Thank you for visiting Lingting (m.hrjh.org hereinafter referred to as this site). In order to allow you to use the services and information of this site with peace of mind, hereby explain to you the privacy protection policy of this site to protect your rights and interests. Please read it carefully the following:


Applicable scope of privacy protection policy: including how this site handles personally identifiable information collected when you use the website service. The privacy protection policy does not apply to related linked websites other than this website.


Chapter 1 General Provisions
Thank you for visiting this site. We respect and will do our utmost to protect the privacy information of all users. We promise to keep your personal information and other data strictly confidential, and process your personal information in strict accordance with the content described in this policy. We will collect, use, store, share and transfer your personal information based on your consent and other legal basis for processing your personal information.


The following are the main points of the "Privacy Policy of this site":

Article 1 To help you register and use the products or services of this site, we may collect personal information related to the provision of services, and you have the right to refuse or withdraw your authorization.

Article 2 You can access, correct, and delete your personal information, change the scope of your authorization and consent, and cancel your account. We provide you with ways to exercise these rights.

Article 3 We have adopted Internet industry standard technical measures and data security measures to protect the security of your personal information.

Article 4 Unless we obtain your consent again, we will not use your personal information for other purposes not specified in this policy.

Article 5 When you have any questions about this policy, you can contact us further and consult [email protected].


Section 1 Introduction


Please read and fully understand this Policy before using our products and services. We have expressed the key content in bold, and hope you pay special attention to it. Once you use or continue to use the products and services of this site, you agree that we will process your relevant information in accordance with this policy. If you have any questions about this policy, you can contact us by email.


In order to make it easier for you to understand the relevant concepts in this policy, we have underlined the proper nouns and introduced them in detail in the last section of this policy, "Explanation of Terms". The upper right corner of the relevant terms in this policy is marked with *, which means that it involves sensitive information collected by this site, and we will remind you with a different style from the main text. We may revise the Privacy Policy of this Site from time to time. When the "Privacy Policy of this site" changes, we will show you the changed content in the form of push notifications, pop-up windows, etc. after the version is updated.


Please note that we will collect, use, process and store your personal information in accordance with the updated "Privacy Policy" only after you confirm and agree to the change; you can choose not to agree, and we will provide you with the " The function of browsing as a "guest", but this may cause you to be unable to fully use the services and functions of this site.


Chapter II Privacy Protection Guidelines


Section 1 How We Collect and Use Your Personal Information We will follow the principles of legitimacy, lawfulness, and necessity to collect and use your personal information that you voluntarily provide during the use of services or due to the use of products on this site for the following purposes described in this policy. and personal information generated by the service. If we want to use your personal information for other purposes not specified in this policy, or use the collected information for other purposes based on a specific purpose, we will notify you in a reasonable way and ask you again before using it. with your consent.


Section 2 Account Registration When you register and log in to your account on this site, you need to provide us with the following information: account name, avatar (if any) and email address. After providing the above information and agreeing to the "User Agreement of this Site" and this policy, you can use the core business functions of this site, including: browsing content on this site, publishing information (including questions and answers, comments, documents, articles, etc.). If you choose not to provide the necessary information to realize the core business functions of this site or to use certain types of functions, we will not be able to provide you with the functions.


When you register an account on this site, we will need you to provide an email address. If you refuse to provide an email address, the registration will fail, so you will not be able to use the relevant functions of posting information. But you can just browse the page without logging in after logging out of the registration page.


Section 3 Provide you with the core business functions of this site’s products and services In order to realize the core business functions of this site, we may need to collect personal information from you. The following will list in detail the core business functions of this site and the personal information collected to achieve this function. If you refuse to collect, you will not be able to use the service.


Article 1 Browsing, attention and collection functions. The content you can browse includes questions and answers, comments, documents, and articles; during the browsing process, you can also follow users, communities, questions, topics, favorites you are interested in, and bookmark the above content. To this end, we may collect device information when you use this site, such as device model, unique device identifier, operating system, resolution, telecom operator and other software and hardware information. We may also collect your browser type to provide you with the best solution for information display. In addition, when you use the browsing and collection functions, we will automatically collect the details of your use of this site and save them as relevant web logs, including but not limited to the search keyword information you enter and the links you click. The content and comment information you browse and publish, the picture information you upload, your transaction information, the language you use, the date and time of your visit, and the web page records you requested, operating system, software version number, and login IP information.


Article 2 Information release function. After you register as a user of this site, you can post questions, articles, or documents on the platform of this site, and you can also comment on and agree with other people's content. During this process, we may collect your device information, browser type, and log information.


Section 4 We may indirectly obtain your personal information from third parties.

 

Article 1 When you log in to this site with a third-party account (linkedin, Google, Facebook, etc.), you can choose to authorize this site on the premise that it meets the requirements of relevant laws and regulations. Read and obtain the public information (including nicknames and avatars) that you register, publish, and record on the third-party platform.

 

Article 2 This site needs your authorization to obtain the above information from a third party in order to remember your login identity as a user of this site, so as to provide you with better products and services. We will only collect and use your personal information within the scope of your authorization and consent. After you register or log in with a third-party account, your third-party account will be bound to the account on this site, but you can contact the administrator to cancel the account binding by posting on the site.


Section 5 Sensitive Information Before providing any sensitive personal information to or on this site, please consider clearly that such provision is appropriate and agree that your personal sensitive information can be used according to the purposes and purposes stated in this policy. way to process.
After obtaining your consent, we will collect and use your sensitive information to realize the functions related to the business of this site, and allow you to choose not to agree to the collection and use of these sensitive information, but refusing to use this information will affect You use related functions.


Section VI Exceptions to Obtaining Authorized Consent


According to relevant laws and regulations, in the following situations, we may collect and use some necessary personal information without your authorization and consent:

Article 1 is directly related to national security and national defense security;

Article 2 Directly related to public security, public health, and major public interests;

Article 3 is directly related to criminal investigation, prosecution, trial, and execution of judgments;

Article 4 is for the protection of your or other personal life, property and other major legal rights and interests However, it is difficult to obtain the consent of the individual; the personal information collected in Article 5 is disclosed to the public by you;

Article 6 collects your personal information from legally disclosed information, such as from legal news reports, Government information disclosure and other channels;

Article 7 Necessary for signing and performing contracts according to your requirements;

Article 8 Necessary for maintaining the safe and stable operation of products and services on this site, such as discovering and handling product or service failures ;

Other circumstances stipulated in Article 9 laws and regulations.

 

Section 8 Objection


If you have any questions about the legal basis for our collection and use of your personal information or need to provide further information, please contact us through the contact information provided in the "How to Contact Us" section.


Chapter 3 How We Share, Transfer, and Publicly Disclose Your Personal Information


Section 1 Sharing Your Personal Information


Article 1 We will not share your personal information with any company, organization or individual, except in the following cases:
• Obtain your explicit authorization or consent in advance: After obtaining your explicit consent, we will share your personal information with other parties;
• Sharing under statutory circumstances: Your personal information needs to be shared according to applicable laws and regulations, legal procedures, government mandatory orders or judicial rulings;
• To the extent required or permitted by law, it is necessary to provide your personal information to a third party in order to protect the interests, property or safety of this site and its users or the public from damage;
• Sharing with authorized partners: In order to provide you with more complete and high-quality products and services, some of our services will be provided by authorized partners. We may share some of your personal information with our partners to provide better customer service and user experience. For example, when this site sends you a gift, this site needs to share your personal information with the logistics service provider to arrange delivery. We will only share your personal information for legal, legitimate, necessary, specific, and clear purposes, and will only share personal information necessary to provide services. At the same time, we will sign strict confidentiality agreements with our partners, requiring them to process your personal information in accordance with our instructions, this policy and any other relevant confidentiality and security measures. Our partners have no right to use the shared personal information for any other purpose. If you refuse our partners to collect personal information necessary to provide services, you may not be able to use the third-party services on this site.

Currently, our authorized partners include the following types:
Authorized partners for advertising and analysis services. Unless we have your permission, we will not share your personally identifiable information (information that can identify you, such as your name or email address) with partners who provide advertising and analysis services. We may provide advertising partners with information about the reach and effectiveness of their advertising without providing your personally identifiable information, or we may anonymize this information so that it does not personally identify you.

 

Section 2 Transfer Unless we obtain your explicit consent, we will not transfer your personal information to any company, organization or individual.

 

In the event of organizational mergers that may involve the transfer of personal information, we will require the new company or organization that holds your personal information to continue to be bound by this policy. If there is any change in the collection and processing of personal information stipulated in this policy, the company or organization will seek your authorization again.

 

Section 3 Public Disclosure Unless we obtain your explicit consent, we will not publicly disclose your personal information.


Based on laws, legal procedures, lawsuits or mandatory requirements of government authorities, we may disclose your personal information to competent authorities. However, we guarantee that when the above situation occurs, we will require the disclosure requesting party to issue corresponding valid legal documents and take security protection measures that comply with laws and industry standards for the disclosed information.


Section 4 Exceptions to Authorized Consent for Sharing, Transferring, and Publicly Disclosing Personal Information


According to relevant laws and regulations, we may share, transfer and publicly disclose your personal information without your authorization and consent in the following situations:


The first article is related to national security and national defense security; the second article is related to public security, public health, and major public interests; Safeguarding your or other individuals' life, property and other major legitimate rights and interests but it is difficult to obtain the consent of the individual;

 

Article 5 Personal information that you disclose to the public;

 

Article 6 Personal information collected from legally disclosed information Such as legal news reports, government information disclosure and other channels. Article 7 Other circumstances stipulated by laws and regulations.


According to the law, sharing and transferring personal information that has been de-identified and ensuring that the data recipient cannot restore and re-identify the subject of personal information is not an act of external sharing, transfer and public disclosure of personal information. Storage and processing will not require further notice to you and your consent.


Chapter 4 How We Protect Your Personal Information


The security of your personal information is very important to us. We will strictly abide by relevant laws and regulations, and take reasonable and feasible measures recognized by the industry to protect your personal information. Prevent information from unauthorized access, disclosure, use, modification, damage or loss of information. The mainframe of this site is equipped with firewalls, anti-virus systems and other related information security equipment and necessary security protection measures to protect the site and your personal data. Strict protection measures are adopted, and only authorized personnel can access your personal data. Information, the relevant processing personnel have been informed that the information must be kept confidential, and those who violate the confidentiality obligation will be subject to relevant laws or suspension.


Section 1 Technical Measures and Data Security Measures We strive to adopt various physical, electronic and management security measures that meet industry standards to protect the security of your personal information. We actively establish a data classification and grading system, data security management norms, and data security development norms to manage and regulate the storage and use of personal information to ensure that no personal information irrelevant to the services we provide is collected.
We implement comprehensive security control over data by signing confidentiality agreements with information contacts, monitoring and auditing mechanisms. Protect your personal information from unauthorized access, public disclosure, use, modification, damage or loss.


We have adopted industry-standard security measures to protect the personal information you provide to prevent unauthorized access, public disclosure, use, modification, and data damage or loss. We will take all reasonable and feasible measures to protect your personal information. For example, when exchanging data (such as credit card information) between your browser and this site, it is protected by SSL encryption; we also provide https secure browsing methods for the websites appearing in the "Introduction" of this policy; we will use encryption technology to ensure data security. Confidentiality; we will use trusted protection mechanisms to prevent data from being maliciously attacked; we will deploy access control mechanisms to ensure that only authorized personnel can access personal information; and we will hold security and privacy protection training courses to strengthen the protection of authorized personnel Awareness of the importance of protecting personal information.

 

Section 2 Handling of Security Incidents
We will try our best to ensure the security of any information you send us, but please understand that due to technical limitations and various malicious means that may exist in the Internet industry, it is impossible to always guarantee 100% security of information. You need to understand that the systems and communication networks you use to access our services may have problems due to factors beyond our control. In order to prevent the occurrence of safety accidents, we have developed a proper early warning mechanism and emergency plan. In the unfortunate event of a personal information security incident, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, and suggestions for you to prevent and reduce risks independently And your remedial measures, and immediately start the emergency plan, and strive to minimize the loss. We will promptly inform you of the relevant situation of the incident by means of phone calls, push notifications, etc., and when it is difficult to inform users one by one, we will issue announcements in a reasonable and effective manner.
Chapter V Your right to manage personal information
We attach great importance to your concern about personal information, and do our best to protect your rights to access, correct, delete and withdraw your consent to your personal information, so that you have sufficient ability to protect your privacy and security. Your rights include:

 

Section 1 Access and Correction of Your Personal Information

Article 1 Except as stipulated by laws and regulations, you have the right to access and correct your personal information at any time, including:
• You can access or modify your email information through [Personal Settings→Email];
• You can contact the administrator to modify or cancel your bound third-party account by posting on the site;
Article 2 If you need to review other personal information generated during your use of this site, we will provide it to you upon reasonable request. If you cannot access or correct your personal information through the above methods, you can also contact us by posting on the website. We will respond to your access request within 30 days.
Section 2 Cancellation of your account If you need to cancel your account on this site, you can email us and request to cancel your account on this site. We will provide you with account cancellation service after verifying your identity and cleaning up the assets in the account. In order to provide you with a more convenient way to log out, we will continue to optimize our products in the future and inform you through page announcements. After canceling the account, we will stop providing you with products or services, and delete your personal information according to your request, unless otherwise stipulated by laws and regulations.
Section 3 Obtain a copy of your personal information You have the right to obtain a copy of your personal information, you can contact us by email us, and we will process your request within 30 days.
Section 4 Response to your above request To ensure safety, we may ask you to verify your identity before processing your request. You may be required to provide a written request, or otherwise identify yourself. For your request, we will reply within 30 days in principle.


For your reasonable request, we do not charge fees in principle, but for repeated requests that exceed reasonable limits, we will charge a certain cost depending on the circumstances. We may deny requests that are unnecessarily repetitive, require excessive technical means (for example, requiring the development of new systems or fundamental changes to existing practices), pose a risk to the legitimate rights and interests of others, or are highly impractical.

 

In the following situations, in accordance with the requirements of laws and regulations, we will not be able to respond to your request: Article 1 is directly related to national security and national defense security; Article 2 is directly related to public security, public health, and major public interests; Article 3 Article 5 is directly related to criminal investigation, prosecution, trial, and execution of judgments; Article 4 has sufficient evidence to show that you have subjective malice or abuse of rights; Article 5 Responding to your request will result in legitimate rights and interests of you or other individuals or organizations seriously damaged; Article 6 involves commercial secrets.


Chapter VI Notices from us


Section 1 Notifications and other types of communications When you use the services of this site, we may use your personal information to send push notifications to your device.

Section 2 Service-related announcements We may issue some service-related announcements to you from time to time when we deem it necessary (for example, when we suspend the service of this site for maintenance). You may not cancel these service-related announcements that are not promotional in nature.


Chapter VII Storage of your personal information


Our servers are stored in Canada. If we cease operations due to poor management or other reasons, we will immediately stop collecting your personal information and delete the collected personal information. We will announce this situation on the website or convey it to each user one by one by in-site letter, email and other reasonable means.


Chapter 8 How We Use Cookies and Other Tracking Technologies


When you use our services, we will store a small data file called Cookie on your computer or mobile device. Cookies usually contain identifiers, site names and some numbers and characters. We use this information to determine whether a registered user has logged in, improve service product quality and optimize user experience. If you do not want your personal information to be stored in cookies, you can configure your browser to choose to disable the cookie function. After disabling the cookie function, it may affect your access to this site or you may not be able to fully obtain the services provided by this site.
We will not use cookies for any purpose other than those stated in this policy. You can manage or delete cookies according to your own preferences. You can clear all cookies saved on your computer, and most web browsers have the function of blocking cookies.


Chapter IX Policy Update and Dispute Resolution


Section 1 How to update and modify this policy

 

Article 1 This policy is an important part of the "User Agreement of this site". This site reserves the right to update or modify this policy from time to time.

 

Article 2 Without your explicit consent, we will not reduce your rights under this policy. We will notify you in reasonable ways such as push notifications and pop-up windows, so that you can keep abreast of any changes made to this policy.

 

Article 3 For major changes, depending on the specific circumstances, we may also provide a more prominent notice explaining the specific changes in this policy. Significant changes include, but are not limited to:
• Significant changes to our service model. Such as the purpose of processing personal information, the type of personal information processed, the way of using personal information, etc.;
• We have made significant changes in ownership structure, organizational structure, etc. Such as changes in owners caused by business adjustments, bankruptcy mergers, etc.;
• Changes in the main objects of personal information sharing, transfer or public disclosure;
• Significant changes to your rights to participate in the processing of personal information and how to exercise them;
• Changes in our responsible departments, contact methods and complaint channels responsible for handling personal information security;
• When the personal information security impact assessment report indicates that there is a high risk.


Article 4 If you do not agree to the revised privacy policy, you have the right and should stop using the services of this site immediately. If you continue to use the services of this site, you will be deemed to accept the changes made by this site to the relevant terms of this policy.


Section 1 How to Contact Us When you have any questions about this policy, you can consult by email, and we will solve your problems in time. Normally, we will reply within thirty days.


Section 2 Dispute Resolution Article 1 Any disputes you have on this site have nothing to do with this site. Article 2 For any dispute arising from this policy and our handling of your personal information, you may complain to the relevant department. Article 3 If you think that our personal information processing behavior has damaged your legitimate rights and interests, you can also report it to the relevant government department.


Appendix: Explanation of terms The terms used in this privacy protection guideline have the following definitions in the usual sense:
1. Personal information: Personal information refers to various information recorded electronically or in other ways that can identify the personal identity of a natural person alone or in combination with other information, including but not limited to the name of the natural person, date of birth, ID number, personal biometric information, address, phone number, etc.

2. Sensitive personal information: Sensitive personal information refers to personal information that, if leaked, illegally provided or misused, may endanger personal and property safety, easily lead to damage to personal reputation, physical and mental health, or discriminatory treatment. For example, personal sensitive information includes ID number, personal biometric information, bank account number, communication content, health and physiological information, etc.

3. Equipment: equipment refers to devices that can be used to access the products, programs and services of this site, such as desktop computers, laptops, tablet computers or smart phones.

4. Unique Device Identifier: A Unique Device Identifier (Unique ID or UUID) is a string of characters programmed into a device by the device manufacturer that can be used to uniquely identify the corresponding device (such as the IMEI number of a mobile phone). Unique device identifiers are used in a number of ways, including serving advertisements when cookies cannot be used, such as in mobile applications.

5. IP address: Each device connected to the Internet is assigned a number called an Internet Protocol (IP) address. These numbers are usually assigned by geographic area. An IP address is often used to identify where a device is located when it is connected to the Internet.

6. SSL: SSL (SecureSocketLayer), also known as Secure Socket Layer, is a security protocol implemented on the transmission communication protocol (TCP/IP). SSL supports various types of networks and provides three basic security services at the same time, all of which use public key and symmetric key technology to achieve the effect of information confidentiality.
7. Information collection technology: "Automatic collection" includes the following methods: Cookie (cookie file) A cookie is a small file that the website server places on the client (in your computer, mobile phone or other smart terminal) when you browse the web. A small text file, when you visit the corresponding website again, the website can recognize your browser through the cookie. Cookies may store user preferences and other information. You can configure your browser to refuse all cookies or to display a reminder when a website sends a cookie. However, some website features or services may not work properly without cookies. B. Webbeacon (web beacon) Webbeacon is an electronic image file or other technology embedded in a website or email, which can be used to count the number of visitors, record whether and when you browse the email or website, or use certain cookies . C. Logfiles (log files) Logfiles store some data collected automatically. Such data includes Internet Protocol (IP) addresses, browser type, Internet Service Provider (ISP), referring/exit pages, operating system, date/time stamp, and clickstream data, among others. D. ETTag (Entity Tag) ETTag is an HTTP protocol header transmitted between the Internet browser and the Internet server. It can replace cookies to track individual users, so that we can understand and improve our services more deeply. E. JavaScript JavaScript is a programming language used to make more interactive and dynamic web pages. JavaScript can set cookies, read cookies and delete cookies.
8. Affiliated company: refers to any company or institution controlled, controlled or under joint control by a party now or in the future. "Control" means the possession, directly or indirectly, of the ability to affect the management of the company in question, whether through ownership, voting shares, contracts, or otherwise as legally determined.
9. Algorithm: A process or a series of rules that a computer follows when performing a problem-solving operation.
10. Application data cache: Application data cache refers to a data storage mechanism on the device. There are many benefits to using it, such as allowing web apps to run without an internet connection and improving the performance of related apps by making content load faster.
11. Browser-based web storage: The "browser-based web storage" mechanism allows websites to store data in the browser on the device. If the mechanism is used in "local storage" mode, data can be stored across sessions. This way, the data is still available to the user even after closing and reopening the browser. One of the technologies that will help enable web storage is HTML5.
12. Account: As long as you register an account and provide us with some personal information (as described in Section 1 of this guideline), you can use our services. When you use the services of this site, the system will use these account information to authenticate you to prevent unauthorized personnel from accessing your account.
13. Non-personally identifiable information: information that is recorded and related to users, but actually cannot directly or indirectly identify you, including personal information that has been de-identified, anonymized, or provided under a pseudonym.
14. De-identification: refers to the process of technically processing personal information to make it impossible to identify the subject of personal information without additional information.
15. Anonymization: refers to the process of technically processing personal information so that the subject of personal information cannot be identified, and the processed information cannot be restored.
16. Server logs: Like most websites, our servers automatically record the webpage requests you make when you visit the website. These "server logs" typically include your web request, Internet Protocol address, browser type, browser language, date and time of your request and one or more cookies that can uniquely identify your browser.

 

::
/ ::

Queue

Clear