This article is the Grek privacy agreement. In order to use Grek and its services, you should read and abide by this agreement. Please be sure to read carefully, fully understand the contents of each clause, and choose to accept or not accept it. Unless you have read and accepted all the terms of this agreement, you have no right to download, install or use this software and related services. Your downloading, installation, use, obtaining a Grek account, logging in, etc. are deemed to have read and agreed to be bound by the above agreement. If you are under 18 years old, please read this agreement with a legal guardian.
Information we collect
We only collect information necessary to implement product functions based on the principles of legality, legitimacy and necessity. Personal information refers to various information recorded electronically or in other ways that can identify a natural person's personal identity alone or in combination with other information, including but not limited to the natural person's name, date of birth, phone number, etc.
1. Information you actively provide when using our services
(1)The information you filled in when registering your account. For example, the username you entered when registering your account.
(2) Information you upload when using the service. For example, the avatar you upload when using software services.
(3) Information you submit through our customer service or when participating in events organized by us. For example, the questionnaire you fill out when participating in our online activities may include your name, phone number, etc. Some of our services may require you to provide specific personal sensitive information to implement specific functions. If you choose not to provide such information, you may not be able to use certain functions in the service normally, but this will not affect your use of other functions in the service. If you proactively provide your sensitive personal information, you agree that we will process your sensitive personal information in accordance with the purposes and methods described in this statement. Personal sensitive information refers to information that may endanger personal and property safety once leaked, illegally provided or misused. Personal information that can easily lead to damage to personal reputation, physical and mental health, or discriminatory treatment.
2. Information we obtain when you use the service
(1) Log information. When you use our services, we may automatically collect relevant information and store it as service log information.
(2) Equipment information. For example, device model, operating system version, unique device identifier, battery, signal strength and other information.
(3)Software information. For example, software version number, browser type. To ensure the security of the operating environment or as needed to provide services, we collect information about the mobile applications and other software you use.
(4) IP address. Every device that connects to the Internet is assigned a number called an Internet Protocol IP address. These numbers are usually assigned based on geographic areas. IP addresses can often be used to identify the location of a device when it connects to the Internet.
(5) Service log information. For example, the information you search for and view when using our services, service failure information, referral URLs and other information.
(6) Communication log information. For example, the accounts you have communicated with when using our services, the time and duration of communication.
How personal information is used
We strictly abide by the provisions of laws and regulations and agreements with users, and use the collected information for the following purposes. If we use your information beyond the following purposes, we will explain it to you again and obtain your consent.
1. Provide services to you.
2. Meet your personalized needs. For example, language settings, location settings, and personalized help services.
3. Product development and service optimization. For example, when our system fails, we will record and analyze the information generated by the system failure to optimize our services.
4. Safety and security. For example, we will use your information for identity verification, security prevention, anti-fraud monitoring, archiving backup, customer security services, etc. For example, security software you download or install can detect malicious programs or viruses, or identify scams for you.
5. Recommend advertisements, information, etc. that may be of interest to you.
6. Evaluate and improve the effectiveness of our advertising and other promotions and promotional activities.
7. Management software. For example, perform software certification, software upgrades, etc.
8. Invite you to participate in surveys about our services. In order to give you a better experience, improve our services, or for other purposes with your consent, we may use the information collected through certain services for our other services, subject to compliance with relevant laws and regulations. For example, the information you use when using one of our services will be used to display personalized content or advertisements to you in another service, and for user research analysis and statistics.
9. In order to ensure the security of the service and help us better understand the operation of our application, we may record relevant information, such as the frequency of your application use, fault information, overall usage, performance data and the source of the application. . We do not combine the information we store in our analytics software with the personally identifiable information you provide within the Application.
How cookies and similar technologies are used
In order to give you an easier access experience, we may use various technologies to collect and store data related to your visit during the use of products or services. We can identify you when you visit or visit again, and analyze it through Data provides you with better and more services. This includes using small data files to identify you. This is done to understand your usage habits, save you from repeatedly entering account information, or help determine the security of your account. These data files may be Cookies, Flash Cookies, or other local storage provided by your browser or associated applications.
Please understand that some of our services can only be achieved through the use of Cookies. If your browser or browser add-on services allow it, you can modify the acceptance of cookies or reject cookies. However, if you reject cookies, in some cases you may not be able to use some functions that rely on cookies.
How to manage personal information
1. You can access, modify and delete the login information and other personal information you provided during the use of our services, or you can contact us according to the notice guidelines. The scope and manner in which you can access, modify and delete your personal information will depend on the specific services you use. For example, if you want to stop sharing your geolocation information when using geolocation-related services, you can stop sharing by turning off the location function of your mobile phone, software and hardware service providers, and communication service providers. It is recommended that you read the relevant guidelines carefully. .
2. We will only collect and use your information to implement the functions of our products or services as described in this statement. If you find that we collect and use your personal information in violation of laws, administrative regulations or the agreement between the two parties, you can ask us to delete it. If you find that there are errors in your personal information that we collect and store, you can also ask us to correct it. Please contact us via the contact information listed in this statement.
3. When you access, modify and delete relevant information, we may ask you to perform identity verification to ensure the security of your account.
4. Please understand that due to technical limitations, legal or regulatory requirements, we may not be able to meet all your requirements, and we will respond to your requests within a reasonable period of time.
Information we share
We comply with laws and regulations and impose strict restrictions on the sharing of information, such as:
1. With your prior consent, we may share your personal information with third parties.
2. Only for the purpose of external processing, we may share your personal information with third-party partners, let them process the above information for us in accordance with our instructions, privacy statement and other relevant confidentiality and security measures, and use it for The following uses:
(1) Provide you with our services.
(2) Understand, maintain and improve our services. If we share your information with the above-mentioned third parties, we will use encryption, anonymization and other means to ensure the security of your information.
3. As our business continues to develop, when mergers, acquisitions, asset transfers and other transactions result in the sharing of your personal information with third parties, we will inform you of the relevant situations through push notifications, announcements, etc., in accordance with laws, regulations and irregularities. Continue to protect your personal information at standards lower than those required by this statement or require new managers to continue to protect your personal information.
4. We will use the collected information for big data analysis. We may disclose to the public and share with our partners statistically processed information that does not contain identifying content to understand how users use our services or to let the public understand the overall usage trends of our services.
5. We may disclose your personal information for the following purposes:
(1) Comply with applicable laws, regulations and other relevant provisions.
(2) Comply with court judgments, rulings or other legal procedures.
(3) Comply with the requirements of relevant government agencies or other legally authorized organizations.
(4) We have reason to believe that we need to comply with laws, regulations and other relevant regulations.
(5) Reasonable and necessary purposes to implement relevant service agreements or this statement, safeguard social and public interests, and protect the personal and property safety or other legitimate rights and interests of our customers, us or our affiliates, other users or employees.
Information security
We provide appropriate security safeguards for your information to prevent loss, improper use, unauthorized access or disclosure.
1. We strictly abide by laws and regulations to protect users’ communication confidentiality.
2. We will use various security protection measures within a reasonable security level to ensure the security of information. For example, we use encryption technology, anonymization and other means to protect your personal information.
3. We establish specialized management systems, processes and organizations to ensure information security. For example, we strictly limit who can access information, require them to comply with confidentiality obligations, and conduct reviews.
4. If a security incident such as personal information leakage occurs, we will activate an emergency plan to prevent the security incident from expanding, and inform you through push notifications, announcements, etc.
How to update this Agreement
We may revise this statement from time to time. If such changes will cause a substantial impairment of your rights under this statement, we will notify you by prominently placing a prompt on the page, sending you an email, etc. before the changes take effect. In this case, if you continue to use our services, you agree to be bound by the revised statement.
Contact us
If you have complaints or reports about the security of personal information, or if you have any comments or suggestions about this Privacy Agreement, matters related to your information, or questions about this statement or our privacy measures, please contact us through the "support@grek.com".