Foreword

Dear MiaoKe Vocational Education users: MiaoKe Vocational Education has updated the "Privacy Agreement", please read this "Privacy Agreement" carefully and make sure to understand MiaoKe Vocational Education's rules for handling users' personal information. During the reading process, if you have any questions, you can contact the customer service of MiaoKe for consultation; if you do not agree with any terms in the "Privacy Agreement", you should immediately stop using or visit the relevant services and websites of Miaotong.

Last updated:
Effective date:

Privacy Policy

The security of your personal information is of the utmost importance to MiaoKe Vocational Education ("we"). We will take appropriate measures to protect the security and control of your personal information in accordance with the requirements of laws and regulations. Based on the above purposes, we have formulated this "Privacy Agreement" and made the following reminders to you:

When you use our products or services, we may collect and use your relevant information. We hope to explain to you through this Privacy Policy how we collect, use, save, share and transfer this information when you use our products or services, and how we provide you with access, update, deletion and protection of this information.

This privacy agreement is closely related to the related services you use and the various business functions included in the services (hereinafter collectively referred to as "our products or services"). I hope you read and confirm carefully before using our products or services. You have fully understood the content written in these terms and allowed you to make the choices you deem appropriate in accordance with the guidelines of this privacy agreement. If you use or continue to use our products or services after we update this privacy agreement (we will prompt you to update in a timely manner), it means that you agree to the content of this privacy agreement (including the updated version) and agree that we will follow this privacy agreement. Collect, use, save and share information about you.

We promise to keep your personal information and other data strictly confidential, and handle your personal information strictly in accordance with the content set forth in this Privacy Policy. We collect, use, store, share and transfer your personal information based on your consent and other legal basis for processing your personal information.

1. Definition

1.1 Personal information: Personal information refers to various information recorded electronically or in other ways that can identify a specific natural person or reflect the activities of a specific natural person alone or in combination with other information, including but not limited to the natural person's name, date of birth, and ID number. , personal biometric information, address, phone number, etc.

1.2 Personal Sensitive Information: Sensitive personal information refers to personal information that, once leaked, illegally provided or abused, may endanger personal and property safety, easily lead to damage to personal reputation, physical and mental health, or discriminatory treatment. For example, personal sensitive information includes home address, personal biometric information, bank account number, communication content, health physiological content, etc.

2. our legal basis for processing personal information

If you are a user in the mainland of the People's Republic of China, we will comply with the Personal Information Protection Law of the People's Republic of China, the Cybersecurity Law of the People's Republic of China, and the Personal Information Security Specification for Information Security Technology (GB / T35273-2020) and its related laws and regulations to collect and use your personal information to provide you with products and services related to the workplace. We will generally only collect your personal information with your consent or where personal information may be required to protect your vital interests or the interests of others.

3. How we use your personal information

3.1 We will only consider the purpose of realizing the functions of products and services, and collect and use your personal information in accordance with the principles of legality, legitimacy and necessity.

3.2 If we use the information for other purposes not specified in this policy or information collected for a specific purpose for other purposes, we will notify you in a reasonable manner and ask for your prior consent.

3.3 We collect your information to provide you with personalized products or services and a better course experience. Some of our services may require you to provide certain personal sensitive information to achieve certain functions. If you choose not to provide such information, you may not be able to use certain functions in the service normally, but it will not affect your use of other functions in the service. If you voluntarily provide your personal sensitive information, you agree that we will process your personal sensitive information in accordance with the purposes and methods described in this policy.

3.4 When you use our products or services, you need to log in through a third-party linked account, and we will ask the third party to provide your account nickname, avatar, account number, gender and other information; and we need you to provide your mobile phone number to bind your learning qualifications. If you refuse to provide the above information, you will not be able to use our products or services.

3.5 When you participate in our activities, fill out user questionnaires, online teaching assistants answer questions and other questions, we may collect your name, phone number, address, educational background, occupation, working years and other information from you, receive and record your browsing device-related information such as computers and mobile devices, including:

  1. Device information such as device model, operating system version, device settings, unique device identifier and other software and hardware feature information;
  2. Location information obtained through GPS, Bluetooth or WIFI signal access point, Bluetooth and base station sensor information;
  3. When you use the products or services provided by our website or client, we will automatically collect your detailed usage of our products or services and save them as relevant web logs.

3.6 When you purchase a course for payment, we will collect your third-party payment account (such as Alipay account, WeChat account, ApplePay account or other forms of bank card information). We will not collect your fingerprint or facial image for verification, and your original fingerprint image will only be stored on the device you authorize to collect fingerprints.

4. How do we share, transfer and publicly disclose your personal information

4.1 Sharing

We will not share your personal information with any third party companies, organizations and individuals, except in the following cases:

  1. With the express consent of you or your guardian, we will share your personal information with other parties;
  2. We may share your personal information externally in accordance with laws and regulations or the mandatory requirements of government authorities;
  3. Share your information with partners and other third parties in order to provide, maintain and improve our products or services;
  4. To the extent permitted by laws and regulations, we may exchange information with other companies and organizations in order to comply with the law, protect us and our affiliates or partners, you or other users or the public interest, property or safety from harm;
  5. We will only share your personal information for legal, legitimate, necessary, specific and explicit purposes, and only share personal information necessary to provide services. For the companies, organizations and individuals with whom we share personal information, we will conclude strict confidentiality agreements, requiring them to process personal information in accordance with our instructions, this Privacy Policy and any other relevant confidentiality and security measures, and have no right to share for any other purpose.

4.2 Transfer

We will not transfer your personal information to any companies, organizations and individuals, except in the following cases:

  1. With the express consent of you or your guardian, we will transfer your personal information to other parties;
  2. In the case of merger, acquisition or bankruptcy liquidation, if it involves the transfer of personal information, we will require the new company or organization that holds your personal information to continue to be bound by this Privacy Policy, otherwise we will require the company or organization to re-register You seek authorized consent.

4.3 Public disclosure

We will only publicly disclose your personal information in the following circumstances:

  1. With the express consent of you or your guardian;
  2. Disclosure by Law: We may publicly disclose your personal information in the event of mandatory requirements by law, legal process, litigation or government authorities.

4.4 Exceptions

You know and agree that we may share, transfer and publicly disclose personal information without your prior authorization and consent under the following circumstances:

  1. Directly related to national security and national defense security;
  2. Directly related to public safety, public health, and major public interests;
  3. Directly related to criminal investigation, litigation, arbitration, and enforcement of judgments;
  4. For the protection of your or other personal life, property and other major legitimate rights and interests, but it is difficult to obtain my consent;
  5. Your personal information disclosed to the public by yourself;
  6. Collect personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels.

5. How do we protect your personal information

The security of your personal information is of the utmost importance to us. We will strictly abide by relevant laws and regulations, and take reasonable and feasible measures recognized by the industry to protect your personal information. Protect information from unauthorized access, disclosure, use, modification, and avoid damage or loss of information.

5.1 Technical measures and data security measures

We endeavour to employ a variety of industry-standard physical, electronic and managerial security measures to keep your personal information safe. We actively establish a data classification and grading system, data security management specifications, and data security development specifications to manage and regulate the storage and use of personal information to ensure that no personal information unrelated to the services we provide is collected.

We exercise comprehensive security control over data through non-disclosure agreements, monitoring and auditing mechanisms with information contacts. Protect your personal information from unauthorized access, public disclosure, use, modification, damage or loss. We have used industry-standard security protection measures to protect the personal and information you provide, prevent data from unauthorized access, public disclosure, use, modification, and prevent data from being damaged or lost. We will take all reasonably practicable steps to protect your personal information.

5.2 Security Incident Handling

We will try our best to ensure the security of any information you send to us, but please understand that due to technical limitations and various malicious means that may exist in the Internet industry, it is impossible to always guarantee 100% security of information. You need to understand that the systems and communication networks you use to access our services may have problems due to factors beyond our control. In order to prevent the occurrence of safety accidents, we have formulated a proper early warning mechanism and emergency plan. In the unfortunate event of a personal information security incident, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, and your suggestions for self-prevention and risk reduction and remedies for you, and immediately activate contingency plans to minimize damage. We will promptly inform you of the relevant information of the event by telephone, push notification, etc. When it is difficult to inform users one by one, we will take a reasonable and effective way to make announcements.

At the same time, we will also actively report the handling of personal information security incidents in accordance with the relevant requirements of the regulatory authorities, and closely cooperate with the work of government agencies.

6. Your right to manage personal information

We will ensure that you exercise the following rights with respect to your personal information as described in this Agreement:

6.1 Access and correct your personal information, except for the special cases stipulated by laws and regulations, you have the right to access and correct your personal information.

6.2 Deletion of your personal information

In the following heights, you can make a request to us to delete personal information:

  1. If our handling of personal information violates laws and regulations;
  2. If we collect and use your personal information without your consent;
  3. If our processing of personal information violates our agreement with you;
  4. If you no longer use our products or services, or you re-register your account;
  5. If we no longer provide you with products or services.
When you delete information from our service, we may not delete the corresponding information from the backup system immediately, but will delete the information when the backup is updated.

6.3 Responding to your request

For security, you may be required to provide a written request or otherwise prove your identity. We may ask you to verify your identity before processing your request. We may refuse unreasonable repetitions that require too many technical means, risk to the legitimate rights and interests of others, or very unrealistic requests. In the following cases, we will not be able to respond to your request as required by laws and regulations:

  1. Directly related to national security and national defense security;
  2. Directly related to public safety, public health, or major public interests;
  3. Directly related to criminal investigation, litigation, arbitration, and enforcement of judgments;
  4. There is sufficient evidence that you have subjective malice or abuse of rights;
  5. Response to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations;
  6. Involving trade secrets.

7. How we use cookies and similar technologies

7.1. Cookies

To ensure the proper functioning of the website, we store small data files called cookies on your computer or mobile device. Cookies usually contain identifiers, site names and some numbers and characters, learning progress and other data. We will not use cookies for any purpose other than those described in this policy. You can manage or delete cookies according to your preferences. You can clear all cookies saved on your computer, and most web browsers offer the ability to block cookies. However, if you do this, you will need to change your user settings each time you visit our website. For more information on how to change your browser settings, please visit the relevant settings page for the browser you are using.

7.2 Web Beacons and Expected Tags

For example, an email we send you may contain an address link to the content of our website. If you click the link, we will track the first click to help us understand your product or service better and improve user service. A web beacon is usually a transparent image embedded in a website or email. Whether the email was opened. If you do not want your activity to be tracked in this way, you can unsubscribe from our mailing list at any time.

8. How do we protect the personal information of minors

If you are a minor under the age of 18, you should obtain the consent of your guardian in advance before using our products or services, and read this Privacy Policy with the guidance and guidance of the guardian. If we find that the personal information of minors under the age of 14 has been collected without the prior consent of the guardian, we will gradually delete the relevant data.

9. How to update and modify this Privacy Policy

9.1 This privacy agreement is an important part of the "MiaoKe Vocational Education User Service Agreement". The Second World Workplace reserves the right to update or modify this Privacy Policy from time to time.

9.2 We will not reduce your rights under this Privacy Policy without your express consent. We will notify you through reasonable means such as official account push notifications and pop-up windows, so that you can keep abreast of any changes made to this Privacy Policy.

9.3 If you do not agree to the revised privacy agreement, you have the right and should immediately stop using the services of the website. If you continue to use the services provided by the company, it is deemed that you accept the changes made by the company to the relevant terms of this privacy agreement.

10. How to contact us and resolve disputes

10.1 If you have any questions, comments or suggestions about this privacy agreement or related matters, you can contact MiaoKe at any time through the customer service hotline +86 400-990-9669.

10.2 If you believe that our personal information processing has harmed your legitimate rights and interests, you can also report to the relevant government departments.