FOOTBALL ANT（And "we", "our" or "this app" mentioned below.）is composed of main body.The companypoxiao.Co. Ltd.The network product that offers
The product name：FOOTBALL ANT
If you decide to use the services provided by our products, this agreement shall inform us how to collect, use and disclose the privacy of users.
1. Collect information
We collect some or all of the information you provide to us, as well as data about your use of the website and applications, but we will mainly use the collected data to provide you with satisfactory services and improve your use experience.
1.1 collection of equipment and technical information
We may collect the data you need to use our application, and we can maintain and analyze the functionality of the application and personalize the content of the application.
We automatically get some information about your device, including IP address, country code, time zone session start/stop time; IDFVs, language; Network status (wireless, etc.), browser plug-in type and version; Platform, SDK version, timestamp; Technical device information (such as device model and name, operating system name and version, CPU information, storage size, screen size, firmware, application software API key identifier, push notification token). While this information (such as IDFV, IP address) may uniquely identify your device, this information does not personally identify you. Some legislation (such as the United States) can uniquely identify your device as a personal information processing device.
1.2 routine personal information collection
When using our services, we may require you to provide us with certain personally identifiable information (" personal data ") that can be used to contact or identify you. Personally identifiable information may include but not be limited to:
Mobile phone number
2. How to use the collected information
FOOTBALL ANT Use the collected data for some or all of the following purposes:
Provide and maintain services
Notify you of changes to our services
Allows you to participate in the interactive functions of our services at the time of selection
Provide care and support to customers
Provide analytical or valuable information so that we can improve our services
Monitor service usage
Detect, prevent and solve technical problems
When you through the mobile device access service, we may automatically collect certain information, including but not limited to, you are using a mobile device type, mobile device ID, only the IP address of the mobile devices, mobile operating system, you use the mobile Internet browser types, unique device identifier and other diagnostic data (use "data").
We will push relevant information regularly. If you want to unsubscribe, please follow the following steps:
Click the "unsubscribe link" in the push email to unsubscribe.
3. Information storage
3.1 data security
Data security is important to us, but remember that no security measure is perfect or impermeable. While we strive to protect your personal data in a commercially acceptable manner, we cannot guarantee its absolute security.
3.2 data transmission
Your information (including personal data) may be transferred to computers outside your state, province, country or other government jurisdiction, and data protection laws for those computers may differ from data protection laws in your jurisdiction.
If you choose to provide information to us, please note that we transfer data (including personal data) to IDC and process it in IDC.
3.3 data disclosure
FOOTBALL ANT May disclose your personal information in good faith, believing that such action is necessary:
Perform legal obligation
Protect and defend the rights or property of the software
Prevent or investigate possible misconduct related to services
Protect the personal safety of service or public users
Prevention of liability
3.4 service providers
We may employ third parties (companies or individuals) to promote our services (" service providers "). Third parties provide services on our behalf, perform related services or assist us in analyzing how services are used. Third parties can only access your personal data on our behalf to perform these tasks and are obligated not to use it for any other purpose.
3.5 link to other websites
Our services may contain links to other websites that we do not operate. If you click on a third party link, you will be directed to that third party's website. We strongly recommend that you review the privacy policies of each site you visit. We have no control over the content, privacy policies or practices of any third party websites or services and we assume no responsibility.
4. Delete information
When the information is no longer needed, we will take reasonable measures to delete it to protect the information from unauthorized access or use.If the content uploaded by users is suspected of being pornographic or violent and undesirable, we will have the right to delete it, and users can report it in the discovery module.
5. How do we protect your personal information
5.1. Safety technical means
We have adopted various security technologies and protective measures that comply with industry standards to protect users' personal information from unauthorized access, use or leakage. For example, adopt firewall and data backup measures; receive SSL protocol encryption protection when exchanging data between your browser and server; provide HTTPS protocol secure browsing mode for our platform, etc.
5.2. Safety management system
We have established and improved a data security management system, including determining the security management responsibilities of various departments and their responsible persons in contact with users’ personal information; establishing a workflow and security management system for the collection, use and related activities of users’ personal information; for staff and agents People implement authority management, review batch export, copy, and destroy information, and take measures to prevent leakage; properly keep paper media, optical media, electromagnetic media and other carriers that record users’ personal information, and take corresponding safe storage measures; The user’s personal information information system is subject to access review, and measures such as anti-intrusion and anti-virus are taken; the personnel, time, place, and matters that operate on the user’s personal information are recorded; security and privacy protection training is held regularly to improve employees’ Personal information protection awareness. We will review, update and publish our platform security risk and personal information security impact assessment reports from time to time.
5.3 Relief measures
However, users should understand that due to technical limitations and various malicious methods that may exist, in the Internet industry, even if they do their best to strengthen security measures, it is impossible to guarantee 100% information security at all times. Users need to understand that the systems and communication networks used by users to access our services may have problems due to factors beyond our control.
In the unfortunate event of a personal information security incident, we will promptly inform you of the basic situation and possible impact of the security incident, as well as the emergency response we have taken or will take, in accordance with the requirements of laws and regulations, through the station letter/contact information reserved by you, etc. And other relevant disposal measures, remedial measures for you, etc. If it is difficult to inform the subjects of personal information one by one, we will adopt a reasonable and effective way to issue announcements and proactively report the handling of personal information security incidents to the relevant regulatory authorities.
If you find that your personal information is leaked, please contact us immediately so that we can take appropriate measures in time.
6. How do you manage your personal information and account cancellation
6.1, user information correction
We will do our best to adopt appropriate technical means to ensure that you can access, update and correct your registration information or other personal information provided when using our services.
6.2. Withdrawal of user information authorization
You can change the scope of your personal information that you authorize us to collect and use by deleting information, turning off the functions of related equipment/tools, and setting in our applications. For example: You can learn and update your registration information through the settings page. If the access, update, and correction of certain personal information cannot be realized, you can contact us. To protect the security of your account, we may require you to verify your identity.
6.3, user information deletion
In the following situations, you can request us to delete your personal information:
6.3.1. Our handling of personal information violates laws and regulations or our agreement with you;
6.3.2. Our collection and use of your personal information failed to obtain your explicit consent;
6.3.3. We terminate the provision of our products or services to you or you voluntarily terminate the use of our products or services.
If we decide to respond to your deletion request, we will also notify the third parties who have obtained your personal information from us as much as possible at the same time, and require such third parties to delete your personal information in a timely manner, unless otherwise stipulated by laws and regulations, or such The third party has obtained your independent authorization. When you delete personal information from us, we may not delete the corresponding information from the backup system immediately, but will delete the information when the backup is updated after the statutory storage period is met.
6.4. Account cancellation
If you decide to stop using our APP, you can contact us at email@example.com to cancel your account. We will require you to perform the necessary identity verification, including personal identity, security status, device information, etc. You know and understand that the act of canceling your account is irreversible, and we will do it within seven working days after confirming with you Log out. After you cancel your account, we will stop providing services to you, and will delete all information about your account or anonymize relevant information, except as otherwise provided by laws and regulations.
7. Protect information
8. Collection of information and data related to children
We attach great importance to the protection of personal information of minors. If you are a minor under the age of 18, before using our services, you should ensure that you obtain the consent of the guardian in advance. If we learn that we have collected personal data under the age of 18, we will take all reasonable steps to delete the data as soon as possible. If you know that your child provided us with personal information without your consent, please contact us.
A Cookie is a file that contains a small amount of data and may contain an anonymous unique identifier. Cookies are sent from the web site to your browser and stored on your device. Other tracking techniques such as beacons, tags, and scripts are used to collect and track information and to improve and analyze our services.
You can instruct your browser to reject all cookies or indicate when to send cookies. However, if you do not accept cookies, you may not be able to use some parts of our service.
Example Cookie we used:
A session Cookie. We use Session Cookies to run our services.
Preference Cookie. We use the preference Cookie to remember your preferences and various Settings.
Security Cookies. We use secure cookies for security reasons.
10. Terms of service of the third party
* Location service
Our products use Gps location permission
* The payment channel
PayPal or Braintree
* Advertising services
11. Statistical analysis