: 14pt; font-weight: bold;\">V. How We Store Your Personal Information <\/span><\/h1>\n<p style=\"line-height: 22pt; margin: 7.8pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">\u00a0<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 7.8pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">We will<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\"> comply with<\/span> <span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">the <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">provisions of laws and regulations<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\"> in various regions\uff0c<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">take all reasonable and feasible measures to guarantee that personal information unconcerned is not collected. <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">Your deepin ID information\uff08including but not limited to your personal mobile number\uff09will be encryption and stored in the server until your deepin ID is logged out. <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">We will only retain your personal information for the shortest period required for achieving the purposes described herein. We will delete or anonymize your personal information if it is stored for a period that exceeds what is permitted by law. If it is technically difficult to delete the relevant personal information, we will stop processing it except for the purpose of storage and taking necessary security measures. However, in the following circumstances, we may change the storage time of personal information for the need of complying with legal requirements:<\/span><\/p>\n<ul>\n<li style=\"line-height: 22pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">Comply with the provisions in court judgments, adjudications or other legal procedures;<\/span><\/li>\n<li style=\"line-height: 22pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">Comply with the requirements of relevant government authorities or legally authorized organizations;<\/span><\/li>\n<li style=\"line-height: 22pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">We have reasons to believe that we need to comply with laws, regulations and other relevant provisions.<\/span><\/li>\n<\/ul>\n<p style=\"line-height: 22pt; margin: 7.8pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">In the event that <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">the Service<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\"> is discontinued, we will stop collecting your personal information in a timely manner, notify you of the discontinuation by delivering an individual notice or by announcement, and delete or anonymize your personal information within a reasonable period.<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 7.8pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">\u00a0<\/span><\/p>\n<h1 style=\"line-height: 22pt; margin: 12pt 0pt 6pt; page-break-after: avoid; page-break-inside: avoid; text-align: justify;\"><span style=\"color: #2e75b6; font-family: CESI\u5b8b\u4f53-GB13000; font-size: 14pt; font-weight: bold;\">VI. Your Rights <\/span><\/h1>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">\u00a0<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">In accordance with relevant laws, regulations and standards<\/span> <span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">as well as the common practices <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">in various regions<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">,, we will do our best to use appropriate technologies to ensure your exercise of the following rights on your personal information:<\/span><\/p>\n<ol style=\"margin: 0pt; padding-left: 0pt;\" type=\"1\">\n<li style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; line-height: 22pt; list-style-position: inside; margin: 0pt 0pt 6pt; text-align: justify; text-indent: 0pt;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">If you want to view, duplicate, correct your basic deepin ID information(ie, name and nickname) or withdraw your consent, you can log in to your deepin ID through the deepin User Center (account.deepin.org) and perform such operations at \"[Account Information]\" or \"[Personal Information]\".<\/span><\/li>\n<\/ol>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">2. If you want to view, duplicate, correct, delete the released information under your deepin ID information or withdraw your consent, you can log in to your deepin ID and perform such operations at \"[Posts]\".<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">3. You have the rights to send us a written request via the contact ways released in this Privacy Policy to acquire a copy of your personal information. To the extent that technology is feasible, such as data interface matching and conforming to the conditions prescribed by the national cyberspace administration, we may also transmit the copy of your personal information to the third party specified by you directly in line with your requirements and on the strength of existing general-purpose technology. In the event that the transmission fails as a result of the third party\u2019s refusal to receive the copy of your personal information, you shall coordinate with such third party to address the issue, and we shall not assume any responsibility in this regard.<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">4. If you cannot achieve your personal rights of your personal information according to aforementioned ways or some special personal rights may not be performed on your own, you can contact us via the contact ways released in [Section VIII] of this Policy at any time. We will reply to your access request within fifteen working days. In a bid to protect your personal information security, we may request you to authenticate.<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">5. Please pay attention to check the authenticity, timeliness, integrity and accuracy of the personal information you provide, otherwise we will be unable to effectively contact you and render some services to you as a result. If we suspect that the information provided by you is wrong, incomplete and untrue based on reasonable reasons, we shall be entitled to ask you or inform you to correct it, or even suspend or stop rendering some services to you.<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">6. In the case that we decide to respond to your deletion or cancellation request, we will not <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">continue to process your personal information anymore<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\"> and also inform the third parties (including the affiliated companies of us) that share your personal information from us with the best efforts, and request such third parties to delete your personal information in a prompt manner, unless otherwise specified by laws and regulations, or such third parties have gained your independent authorization.<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\"> However, your decision to withdraw consent will not affect the legality of personal information processing already launched based on your authorization.<\/span> <span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">If the retention period stipulated by laws and administrative regulations has not expired, or if it is technically difficult to delete the personal information, we will stop processing it except for the purpose of storage and taking necessary security measures.<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">7. For your reasonable requests, we do not collect any charges in principle, but for repeated requests or unreasonable requests, we will collect a certain amount of cost fees as the case may be. We may reject requests that are unprovoked and repeated, which require too many technical means (e.g., to develop new systems or fundamentally change existing practices), pose a risk to the legitimate interests of others or are highly impractical (e.g., information stored on backup tape). <\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">8. According to requirements of laws and regulations, we are unable to respond to your request in the following circumstances: <\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">8.1. When it involves the performance of our obligations under laws and regulations;<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">8.2. When it involves national security and national defense security directly; When it involves public security, public health and other major public interests; <\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">8.3. Information directly related to criminal investigation, prosecution, trial and execution of judgments; <\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">8.4. When there is sufficient evidence to prove that you are subjectively in bad faith or abuse your power; <\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">8.5. When responding to your request will cause serious harms to the legal rights and interests of other individuals or organizations;<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">8.6. When any trade secret is involved;<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">8.7. When it is collected to protect the life, property or other major legal rights of you or other individuals in the situation where it is difficult to obtain your consent;<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">8.8. Other circumstances prescribed by applicable law.<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 14pt;\">\u00a0<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 7.8pt 0pt 6pt; text-align: justify;\"><span style=\"color: #2e75b6; font-family: CESI\u5b8b\u4f53-GB13000; font-size: 14pt; font-weight: bold;\">VII. How this Privacy Policy is Updated<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold;\">\u00a0<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold; text-decoration: none;\">1. Our privacy policy may be subject to change. Without your express consent, we will not reduce the rights that you enjoy according to this Privacy Policy. We will post any updates to the privacy policy. <\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold; text-decoration: none;\">2. With respect to major changes, we will give a more prominent notice (for example, for some services, we will give a notice by email, specifying the detailed changes made to the privacy policy) and obtain your express consent again. <\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold; text-decoration: none;\">3. Significant changes referred to in this privacy policy include, but are not limited to: <\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; text-decoration: none;\">3.1. Our products and service mode may change greatly. For example, we may change the purpose of personal information processing, the type of personal information processed, and the way of using personal information. <\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; text-decoration: none;\">3.2. Our ownership structure or organizational structure may change greatly. For example, the change of actual controller caused by business adjustment, bankruptcy, M&amp;A and so on; <\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; text-decoration: none;\">3.3. The main objects of personal information publicization, transfer or public disclosure may change; <\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; text-decoration: none;\">3.4. Your right to participate in personal information processing and the way to exercise such right may significantly change; <\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; text-decoration: none;\">3.5. The department responsible for processing the security of personal information, its contact information and the complaining channel may change; <\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; text-decoration: none;\">3.6. The influence and evaluation report of personal information security shows that there is a high risk. <\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold; text-decoration: none;\">4. We will also keep the old versions of this Privacy Policy in the archives for your reference.<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 14pt; font-weight: bold;\">\u00a0<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 7.8pt 0pt 6pt; text-align: justify;\"><span style=\"color: #2e75b6; font-family: CESI\u5b8b\u4f53-GB13000; font-size: 14pt; font-weight: bold;\">VIII. Our Department for Personal Information Protection\/Responsible Person for Personal Information Protection<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">\u00a0<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; text-decoration: none;\">1. We have appointed a department for the protection of personal information so as to assume responsibility for coordinating and monitoring the compliance and enforcement of laws, regulations as well as internal policies and systems associated with the protection of personal information.<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; text-decoration: none;\">2. If you raise any questions or come up with opinions or suggestions in relation to this Privacy Policy, you may contact the personal information protection agency in the following ways. In general cases, we will make a reply within fifteen working days or longer time permitted by applicable laws and regulations.<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; text-decoration: none;\">Company Name: [UnionTech Software Technology Co., Ltd.]<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">Department for Personal Information Protection\/Responsible Person for Personal Information Protection: [Legal Department]<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">Address: [18\/F, Building 12, No.10 Yard, Kegu 1st Street, Beijing Economic-Technological Development Area, Beijing]<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">Tel: [010-62669253]<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify; text-indent: 0pt;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">E-<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">mail: <\/span><a style=\"color: #000000;\" href=\"mailto:%5Bprivacy@uniontech.com%5D\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; text-decoration: underline;\">[privacy@uniontech.com]<\/span><\/a><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">\u00a0<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 7.8pt 0pt 6pt; text-align: justify;\"><span style=\"color: #2e75b6; font-family: CESI\u5b8b\u4f53-GB13000; font-size: 14pt; font-weight: bold;\">IX. Your Right to Complain or File a Lawsuit with the Regulatory Authorities and Governing Law<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">\u00a0<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; text-decoration: none;\">1. In the event of any dissatisfaction with our reply, particularly if you consider that our behavior for the processing of personal information has prejudiced your legitimate rights and interests, and no consensus can be reached through amicable consultation,<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold; text-decoration: none;\"> you are entitled to file a complaint with the relevant supervision department for the protection of personal information, or either Party may file a lawsuit with the People\u2019s Court of [Daxing District, Beijing]<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; text-decoration: none;\">.<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; text-decoration: none;\">2. <\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; font-weight: bold; text-decoration: none;\">The conclusion, implementation, interpretation and dispute resolution of this Privacy Policy shall be governed by the laws of the People\u2019s Republic (excluding Hong Kong, Macao and Taiwan), without regard to the application of conflict rules<\/span><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt; text-decoration: none;\">.<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><br style=\"mso-column-break-before: always; clear: both;\" \/><span style=\"color: #2e75b6; font-family: CESI\u5b8b\u4f53-GB13000; font-size: 14pt; font-weight: bold;\">Appendix 1: Definitions<\/span><\/p>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">\u00a0<\/span><\/p>\n<ul>\n<li style=\"line-height: 22pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">\u00a0Personal Information<\/span><\/li>\n<\/ul>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">Personal information refers to all kinds of information recorded electronically or otherwise relating to identified or identifiable natural persons, including but not limited to the natural person's name, date of birth, ID card number, personal biometric information, address and tel, while the information that has been anonymized is not included.<\/span><\/p>\n<ul>\n<li style=\"line-height: 22pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">Sensitive Personal Information<\/span><\/li>\n<\/ul>\n<p style=\"line-height: 22pt; margin: 0pt 0pt 6pt; text-align: justify;\"><span style=\"font-family: CESI\u5b8b\u4f53-GB13000; font-size: 11pt;\">Sensitive personal information is such information that, if leaked or used illegally, could easily lead to the infringement of a natural person's human dignity or cause personal or property damages to a natural person, including without limitation biometric identification, religious belief, specific identity, health care, financial accounts and whereabouts, as well as the personal information of minors under the age of 14.<\/span><\/p>\n<\/div>\n<div class=\"cnzz\" style=\"display: none;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>deepin Privacy Policy \u00a0 Last Update Date: March 17, 2022 \u00a0 The deepin Privacy Policy (\"this Privacy Policy\") describes the personal information and how and for what purposes when UnionTech Software Technology Co., Ltd. and its affiliates (including but not limited to Wuhan Deepin Technology Co., Ltd.) (\"UnionTech Software\" or \"we\") provide deepin ID service, deepin community, deepin Operation System and related applications (hereinafter referred to as the \u201cService\") . Out of special concern for children's privacy, we do not knowingly accept, collect or ask personal information from children under the age of 14. If you are under 14, you ...<a href=https:\/\/www.deepin.org.cn\/en\/agreement\/privacy\/>Read more<\/a><\/p>\n","protected":false},"author":11164,"featured_media":0,"parent":29408,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/pages\/31896"}],"collection":[{"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/users\/11164"}],"replies":[{"embeddable":true,"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/comments?post=31896"}],"version-history":[{"count":17,"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/pages\/31896\/revisions"}],"predecessor-version":[{"id":31993,"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/pages\/31896\/revisions\/31993"}],"up":[{"embeddable":true,"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/pages\/29408"}],"wp:attachment":[{"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/media?parent=31896"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}