Privacy Policy
This policy only applies to Task Work products. Last updated: August 1, 2024
This policy will help you understand the following:
1. How we collect and use your user information
2. How we use cookies and similar technologies
3. How we share, transfer, and publicly disclose your user information
4. How do we protect your user information
5. Your rights
7. How to update this policy
8. How to contact us
We are fully aware of the importance of user information to you and will do our best to protect the safety and reliability of your user information. We are committed to maintaining your trust in us and abiding by the following principles to protect your user information: the principle of consistency of rights and responsibilities, the principle of clear purpose, the principle of choice and consent, the least sufficient principle, the principle of ensuring security, the principle of subject participation, the principle of openness and transparency, etc. . At the same time, we promise that we will take corresponding security protection measures to protect your user information in accordance with mature security standards in the industry.
Please read and understand this privacy policy carefully before using our products (or services).
1. How we collect and use your user information
(1) Information we collect and use when you use our products or services
We will only collect and use your user information for the business functions described in this policy. The purpose of collecting user information is to provide you with products or services. You have the right to make your own choices. Whether to provide this information, but in most cases, if you do not provide it, we may not be able to provide you with corresponding services or respond to your questions:
When you use our services, we are allowed to collect the information you authorize us to include: personal account information, IP address, etc.
For the user information we collect, we will use it to provide you with information browsing, publishing, collection, following, sharing, etc.
The above information you provide will continue to be authorized for our use during your use of this service. When you stop using the push service, we will stop using and delete the above information.
We guarantee that the collected user information will be de-identified or anonymized in accordance with the law. Information that cannot be used to identify a natural person alone or in combination with other information does not belong to the legal sense. personal information. If we combine non-personal information with other information to identify you personally, or use it in combination with your personal information, we will treat such information as your personal information in accordance with this Privacy Policy during the combined use period. Process and protect.
In order to better operate and improve our technology and services, or due to changes in business strategies, when the collection, use, and processing of user information required for the products or services we provide exceed the above Scope or use the collected user information for other purposes not specified in this privacy policy, or when we want to use the information collected for a specific purpose for other purposes, we will use the user information within a reasonable period after obtaining the user information. Notify you before entering or processing user information, and obtain your authorization and consent.
(2) Exceptions with authorization and consent
Please understand that in accordance with laws, regulations and relevant national standards, we do not need to obtain your authorization to collect and use your user information in the following situations:
1. Directly related to national security and national defense security;
2. Directly related to public security, public health, and major public interests;
3. Directly related to criminal investigation, prosecution, trial and judgment execution;
4. To protect your or other individuals' life, property and other major legitimate rights and interests but it is difficult to obtain my consent; p>
5. Your user information collected is disclosed to the public by you;
6. Your user information collected from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels;
7. Necessary to sign or perform a contract according to your requirements;
8. Necessary to maintain the safe and stable operation of software and related services, such as discovering and handling faults in software and related services; p>
9. The controller of personal information is a news unit and it is necessary for it to carry out legitimate news reports;
10. When it is necessary for an academic research institution to conduct statistical or academic research based on the public interest and provide the results of academic research or description to the outside world, it will not treat the individuals included in the results. The information is de-identified.
11. Other situations stipulated by laws and regulations.
2. How we use cookies and similar technologies
(1) Cookie
To ensure that the website functions properly, we store small data files called cookies on your computer or mobile device. Cookies Usually contains an identifier, site name, and some numbers and characters. With the help of cookies, websites can store data about your access preferences.
We will not use Cookies for any purpose other than those stated in this policy. You can manage or delete cookies according to your preferences. You can clear all the files saved on your computer Cookies, most web browsers have the function to block cookies. However, if you do this, you will need to change your user settings yourself each time you visit our website.
(2) Website beacons and pixel tags
Except Cookies In addition, we will also use other similar technologies such as web beacons and pixel tags on our website. For example, emails we sent you may contain click URLs linked to content on our website.
If you click this link, we will track this click to help us understand your product or service preferences and improve customer service. A web beacon is typically a transparent image embedded into a website or email. With the help of pixel tags in emails, we can learn whether the emails have been opened. If you do not want your activities to be tracked in this way, you can unsubscribe from our mailing list at any time.
(3) Do Not Track
Many web browsers have a Do Not Track function, which can issue Do Not messages to websites. Track request. Currently, the major Internet standards organizations have no policies in place that govern how websites should respond to such requests. However, if your browser has Do Not Track enabled, all of our sites will respect your choice.
3. How we share, transfer, and publicly disclose your user information
(1) Sharing
We will not share your user information with any other company, organization or individual, except in the following circumstances:
1. Sharing with explicit consent: After obtaining your explicit consent, we will share your user information with other parties.
(2) Transfer
We will not transfer your user information to any company, organization or individual, except in the following circumstances:
1. Transfer with explicit consent: After obtaining your explicit consent, we will transfer your user information to other parties;< /p>
2. When it comes to mergers, acquisitions or bankruptcy liquidations, if user information is transferred, we will require new companies and organizations that hold your user information to continue to be bound by this privacy policy. Otherwise, we will require the company or organization to seek your authorization and consent again.
(3) Public disclosure
We will only publicly disclose your user information under the following circumstances:
1. After obtaining your explicit consent;
2. Disclosure based on law: We may publicly disclose your user information when required by law, legal proceedings, litigation or government authorities. .
(4) Exceptions to obtaining prior authorization and consent when sharing, transferring, or publicly disclosing information
Please understand that in accordance with laws, regulations and relevant national standards, we do not need to obtain your authorization to share, transfer, or publicly disclose your user information in the following circumstances: :
1. Directly related to national security and national defense security;
2. Directly related to public security, public health, and major public interests;
3. Directly related to criminal investigation, prosecution, trial and judgment execution;
4. To protect your or other individuals' life, property and other major legitimate rights and interests but it is difficult to obtain my consent; p>
5. Information you disclose to the public on your own;
6. Collected from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels.
4. How do we protect your user information
(1) We have used security protection measures that comply with industry standards to protect the user information you provide and prevent data from unauthorized access, public disclosure, and use , modified, damaged or lost. We will take all reasonable and feasible measures to protect your user information. For example, the exchange of data between your browser and the Service is subject to SSL Encryption protection; we also provide https secure browsing for the website; we will use encryption technology to ensure data confidentiality; we will use trusted protection mechanisms to prevent data from malicious attacks; we will deploy access control mechanisms to ensure that only authorized personnel User information can only be accessed; and we will hold security and privacy protection training courses to enhance employees' awareness of the importance of protecting user information.
(2) We will take all reasonable and feasible measures to ensure that no irrelevant user information is collected. We will only retain your user information for the period necessary to achieve the purposes stated in this policy, unless an extension of the retention period is required or permitted by law.
(3) The Internet is not an absolutely secure environment, and emails, instant messaging, and communication with other users are not encrypted. We strongly recommend that you do not use User information is sent in this way.
(4) After an unfortunate user information security incident occurs, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the measures we have taken or Disposal measures to be taken, suggestions for you to prevent and reduce risks on your own, remedial measures for you, etc. We will promptly notify you of the incident-related information through emails, letters, phone calls, push notifications, etc. When it is difficult to inform the user information subjects one by one, we will issue announcements in a reasonable and effective manner. At the same time, we will also proactively report the handling of user information security incidents in accordance with the requirements of regulatory authorities.
5. Your rights
In accordance with Singapore’s relevant laws, regulations, standards, and common practices in other countries and regions, we guarantee that you can exercise the following rights over your user information:
(1) Access your user information
You have the right to access your user information, except for exceptions provided by laws and regulations. If you would like to exercise your rights to data access, you can always use our web Contact form, or email zhuce77777@outlook.com. We will respond to your access request within 30 days.
(2) Correct your user information
When you find errors in the user information we process about you, you have the right to ask us to make corrections. You can apply for correction through the methods listed in "(1) Access to your user information". If you are unable to correct this user information via the link above, you can always contact us using our web form or email zhuce77777@outlook.com. We will respond to your correction request within 30 days.
(3) Delete your user information
In the following situations, you can make a request to us to delete user information:
1. If our handling of user information violates laws and regulations;
2. If we collect and use your user information without your consent;
3. If our handling of user information violates our agreement with you;
4. If you no longer use our products or services, or you cancel your account;
5. If we no longer provide you with products or services.
We will evaluate your deletion request and if it meets the corresponding requirements, we will take appropriate steps to process it. When you make a deletion request to us, we may ask you for identity verification to protect the security of your account. When you delete information from our services, we may not immediately delete the corresponding information from the backup system due to applicable laws and security technologies. We will securely store your information until the backup can be cleared or anonymized.
(4) Change the scope of your authorization
Each business function requires some basic user information to be completed (see "Part 1" of this policy). You can give or withdraw your authorization consent at any time for the collection and use of user information. You can operate by yourself in the following ways: Send an email to: zhuce77777@outlook.com When you withdraw your consent, we will no longer process the corresponding user information. At the same time, please note that your withdrawal of authorization consent may lead to certain consequences. For example, we may not be able to continue to provide you with corresponding services or specific functions. However, your decision to withdraw your consent will not affect the previous activities based on your authorization. processing of user information.
(5) User information subject cancels account
You can cancel the previously registered account at any time. You can do this in the following ways: Send an email to: zhuce77777@outlook.com
After canceling your account, we will stop providing you with products or services and delete or anonymize your information based on your request, unless otherwise provided by laws and regulations. This may also cause you to lose access to the data in your account, so please proceed with caution.
(6) Constraint information system automatic decision-making
In certain business functions, we may only make decisions based on non-artificial automatic decision-making mechanisms including information systems, algorithms, etc. If these decisions significantly affect your legitimate rights and interests, you have the right to ask us for an explanation, and we will also provide appropriate relief.
(7) Respond to your above request
To ensure security, you may be required to provide a written request or otherwise prove your identity. We may ask you to verify your identity before processing your request.
8. How to update this policy
Our privacy policy may change. We will not reduce your rights under this Privacy Policy without your explicit consent. We will post any changes to this policy on this page.
For major changes, we will also provide more prominent notifications. Major changes referred to in this policy include but are not limited to:
1. Our service model has undergone major changes. Such as the purpose of processing user information, the type of user information processed, the use of user information, etc.;
2. We have undergone major changes in ownership structure, organizational structure and other aspects. Such as changes in owners caused by business adjustments, bankruptcy mergers, etc.;
3. The main object of user information sharing, transfer or public disclosure changes;
4. Significant changes in your rights to participate in the processing of user information and the way you exercise them;
5. When our responsible departments, contact information and complaint channels for handling user information security change;
6. When the user information security impact assessment report indicates that there is a high risk.
We will also archive older versions of this policy for your review.
9. How to contact us
If you have any questions, comments or suggestions about this privacy policy, please contact us through the following methods:
Email: zhuce77777@outlook.com
We have set up a dedicated department for user information protection. You can contact the relevant personnel through the following methods: zhuce77777bak@outlook.com
Generally, we will respond within thirty days.