First, the information we collect Non-identity information When you use the Cashock products and services, we may collect information such as the source of the user, the order of access, and so on. For example, record the source path of each user, browser information, and so on. 2. Registration information When you use the Cashock registration service, we may collect your personal registration information, such as: personal identification (including ID card, passport, driver's license, etc.), birthplace, gender, personal mobile number, network identity (including account number, IP address, email address, and password, password protection information, password, password protection information, etc. related to the foregoing. 3. Use product equipment information When you use the Cashock product, we may collect your device information (including device model, device MAC address, operating system type, device settings, etc.), software list unique device identifier (such as IMEI/android ID/IDFA/OPENUDID) /GUID, SIM card IMSI information, etc., describing the basic information of personally used devices). 4. Product related information When you use the Cashock product, we may collect and aggregate information about your game's virtual currency, game balance, game type, game history, and more.
Second, how do we collect and use information Information you provide a. Information you provide to us when you register your Cashock product service account or use the Cashock product service; b. The shared information that you provide to other parties through the Cashock product, and the information that you stored when you used the Cashock product; c. your information shared by other parties; d. We obtain information about your use of the Cashock product or service. Such as: log information, device information, network information, and so on.
We collect and use your information for the following purposes: 1. Help you complete registration quickly In order for us to provide you with services, you will need to provide basic registration information, such as personal identification, mobile phone number, etc., and create your username and password. 2. Notify you We may send you notices about the service when necessary (such as suspension, maintenance, etc.) so that you can better understand the status of our services. 3. Improve our services We may use the information collected by a Cashock product for our other products. We may ask you to participate in a survey of Cashock products to help us improve our existing products and services or design new products and services. 4. Provide you with security In order to ensure the authenticity of your identity and provide you with better security, you can provide us with sensitive personal information such as identification to complete the real name certification. In addition to authentication, we may use your information for customer service, security, fraud monitoring, archiving, and backup purposes to ensure the security of the services we provide to you; we may use or integrate the information we collect about you. Information, as well as our partners to obtain information that you authorize or share in accordance with the law, to comprehensively determine your account, conduct authentication, detect and prevent security incidents, and take necessary records, audits, analysis, disposal and other measures.
Fourth, we protect and deal with your information 1. Data security technical measures a. We will adopt security measures that comply with industry standards, including the establishment of reasonable system specifications and security technologies to prevent unauthorized access and modification of your information, and to avoid data corruption or loss; b. Network services adopt a variety of encryption technologies, such as SSL, TLS and other encryption technologies to protect your information; c. and isolate by isolation technology; d. When using information, such as information display, information correlation calculation, we will use a variety of data desensitization technology to enhance the security of information in use. Protect data with strict data access control and multiple authentication technologies to prevent data from being used in violation. 2. Other security measures taken to protect information a. Manage the storage and use of regulatory information by establishing data classification and classification systems, data security management specifications, and data security development specifications; b. Comprehensive security control of data through information contact confidentiality protocols, monitoring and auditing mechanisms; c. Strengthen safety awareness. We also conduct security and privacy protection training courses to enhance employees' awareness of the importance of information protection. 3. Only allow the necessary personnel to know the information and ensure that the person is not recorded and saved. A strict access control and monitoring mechanism is set for this purpose. We also require all personnel who may be exposed to your information to perform the appropriate confidentiality obligations. If these obligations are not fulfilled, they will be held liable. 4. We will take all reasonable and feasible measures to ensure that no irrelevant information is collected.
Minor restrictions Any minor who participates in an online activity should obtain the prior consent of the parent or his legal guardian. We will protect the relevant information of minors and enforce relevant restrictions in accordance with the relevant laws and regulations of the country.