在线一本码道高清

Kanzhan.com-User Agreement and Privacy Policy

Sight on "User Agreement and Privacy Policy"

respected user:

Before you become a targeted user and use Kannic.com, please read this User Agreement and Privacy Policy carefully to better understand the services we provide and your rights and obligations.

The first part looks at the user agreement

This user agreement (referred to as the "Agreement") is between you and Beijing Huapin Borui Network Technology Co., Ltd. (hereinafter referred to as "Sight Company" or "We") regarding the sight network and sight APP provided by the sight company (hereinafter (Referred to as "seeing") related rights and obligations norms. Accuracy is a serious and pure corporate review platform and software, please read the following terms carefully before registering and using Accuracy:

I. Acceptance of Registration Terms

Once you click or check the relevant content of "Read and agree to accept the User Agreement and Privacy Policy" on the registration page, it means that you have read and agreed to reach an agreement with the sight company, become the sighted user, and accept this user agreement. All registration terms and conditions of the second part of the "Personal Information Protection Policy" and other provisions published in the sight are bound by all provisions.

User registration conditions

1. Users who apply for registration as prospective users must meet the age of 18 or above on the registration date.

2. In order to better experience the accurate information publishing service, users should comply with the requirements of the sight registration mechanism and provide the true, correct, up-to-date and complete information to the sight; if users are registered as job applicants, they should ensure timely updates I provide the relevant authorization information and materials such as “unit name, job title or position information, and enterprise mailbox”, and ensure the authenticity of the foregoing authorization;

3. The user promises that any information uploaded and posted in the registered prospective account name, nickname, personal information, company profile, remarks, identification section will not violate any relevant national laws and regulations and the "seven bottom lines" and "nine inaccurate" management Required illegal and bad information, including:

  • Objecting to the basic principles established by the Constitution;
  • Endangering national security, leaking state secrets, subverting state power, and undermining national unity;
  • Those that harm national honor and interests; those that incite ethnic hatred, ethnic discrimination, and undermine ethnic unity;
  • Those who undermine state religious policies and promote cults and feudal superstitions;
  • Spreading rumors, disrupting social order and disrupting social stability;
  • Spreading obscenity, pornography, gambling, violence, homicide, terror or instigating crime;
  • Insulting or slandering others and infringing on their legal rights;
  • Contains false, harmful, coercive, intrusive, harassing, harassing, vilifying, vulgar, obscene, or other content that is unethical and offensive;
  • Contains other content restricted or prohibited by Chinese laws, regulations, rules, ordinances, and any legally effective norms.

4. If the user has the above-mentioned situation when registering a sight account, or if he has reason to suspect that the information uploaded or the content posted violates the foregoing provisions, sight is entitled to modify, delete or block the relevant content at any time, including but not limited to, User's registered nickname, personal description, posted information, etc. At the same time, it has the right to or suspend or terminate the user's account, or suspend or terminate the provision of all or part of the services provided by Sight.

User account, password and security

1. After completing the user registration process, the user will receive a password and account number. The user is obliged to ensure the security of the password and account. The user shall be fully responsible for all activities performed using this password and account, including any information, materials, text, software, music, audio, photos, graphics, uploading, posting, emailing or any other means, Video, information, or other materials, whether public or private, are the responsibility of the content provider.

2. If the user's password or account is used without authorization, or if any other security issues occur, the user should immediately notify and check. If the user's account or password is leaked due to improper use or other non-sight-seeking, which leads to the leakage of his data and information, the user shall bear its adverse consequences.

3. The user shall not inform the third party or provide the account to the third party for use. If the privacy of the user is leaked or the platform is lost due to this, the user shall bear corresponding responsibilities.

Service Description

1. Seeking to provide users with network services through the Internet, including online and offline related services. In order to use network services, users should equip themselves with the necessary equipment to access the Internet, including computers, modems, or other access devices, and pay for the costs required to log in to the Internet.

2. It is expected that when providing network services, certain network services may be charged a certain fee. In this case, a clear prompt will be given on the relevant page. If the user refuses to pay such fees, he / she cannot use the relevant network services. The paid service will provide additional terms of service based on these registration terms to regulate the content of the paid service and the rights and obligations of both parties. Users should read it carefully. If the user purchases a paid service, it is deemed to accept the service terms of the paid service.

3. Both the paid service and the targeted free service have a validity period. After the validity period ends, the service will automatically terminate, and the validity period cannot be interrupted or extended. Unless otherwise specified in these registration terms or other relevant terms of service, all paid services are non-refundable.

4. For the use of sight to conduct illegal activities, or their words and deeds (whether online or offline) deviate from the purpose of serious employment, the sight will be dealt with seriously, including blacklisting and making the complaint public. If the punishment measures such as deleting the user's account cause economic or reputation loss to the target, the target will be held liable.

5. Sight the right to send advertising messages to their users, or send email, text or phone notifications to their users for events and other purposes. In addition to system notifications or important information, users can choose not to receive the above information by sighting the provided methods.

6. We have the right to share, display or other similar acts on the job information posted publicly by BOSS direct hire or / and direct manager hire.

V. Limited liability clause

1. Sightseeing will do its best to provide users with safe, timely, accurate and high-quality services, but it does not guarantee that they can meet the user's requirements and expectations, nor does it guarantee that the service will not be interrupted. The timeliness, security and accuracy of the service Sex is not guaranteed. Unless otherwise agreed, users will not be held liable if they cannot use the sighting services or use the website services that do not meet their psychological expectations.

2. Regarding the content transmitted by users through the services provided by Sight, Sight will make reasonable efforts to strictly review in accordance with relevant national regulations, but cannot fully control the content transmitted via software / website services, and does not guarantee the correctness, completeness or content of the content. quality. Therefore, users may encounter unpleasant, inappropriate or disgusting content when using the sighting service. In any event, Sight is not responsible for any content posted, emailed or otherwise transmitted by the user via the software / website service. However, we have the right to stop transmitting any of the foregoing content and take corresponding actions according to law, including but not limited to suspending the user's use of all or part of the software / website services, keeping relevant records, and in accordance with national laws and regulations and related policies to the relevant authorities when necessary Report and cooperate with relevant authorities.

3. Regarding the various third-party advertisement information, links, information, etc. provided by Sight, Sight does not guarantee the correctness, legality or reliability of its content, and the relevant responsibilities are borne by the advertiser; and, for users through Sight service Contacting or doing business with advertisers is entirely a behavior between users and advertisers, and has nothing to do with sighting. For any damage or loss caused by the aforementioned business dealings, we shall not assume any liability.

4. Regarding the photos, materials, and certificates uploaded by users, we have adopted relevant measures and made reasonable efforts to review them, but we do not guarantee the correctness, legality, or reliability of their content. The users responsible for uploading the above contents are responsible bear.

5. The user chooses to use the relevant related services with his own independent judgment, conducts comments, replies, post text pictures and other information, and independently assumes the adverse consequences and responsibilities that may arise from his own initiative. legal liability.

6. Regarding any user activities (including but not limited to charging fees and completely public welfare activities) planned, initiated, organized or undertaken by this software / website, we do not make any guarantees or promises to users for the effects of the above activities, nor The legitimacy and reasonableness of the user's own behavior during the guarantee activity. Any damage to the personal or reputation of the user or others caused by the user shall be borne by the subject of the act.

7. Regarding the user's complaint, Kanban will make reasonable efforts to verify and deal with it, but does not guarantee that it can meet the requirements of the complainant. The right to decide whether to make the content of the complaint public to the public or the respondent. If the content of the complaint violates the user's right to privacy, reputation, etc., all legal liabilities shall be borne by the complainant, regardless of sighting.

User rights

Users have the following rights to their personal data:

1. Enquiries at any time, except those that can not be inquired and provided for viewing due to a few special circumstances (such as being targeted to join the blacklist, etc.);

2. Request for supplement or correction at any time, except for a few special circumstances (such as the website or the relevant authority to preserve evidence for judicial proceedings, etc.);

3. At any time request to cancel the sighting account. For the rules and procedures related to the account cancellation, please refer to the User Cancellation Agreement. After your successful logout, we will delete your personal information or make it anonymous as soon as possible in accordance with the requirements of laws and regulations.

7. Users shall promise to abide by the following laws and regulations:

1. The sighting company reminds users to use the sighting service in compliance with the "Contract Law of the People's Republic of China", "The Copyright Law of the People's Republic of China", "The Decision of the Standing Committee of the National People's Congress on Maintaining Internet Security", "The People's Republic of China" Law of the Republic on Keeping State Secrets, Regulations of the People's Republic of China on Telecommunications, Regulations on the Security Protection of Computer Information Systems of the People's Republic of China, Interim Provisions on the Management of the International Networking of Computer Information Networks of the People's Republic of China and Their Implementation Measures Provisions on the management of network confidentiality, the Measures for the Administration of Internet Information Services, the Measures for the Administration of International Network Security Protection of Computer Information Networks, the Regulations for the Administration of Internet Electronic Bulletin Services, the Law on Network Security and other relevant Chinese laws and regulations.

2. In any case, if the sight company has reason to believe that any behavior of the user in using the sight service, including but not limited to any speech and other actions of the user, violates or may violate any provisions of the aforementioned laws and regulations, the sight The company may terminate the service to the user at any time without any prior notice.

3. The user promises to abide by laws and regulations, socialist system, national interests, legal rights and interests of citizens, public order, social morality, and authenticity of information during the use of Sightnet [Seven Bottom Lines].

8. Users are prohibited from engaging in the following activities:

  • [Illegal and illegal infringement reviews] Look at the right to deal with reviews that "violate relevant laws and regulations" or "infringe on the legal rights and interests of others", including but not limited to those involving political sensitivity, pornography, violent terror, anti-government speech, disruption of social stability, and Reviews that infringe on the intellectual property rights and personality rights of others.

  • [Malicious comment] If the reviewer gives the user a bad review for the purpose of seeking extra property or other improper benefits, or if the reviewer and the user have other special interests to give the user a bad review, it constitutes a malicious review. The right to identify malicious comments and handle them.

  • [Improper comments] The content of the comments contains obscenities, private information related to others, advertising information, irrigation information, and non-meaningful information, vulgar and other information that violates public order and morals, and violates social moral norms, which constitutes inappropriate reviews. Seeing the right to identify inappropriate comments and deal with them.

  • [Plagiarism / Legendary Review] Quoting other people's or other graphic information (such as the plagiarism website profile, other people's published graphic information, etc.) beyond the reasonable limit, constitutes plagiarism / likely comment. Seeing the right to determine and deal with plagiarism / identical comments.

  • [Hype reviews] Look at the right to deal with review information published in connection with speculation.

  • Kanban has the right to process review information released for profit, cash-out, award-winning, attack, and other purposes, and to process other review information that violates the Kanban User Agreement, Privacy Policy, and other agreements or rules.

Nine, special regulations

If the user has the following behaviors or the following situations, he shall have the right to freeze the user account or otherwise suspend the provision of services to the user without any prior notice after finding or receiving a complaint or report, and require the user to bear the corresponding Liability for damages:

(1) Violation of laws and regulations: Release information that violates relevant national laws and regulations and the "seven bottom lines" and "nine prohibitions" management regulations.

不尊重看准用户及其所贡献内容的行为,主要表现为: (2) Friendly behavior: The behavior of not respecting the users and the content they contribute is mainly manifested as:

  • Contempt: demeaning, despise others and their fruits of labor
  • Defamation: fabrication and dissemination of false facts, harming the reputation of others
  • Ridicule: exposing or describing others or their actions in a metaphorical, exaggerated, and insulting manner
  • Provocation: irritating others in an unfriendly way, with the intention of making the other party respond to their own words and deliberately creating an incident
  • Humiliation: embarrassing someone's ability, behavior, physical or identity
  • Abusive: negative evaluation of others in uncivilized language
  • Discrimination: Attacks on the identity or classification of others based on their ethnicity, race, religion, sexual orientation, gender, age, region, and physical characteristics
  • Threat: promises to force others to obey their will with bad consequences

用户以推广曝光为目的,发布影响用户体验、扰乱看准平台秩序的内容,或进行相关行为。 (3) Publishing spam advertisement information: For the purpose of promoting exposure, users publish content that affects the user experience, disrupts the order of the platform, or performs related behaviors.

(4) Repeatedly issued spam advertisements containing products sold, services provided, and promotional content. Including but not limited to the following forms:

  • Single account publishes content containing spam ads multiple times
  • Multiple advertising accounts cooperate to publish content containing spam ads
  • Repeatedly publish content containing deceptive external links, such as unspecified Taobao links, redirected websites, etc., to trick users into clicking links

(5) Publish a large amount of content containing SEO promotion links to obtain improper exposure in search engines to falsely interact between buying or selling accounts, and to publish promotional content and related transactions that interfere with the order of the platform. Including but not limited to the following forms:

  • The impact of counterfeiting in the platform when buying machine registration accounts
  • Buy a machine to register an account and click on the improper exposure for approval

(6) Malicious marketing using illegal methods that seriously affect user experience. Including but not limited to the following forms:

  • Irregular reprint of other people's content while adding promotional marketing content
  • Post malicious deceptive marketing content, such as malicious marketing by falsifying experiences, impersonating others, etc.
  • Use special symbols, pictures, etc. to avoid spam advertisements.

滥用产品功能,进行影响用户体验,危及平台安全及损害他人权益的行为。 (7) Malicious behavior: Abuse product functions, conduct behaviors that affect user experience, endanger platform security, and harm others' rights and interests. The main performance is:

  • Malicious editing refers to editing that clears or deletes effective content, adds irrelevant information, and destroys the content structure to reduce the quality of public editing content.
  • Impersonating others, using personal information such as avatars and user names to imply that they are equivalent or related to others or organizations.

(8) Repost content that interferes with the normal user experience. Including but not limited to the following forms:

  • Duplicate answer content published multiple times under different reviewed companies
  • Frequently posted meaningless garbled characters, numbers, etc. that are difficult to identify and affect the reading experience
  • Harassing others, sending repeated or similar requests to others repeatedly by comments, @ others, private messages, etc.
  • Making and spreading malicious programs or related tutorials for plug-ins or for operating account functions
  • Post potentially dangerous content, such as phishing sites, Trojans, virus sites, etc.

X.Privacy Policy

Seek to protect users' personal information and privacy information in accordance with law. For the content of the privacy policy, please refer to the "Personal Information Protection Policy" in Part II of this agreement.

11. About the content uploaded or posted by users

1. The content (including, but not limited to, photos, text, interview experience, and enterprise evaluation) that users upload or post, is deemed to be the user's grant of free and non-exclusive use rights to the sight company and its affiliates. The right to copy, modify, publish, etc. the above contents for the purpose of displaying, disseminating and promoting the aforementioned contents. This right of use continues until the user notices in writing that no further use is allowed, and when such written notice is actually received.

2. If the content uploaded or posted by the user infringes the rights of others, and any third party submits an infringement or claim to the company, the user shall bear full responsibility.

3. If any third party copies, modifies, edits, or disseminates the content posted by the user in the targeted public use area, the legal consequences and liabilities arising from such behavior are borne by the actor, regardless of the targeting.

Twelve, instant messaging services such as online consultation and chat

1. When accepting and providing instant messaging services such as online consultation and chat with job applicants, users should abide by laws and regulations, socialist systems, national interests, legal rights and interests of citizens, public order, social morality, and ensure that the information transmitted is true Sex waits for seven bottom lines.

2. The text and voice information generated by the user to communicate with other people through the communication service provided by the sight, such as consulting chat records, etc. The sight may be temporarily stored according to legal regulations and the needs of user functions. Sight will encrypt the relevant information and will not disclose it to any third party except as required by law.

3. The information that is not temporarily stored will only be used for handling complaints, fraud detection, and offline temporary storage for users.

4. In order to protect the privacy of other users, users shall not publish other users' communication information, such as consulting chat records, etc., as specified in this article. If it results in loss of sight, or infringes the rights of other users, it shall bear the liability for breach of contract or compensation.

Thirteen, information storage and restrictions

Sight has the right to establish general measures and restrictions, including but not limited to the maximum period of email, chat messages, posted content or other uploaded content that the software service will retain, the maximum number of email messages that can be sent and received per account, and The size of a single message sent or received. Any information, communication materials and other contents stored or transmitted through the service will not be held liable if deleted or not stored. The user agrees that the account that has not been used for a long time has the right to close. At the same time, we have the right to change these general measures and restrictions at any time, at our own discretion and regardless of whether the user is notified.

14. End of service

If the user objects to the content of any registration terms or disagrees with the modification of the registration terms later, or is dissatisfied with the sighting service, the user has the following rights: no longer use the sighting service; ending the user's qualification to use the sighting service; notifying the sighting to stop the registration User services. At the end of the user service, the user's right to use the sighting service immediately terminates, and sighting no longer assumes any obligations to the user.

15. Prohibition of Commercial Conduct

1. The user agrees not to copy, copy, sell, resell or use for any other commercial purpose the services or any part of the services offered.

2. It is forbidden to charge applicants through positions. If it is not true, we will end the user's qualification to use the sighting service.

15. Prohibition of Commercial Conduct

1. The user agrees not to copy, copy, sell, resell or use for any other commercial purpose the services or any part of the services offered.

2. It is forbidden to charge applicants through positions. If it is not true, we will end the user's qualification to use the sighting service.

16. Liability for breach of contract

1. Users use false identity information and company information to register, post false job applications, employment comments, post illegal content including pyramid schemes, pornography, reaction, etc., and disseminate communication records such as interviews and chats, etc., as serious violations of this agreement. To bear the economic loss and reputation loss caused by the sight.

2. Any third party makes any claim or request for sighting due to the user providing, posting or transmitting content through the service provided by sighting, violating these Terms of Service, or infringing any rights of others, the user shall compensate for sighting or other cooperation Partner losses, including but not limited to compensation, attorney fees, and reasonable investigation costs.

3. When the user complains about other users' illegal behavior or violates the provisions of this registration, the complainant shall bear all legal liabilities arising from the false complaint. If the lawful rights and interests of others are violated, the complainant shall assume full legal responsibility independently. If the loss is caused to the sight, the complainant shall bear the corresponding compensation liability for the sight.

17. Changes and Modifications to User Registration Terms

Kanban has the right to change and modify the registration terms of this agreement at any time according to law. Once there is a change in the registration terms, Sight will give an update prompt in the software, or send the latest version of the user agreement to the user by mail. If the user does not agree to the modification of the user registration terms, he can proactively cancel the user's qualifications (such as canceling the account). If additional fees are paid for some services, he can apply for a full or partial refund. If the user continues to use the user account, it is deemed that the user has accepted the modification of the user registration terms.

18. Force Majeure

1. "Force Majeure" means an event that cannot be reasonably controlled, unforeseeable, or unavoidable even if foreseen, which prevents, affects or delays the fulfillment of all or part of its obligations under these Registration Terms. The incident includes, but is not limited to, government actions, natural disasters, war, hacking, computer viruses, network failures, and so on. Force majeure may lead to adverse consequences such as inaccessibility, slow access, loss of stored data, and leakage of user personal information.

2. In the event of a force majeure event, sighting may suspend the performance of the obligations under this user agreement until the effect of force majeure is eliminated, and shall not be held liable for breach of contract; however, every effort shall be made to overcome the event and mitigate its negative effects.

19. Notice

的形式。 Sight notifications to its users will be in the form of emails or page announcements . When the registration terms are modified or other matters are changed, the notice can be notified in the above form.

Application and jurisdiction

,其仲裁裁决是终局的。 The validity, performance, interpretation and dispute settlement of this User Agreement shall be governed by the current laws of the People ’s Republic of China. Any disputes arising shall be submitted to the Beijing Arbitration Commission . If this user agreement is in conflict with the current laws of the People's Republic of China and some of the terms are invalid, the validity of other terms will not be affected.

Part II "Personal Information Protection Policy"

Updated: May 16, 2019

Effective Date: May 16, 2019

Welcome to use our products and services! We take your privacy and personal information very seriously. This Personal Information Protection Policy will help you understand the following:

I. Introduction

How we collect and use your personal information

How we use cookies and similar technologies

How we share, transfer, and publicly disclose your personal information

V. How do we store and protect your personal information

Your rights

How we handle personal information of minors

How your personal information is transferred across borders

9. Revision of Personal Information Protection Policy

10. How to contact us

Eleven, dispute resolution

I. Introduction

In order to effectively protect the privacy of users and optimize the user experience, this "Personal Information Protection Policy" has been formulated in accordance with current regulations and policies. This "Personal Information Protection Policy" will detail the policies and measures regarding the acquisition, management and protection of users' personal information. This "Personal Information Protection Policy" applies to all services provided to you, whether you obtain them through a computer device, mobile terminal, or other device.

This Personal Information Protection Policy is designed to help you understand what data we collect, why we collect it, what we do with it and how we protect it. We hope that you carefully read and understand that you have fully understood and accepted the contents of this Personal Information Protection Policy before using the sighting service, and hope that you can make a suitable choice based on your understanding. Once you start using the services of the platform, you agree with what we have described in this Personal Information Protection Policy. After we update this Personal Information Protection Policy, your continued use of our products and / or services means that you agree to the content of this Personal Information Protection Policy (including updated versions) and agree to our compliance with this Personal Information The Protection Policy collects, uses, stores, and shares information about you. In addition, we will seek your consent in advance when using your information for purposes not covered by this Personal Information Protection Policy.

How we collect and use your personal information

We know the importance of personal information to you, and we know that providing effective protection for your information is the cornerstone of the healthy and sustainable development of our business. Thank you for your use and trust in the sighting platform! We are committed to maintaining your trust in us, abide by applicable laws and our commitment to you, and make every effort to ensure the security and reasonable use of your personal information. We solemnly promise that we will take appropriate security measures to protect your personal information in accordance with the industry's mature security standards.

We will only collect and use your personal information for the purposes described in this personal information protection policy. If you do not provide relevant information, you will not be able to enjoy the products and / or services we provide. These features include:

1. User registration

When you register for a sighted account, you need to provide us with at least the account name and mobile phone number, and we will verify your identity by sending a SMS verification code.

In order to improve our products or services, we can provide you with information display and search services that better meet your individual needs. You also need to provide your personally identifiable information (workers or students). If you are a work person, you need to provide your company name, working time and position; if you are a student, you need to provide the school name, professional name, education and school time . We will extract your browsing and search preferences, behavior habits, location information and other characteristics based on your browsing and search history, device information, location information, and review information, perform indirect crowd portraits based on feature tags, and display, push information, and possibly Commercial advertisement. If you do not provide this information, it will not affect your browsing and searching through web or wap pages.

You can modify the account name (default nickname), avatar, gender, and related account information such as your work experience or education experience. You can also set a password and bind an email address for account login.

Your account nickname, avatar, work experience, education experience and profile information are publicly displayed on your personal homepage. Except for old bird users, you can turn off the function of displaying personal homepage through the "Privacy Settings" function. After closing, other users cannot see other personal information except nickname and avatar.

2. Old bird certification

When you use the old bird consulting service, if you want to get the right to charge consulting services, in order to ensure the quality of your service and the safety of the platform users, you need to complete the old bird certification to use this service. Old bird certification requires you to provide: real name, ID number, employment unit, company mailbox (for verification email) or job card, and choose to fill in a good tag or personal profile. We solemnly promise that we will take appropriate security measures to protect your personal information in accordance with the industry's mature security standards.

3. Payment function

After you pay the order, you can choose the payment services provided by the targeted third-party payment agencies (including Apple Pay, WeChat payment and other payment channels, hereinafter referred to as "payment agencies"). The payment function itself does not collect your personal information, but we need to share your sighted order number and transaction amount information with these payment agencies to enable them to confirm your payment instructions and complete the payment. We solemnly promise that we will take appropriate security measures to protect your personal information in accordance with the industry's mature security standards.

4. Other information collected during use

Device Information

When you use the platform products and services, we collect device attribute information (including your hardware model, operating system version, device configuration, unique device identifier, international mobile device identification code IMEI, network device hardware address MAC, advertising Identifier IDFA), device connection information (browser type, telecom operator, language used), and device status information (including device sensor data, device application installation list). We may associate the information we collect from your various devices so that we can provide you with a consistent service on those devices. We may associate your device information or phone number with your sighting account.

Log information

When you use the sight platform products and services, our server will automatically record some information, including your use of our products and / or services, IP address, URL of the service accessed, type of browser and used Language, information about downloading, installing or using mobile apps and software, information communicating with communications software, and the date, time, and duration of access to the service.

location information

When you use sight-seeing platform products and services with location capabilities, when you turn on device location and use our location-based services, we may collect and process information about your actual location so that you do n’t You need to manually enter your own geographic coordinates to get related services. We use various technologies for positioning, including [IP address, GPS, and other sensors that can provide relevant information (such as information that may provide us with nearby devices, Wi-Fi access points, and base stations)]. You can stop the collection of your geographic location information by turning off the positioning function, but you may not be able to get the relevant [company / job recommendation or search] service or function, but it will not affect your normal browsing of other services on the sighting platform Features.

Unique application number

Some products and services include a unique application number, which will be associated with the installation when you install, activate, update, uninstall related products and services or when these products and services are regularly and targeted (such as software updates) Relevant information (including operating system type and application version number) is sent to Pinpoint.

Resume Information

Because we are looking for job search and recruitment services, you can put your micro resume and portfolio into our database. Recruiting companies or personnel who use the corresponding services through registration or payment can find your resume through our database. When you improve your resume and personal tags in your sights, and publicly display this information, you have agreed to have legal permission to the recruitment company or personnel who legally use the corresponding services to query and use your resume. s right.

Using the camera (camera)

You can use this additional function to complete, take pictures, scan the code to log in.

Visit mobile album

You can upload your photos to participate in company reviews, post updates, questions and answers. We will collect these photos for content display.

Use microphone

You can use the microphone directly for voice help consultation and answer questions. In these functions, we will collect your recordings to smoothly answer questions or ask for help.

Get address book information or Weibo friends

In order to increase your social fun in pinpointing the workplace community, we will collect your address book information or Weibo friend information with your consent. You can determine whether your friends are also pinpoint users and are pinpointing Connect for your communication.

5. We collect your personal information through indirect access

When you use the services of related parties and partners through our products or services, you agree that we will receive, use, summarize and analyze from our related parties and partners according to the actual business and cooperation needs. Your personal information.

6. Customer Service Function

We may use the information of your mobile phone (including your mobile phone number, email address) to directly communicate or interact with you. You may be notified when an abnormal account is found. To ensure the security of your account, customer service will use your account information to verify your identity when receiving your feedback.

7. In order to better improve our products and enhance service experience

We may collect your browsing information, search history, your hobbies (which can be set in your profile), data analysis of the community content you contribute to form user portraits, and responses you receive when you are invited to participate in the survey, Used to provide you with a better product experience.

8. Get your personal information from a third party

We may obtain the account information (avatar, nickname) you authorized to share from a third party, and bind your third-party account to your sighted account after you agree to this privacy policy, so that you can log in directly through the third-party account And use our products and / or services. After confirming the legality of the source of personal information in accordance with the agreement with third parties, we will use your personal information in compliance with relevant laws and regulations.

9. Show and push customized content for you

We may use the information we collect to provide you with customized content, including:

Show you or recommend [search results, information flow, and other relevant information results] that are more relevant (not universally pushed).

Send you [email, text message, news or push notification].

Issue service-related announcements to you when necessary (for example, when a service is suspended for system maintenance).

You may not be able to cancel these service-related announcements that are not advertising in nature.

10.Provide you security

In order to improve the security of your use of products and services provided by us and targeted affiliates and partners, we may use your information for [authentication, customer service, security prevention, fraud monitoring] to [prevent, detect, Investigate fraud, endanger security, illegal or violate agreements, policies or rules with us] to protect the legitimate rights and interests of you, our other users, us or targeted associates, partners and the public.

11. Other uses

When we use information for other purposes not specified in this personal information protection policy, and we use the information collected for specific purposes for other purposes, we will ask your consent in advance. However, according to relevant laws and regulations, in the following situations, we can collect and use some necessary personal information without obtaining your authorization and consent:

  • Directly related to national security and national defense security;
  • Directly related to public safety, public health, and major public interests;
  • Directly related to crime investigation, prosecution, trial and judgment enforcement;
  • Out of protection of your or other individual's important legal rights and interests, but it is difficult to obtain my consent;
  • The personal information collected is disclosed to the public by yourself;
  • Collect your personal information from legally publicly disclosed information, such as from legal news reports, government information disclosure and other channels;
  • Necessary for signing and performing contracts at your request;
  • Necessary for maintaining the safe and stable operation of the platform's products and / or services, including the discovery and disposal of product or service failures;
  • Other circumstances required by laws and regulations.

If you have any questions about our collection and use of your personal information or need to provide further information, please contact us through the contact information provided in the section of "【10. How to Contact Us】.

How we use cookies and similar technologies

Cookies and similar technologies are commonly used technologies on the Internet. When you use Sight and related services, we may use related technologies to send one or more cookies or anonymous identifiers to your device to collect and store information when you access and use this product. We use cookies and similar technologies to achieve the following functions or services:

(I) Guarantee the safe and efficient operation of products and services

We may set authentication or security cookies or anonymous identifiers to enable us to confirm whether you are securely logged into the service or have encountered illegal acts such as theft, fraud, etc. These technologies will also help us improve service efficiency and login and response speed.

(B) help you get an easier access experience

Using this type of technology can help you avoid the steps and processes (recording your search history) of filling out your personal information and entering your searches.

We do not use cookies for any purpose other than the purposes described in this personal information protection policy. You can manage or delete cookies according to your preferences. For more information, see [AboutCookies.org]. You can clear all cookies stored on your computer, and most web browsers have a feature that blocks cookies. But if you do this, you need to change the user settings yourself every time you visit our website, but you may [cannot log in or use the services provided by the sight of cookies] because of these modifications.

You can restrict the use of cookies by changing your browser settings. Take the [Chrome] browser as an example, you can choose to clear your cookies in the "Browser Settings" of the drop-down menu at the top right of the [Chrome] browser through "[Settings-Advanced-Clear Browsing Data]".

How we share, transfer, and publicly disclose your personal information

We will not share or transfer your personal information to third parties unless you have your prior authorization or consent, or the personal information shared or transferred is de-identified information, and the natural person who shared the third party cannot re-identify such information main body.

Share

We treat your information with a high degree of diligence. Except for the following situations, we will not share your information with any company, organization and individual other than Pinnacle and its affiliates without your consent:

1.1 Sharing with related parties for related functions or services

When you use functions such as "Recruitment", "Boss Direct Employment", "Direct Manager Employment", etc., to ensure the consistency of the services you receive between the products provided by us and related parties, and to facilitate the unified management of your information , We will share your de-identified personal information with these affiliates.

1.2 Share with business partners for specific functions

When [software service provider, smart device provider, or system service provider] cooperates with us to provide you with services, when you need to use the geographic location function, we may collect your location information and Relevant device information (including hardware model, operating system version number, International Mobile Equipment Identity (IMEI), network device hardware address (MAC)) is de-identified and provided to the aforementioned provider.

1.3 Helping you participate in marketing promotions

When you choose to participate in the related marketing activities held by us, you need to provide your name, mailing address, contact information, and bank account information according to the needs of the event. With your express consent, we will share the above information with a third party so that we can entrust the third party to provide you with prizes in a timely manner.

Currently, our authorized partners include the following types:

  • Service platform or service provider. Aiming at each product access to a wealth of third-party services. When you choose to use this third-party service, you authorize us to provide this information to a third-party service platform or service provider so that they can provide services to you based on the relevant information.
  • Software / hardware / system service provider. When a third-party software / hardware / system product or service is combined with a targeted product or service to provide you with services, with your authorization, we will provide the third-party software / hardware / system service provider with your necessary personal information for your use Services, or used by us to analyze product and service usage to enhance your experience.
  • Advertising and consulting service providers / advertisers. Without your authorization, we will not share your personal information with advertising and consulting service providers. However, we may share information that has been processed without identifying you and cannot be recovered by the recipient, including anonymized user portraits, with advertising or consulting service providers or advertisers to help them not identify you personally Under the premise, improve the effective reach of advertising, and analyze the use of our products and services.

1.4 For companies, organizations and individuals with whom we share personal information, we will sign strict confidentiality agreements with them and require third parties to process such information with no less than the confidentiality and security measures required by this privacy policy.

Transfer

We will not transfer your personal information to any company, organization, or individual other than Kankan and its affiliates, except in the following circumstances:

1. Get your explicit authorization or consent in advance;

2. Meet the requirements of laws and regulations, legal procedures or mandatory government requirements or judicial decisions;

3. If we or our affiliates are involved in transactions such as mergers, divisions, liquidations, acquisitions or sales of assets or businesses, your personal information may be transferred as part of such transactions, and we will ensure that such information is being transferred Confidentiality, and require new companies and organizations holding your personal information to continue to be bound by this personal information protection policy, otherwise we will require the companies and organizations to seek authorization and consent from you again.

3. Public disclosure

We will only disclose your personal information publicly if:

3.1 obtain your explicit consent;

3.2 Based on laws and regulations, legal procedures, litigations or mandatory requirements of government authorities.

4. Exceptions to obtaining prior consent when sharing, transferring, or publicly disclosing personal information

In the following situations, sharing, transferring, and publicly disclosing your personal information does not require your prior consent:

4.1. Directly related to national security and national defense security;

4.2. Directly related to public safety, public health, and major public interests;

4.3. Directly related to crime investigation, prosecution, trial and judgment enforcement;

4.4. It is difficult to obtain the consent of the individual in order to protect your or other individuals' important legal rights and interests;

4.5. Personal information that you disclose to the public;

4.6. Collect personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels;

4.7. Necessary for signing and performing contracts according to the requirements of the personal information subject;

4.8. Necessary for maintaining the safe and stable operation of the products or services provided, including the discovery and disposal of failures of the products or services;

4.9. Other circumstances required by laws and regulations.

According to the law, if you share or transfer personal information that has been de-identified, and ensure that the data receiver cannot recover and re-identify the subject of personal information, it is not an act of external sharing, transfer, or public disclosure of personal information. No need to inform you and save your consent to save and process.

V. How do we store and protect your personal information

Shelf life

We will keep your personal information for you while you use our products and services. If you cancel your account or actively delete the above information, we will keep your information in accordance with laws and regulations such as the Cyber Security Law. After you cancel your account or actively delete the above information, we will no longer use your personal information commercially, but we may use your personal information anonymously.

2. Storage area

Your personal information is stored in the People's Republic of China. If some products or services involve cross-border, we need to transfer your personal information overseas, and we will strictly follow the laws and regulations to ensure that your personal information is safe.

3. In general, we only retain your personal information for the shortest time necessary to achieve its purpose. In the following cases, we can change the storage time of personal information as required to comply with legal requirements:

  • To comply with applicable laws and regulations;
  • Compliance with court judgments, rulings or other legal procedures;
  • To comply with the requirements of relevant government agencies or legally authorized organizations;
  • We have reason to believe that we need to comply with relevant laws and regulations;
  • Uses reasonably necessary for the execution of relevant service agreements or this "Personal Information Protection Policy", the maintenance of public interests, and the protection of the personal and property safety of our customers, us or our affiliates, other users or employees, or other legal rights.

When our products or services cease to operate, we will notify you by means of, for example, push notifications, announcements, etc., and delete or anonymize your personal information within a reasonable period.

3. Protective measures

3.1 We have adopted reasonable and feasible security protection measures in accordance with industry standards to protect your information and prevent personal information from unauthorized access, public disclosure, use, modification, damage or loss. For example, when data is exchanged between your browser and the server, it is protected by SSL protocol encryption; we also provide HTTPS protocol for secure browsing on Kanan website; we will use encryption technology to improve the security of personal information; we will use encrypted Trusted protection mechanisms prevent personal information from being maliciously attacked; we will deploy access control mechanisms to ensure that only authorized personnel can access personal information; and we will organize security training courses to enhance employees' awareness of the importance of protecting personal information.

3.2 We improve the security of the entire system in multiple dimensions from organizational construction, system design, personnel management, and product technology. At present, our important information systems have passed the assessment of network security level protection.

3.3 We will take reasonable and feasible measures to try to avoid collecting irrelevant personal information. We will only retain your personal information for as long as necessary to achieve the purposes stated in the cost policy (unless the law requires mandatory retention).

3.4 The Internet is not an absolutely secure environment. When using Sight platform services, we strongly recommend that you do not send your information using communication methods other than those recommended by Sight platform. You can connect and share with each other through our services. When you create communication and sharing through our service, you can choose who you want to communicate and share with, as a third party who can see your contact information, communication information, or shared content.

3.5 When communicating using the Kanban service, please properly protect your personal information and provide it to others only when necessary. If you find that your personal information, especially your account or password, has been leaked, please contact us immediately through the contact information published in Chapter IX so that we can take corresponding measures according to your application.

3.6 Please note that the information you voluntarily share or even publicly share when using our services may involve personal information of you or others or even personal sensitive information, such as when you choose to upload pictures containing personal information when you comment or communicate. Please consider more carefully whether to share or even share relevant information when using our services. Please use complex passwords to help us keep your account secure. We will do our best to keep any information you send us secure.

3.7 According to our security management system, the leakage, damage or loss of personal information is listed as the most serious security incident. Once it occurs, the company's highest-level emergency plan will be activated. It consists of the Ministry of Security, the Government Relations Department, and the Law Department. Joint emergency response team.

4. Security event notification

4.1. We will formulate emergency plans for cyber security incidents, and deal with security risks such as system vulnerabilities, computer viruses, network attacks, and network intrusions in a timely manner. When incidents that endanger network security occur, we will immediately launch emergency plans and take corresponding remedial measures. And report to relevant authorities in accordance with regulations.

4.2. The leakage, damage and loss of personal information is a company-level extraordinarily large security incident. We will be responsible for regularly organizing members of the working group to conduct security preplan exercises to prevent such security incidents. In the event of an unfortunate event, we will launch an emergency plan in accordance with the highest priority. The Ministry of Security, Government Relations, Legal Department and other departments will form an emergency response team to trace the cause and reduce losses in the shortest time.

4.3. After the unfortunate occurrence of personal information security incidents, we will promptly inform you of the basic situation and possible impacts of security incidents, which we have taken or will take, through internal software reminders, emails, text messages or telephones in accordance with the requirements of laws and regulations. Actions to be taken, suggestions for risks that you can prevent and reduce on your own, remedies for you, and more. We will inform you in the above manner of the incident in a timely manner, and if it is difficult to notify them one by one, we will take a reasonable and effective way to issue an announcement. At the same time, we will proactively report the handling of personal information security incidents in accordance with the requirements of regulatory authorities.

We will update and disclose the relevant contents of security risks, personal information security impact assessment reports, etc. from time to time, which you can obtain through the bulletin board.

Your rights

In accordance with relevant Chinese laws, regulations, standards, and common practices in other countries and regions, we guarantee that you exercise the following rights over your personal information:

1. Access to your personal information

Your account information: You can access your account information through the channels provided in the mobile terminal, change your avatar, nickname, password, etc.

You can browse personal information, modify passwords, add and modify work and education experiences, and bind third-party accounts and other information in the pc terminal-"My Homepage"-"My Settings"-"Account Settings / Personal Information".

You can access your search history through the search box-search list.

Your published reviews, interviews, salary, Q & A, photos, comments, updates, etc .: You can access your posted content through My-"My Q & A", "My Posts" and other pages.

If you are unable to access such personal information through the above link, you can contact us through the contact information published in "X. How to Contact Us" in this Personal Information Protection Policy.

We will provide you with other personal information generated during your use of our products and services as long as we do not need to invest too much. If you would like to exercise access to your data, please contact us through the contact details published in "X. How to Contact Us" in this Personal Information Protection Policy.

2. Correct your personal information

When you find that the personal information we process about you is wrong, you have the right to make corrections or updates to the wrong or incomplete information, and you can make corrections or supplements through the methods listed in "Access to your personal information" . To ensure security, we will verify your identity before you exercise the right to correct.

3. Delete your personal information

In the following situations, you can ask us to delete personal information, and you can contact us at any time through the contact information published in this Personal Information Protection Policy:

3.1. If we violate laws and regulations or agree with you to collect, use, share or transfer your personal information;

3.2. If we violate the laws and regulations or with your agreement to publicly disclose your personal information, you have the right to request that we immediately stop the public disclosure and issue a notice requesting the relevant receiver to delete the corresponding information.

4. If you want to change the scope of authorization, for example:

4.1. You can log in through the [Account Settings] on the PC to release the binding relationship between the sight account and the third-party account.

4.2. You can turn off geographic location, address book, camera, microphone and other permissions in the device's own operating system to change the scope of consent or revoke your authorization.

4.3. After you withdraw your consent or authorization, we cannot continue to provide you with the services corresponding to your withdrawal of consent or authorization, and we will no longer process your corresponding personal information. However, your decision to withdraw consent or authorization will not affect the processing of personal information previously based on your consent or authorization.

5. Cancel your account

You can register the cancellation application by sighting the mobile terminal, or you can submit the cancellation application through the contact information published in this agreement. It is important to note that once you cancel your sighting account, you will no longer be able to use sighting all products and services, and you will not be able to retrieve any information related to the account, including the account balance. So please proceed with caution.

In order to protect the legitimate rights and interests of you or others, we will determine whether to support your cancellation request based on your use of various products and services. For example, if you have an unpaid old bird consultation fee in your sighting account, or if your sighting account is frozen and unfrozen due to anomalies, we may not immediately support your request. Specific operating instructions are subject to the "Cancellation Agreement".

6. Know in advance that products and services will stop operating

Kanzhan is willing to accompany you all the time. If the Kanban platform products and services are forced to stop operating due to special reasons, we will follow the laws and regulations to send a letter or send you an email or other appropriate information on the main page of the product and / or service Will notify you in a way that can reach you, and will stop the collection of your personal information, and will delete or anonymize your personal information in accordance with the law.

7. Respond to your above request

  • For your security, you need to provide a written request or otherwise prove your identity. We may ask you to verify your identity before processing your request.
  • For your reasonable request, we do not charge fees in principle, but for repeated requests that exceed a reasonable limit, we will charge a certain cost as appropriate. For those that are unreasonably repetitive, require excessive technical means (for example, need to develop new systems or fundamentally change existing practices), pose risks to the legitimate rights and interests of others, or are very impractical (for example, involving information stored on backup tapes) The request may be rejected by us.
  • In the following situations, as required by laws and regulations, we will not be able to respond to your above request:
  • Directly related to national security and national defense security;
  • Directly related to public safety, public health, and major public interests;
  • Directly related to crime investigation, prosecution, trial and enforcement of judgment;
  • We have sufficient evidence to show that you have subjective malicious or abusive rights (such as your request will endanger public safety and the legal rights of others, or your request exceeds the scope covered by general technical means and commercial costs);
  • Responding to the request of the personal information subject will cause serious damage to the legitimate rights and interests of you or other individuals and organizations;
  • Involving trade secrets.

How we handle personal information of minors

Sight attaches great importance to the protection of minors' information.

Due to the nature of our products, websites and services, we do not provide services to minors under 16 years of age and therefore do not collect relevant information. If you are a minor between the ages of 16 and 18, we recommend that you ask your guardian to read this Personal Information Protection Policy carefully and use our products and / or services or obtain We provide information.

If your guardian does not agree with your use of our services or the provision of information to us in accordance with this Personal Information Protection Policy, please terminate your use of our services immediately and notify us in time so that we can take appropriate measures.

If the guardian finds that we have collected the personal information of the minor without the consent of the guardian, please contact us through the contact information published in this Personal Information Protection Policy, and we will delete the relevant data as soon as possible.

How your personal information is transferred across borders

In principle, the personal information we collect and generate in China is stored only in China. If some products or services involve cross-border, we need to transfer your personal information overseas, and we will strictly follow the laws and regulations to ensure that your personal information is safe.

How to update this Personal Information Protection Policy

We may revise the content of this Personal Information Protection Policy in due course. If such changes will cause substantial changes in your rights under this Personal Information Protection Policy, we will use the [popup agreement at login] prompt or send you [email] before the changes take effect. inform you.

If you do not agree with these changes, you should stop using the platform's products and services, or request the temporary suspension of your account through the contact information published in this Personal Information Protection Policy. By continuing to use our products and / or services, you agree to be bound by this revised personal information protection policy.

Significant changes referred to in this personal information protection policy include, but are not limited to:

1. Significant changes in our service model. Such as the purpose of processing personal information, the type of personal information processed, the way in which personal information is used, etc .;

2. The main objects of personal information sharing, transfer or public disclosure change;

3. Your rights to participate in the processing of personal information and how you exercise them have changed significantly;

4. Other changes that may have a significant impact on your personal information rights;

5. When the personal information departure situation changes.

10. How to contact us

Company Name: Beijing Huapin Borui Network Technology Co., Ltd.

Registered address: 302, 3 / F, Building 1, No. 16 Yuanyanggong Middle Road, Chaoyang District, Beijing

If you have any comments or suggestions about this personal information protection policy, you can contact us through [customer service email: support@bansabaivillage.com].

In order to ensure that we can deal with your problems efficiently and provide you with timely feedback, you need to submit proof of identity, valid contact information and written requests and relevant evidence. We will process your request after verifying your identity. Under normal circumstances, we will reply within [15] days.

We also have a dedicated department for personal information protection, and you can contact us at secure@bansabaivillage.com.

If you find illegal and bad information, you can contact us at jubao@bansabaivillage.com to report it.

Eleven, dispute resolution

This Personal Information Protection Policy and the Sighting User Agreement together constitute the basic agreement document for your use of the Sighting Service. This "Personal Information Protection Policy" applies to the laws and regulations of the People's Republic of China. If you are dissatisfied with our Personal Information Protection Policy, if you are not satisfied with our response or solution, and you need to resolve it through legal means, you should submit the dispute to the Beijing Arbitration Commission, whose arbitral award is final.

Appendix 1: Definition

Specific words used in this Personal Information Protection Policy have the following meanings:

1. "We" or "seeing" means Beijing Huapin Borui Network Technology Co., Ltd.

2. "You" or "User" means registered users of our products and services and purchasers of paid services.

3. "Jinzhan.com" or "Jinzhan Platform" refers to the sighting website (http://bansabaivillage.com) and the sighting mobile client.

4. "Targeting related parties and partners" means our affiliates, investment companies, partners and other trusted third-party suppliers, service providers and agents.

5. "Our products and services" or "Targeting platform products and services" refer to websites, programs, services, tools and clients including, but not limited to, Kanning.com, BOSS direct employment, store manager direct employment, etc.

6. "Personal information" refers to various types of information recorded electronically or otherwise that can identify the identity of a specific natural person or reflect the activity of a specific natural person, either alone or in combination with other information. Personal information includes basic personal information, personal identification information, personal biometric information, network identification information, personal health and physiological information, personal education work information, personal property information, personal communication information, contact information, personal online records, personal commonly used equipment Information, personal location information, etc. For the avoidance of doubt, personal information includes, but is not limited to, sensitive personal information.

7. "Personal information subject" means a natural person identified by personal information.

8. "Personal sensitive information" refers to personal information that, if leaked, illegally provided or abused, may endanger personal and property safety, which could easily lead to damage to personal reputation, physical and mental health, or discriminatory treatment. Personal sensitive information includes personal property information, personal health and physiological information, personal biometric information, personal identification information, and network identification information.

9. "De-identification" refers to the process by which personal information is technically processed so that it cannot identify the subject of personal information without the aid of additional information.

10. "Anonymization" refers to the process by which the subject of personal information cannot be identified through technical processing of personal information, and the processed information cannot be restored.

11. "China" or "within China" refers to the mainland of the People's Republic of China and is for the purpose of this Personal Information Protection Policy and does not include the Hong Kong Special Administrative Region, Macau Special Administrative Region and Taiwan.

APP
See the official app

Download Sight Official APP

Back to top
Old bird

Enter your phone number and download the sighting app

QR code

Scan code download and see the APP
Or search in major app stores: pinpoint