Creating Joy for everyone
Carry your guitar on your back in bustling places, accompanied by music, and create a happy and beautiful sensory experience in the sunshine.
Special Note:
Smiger (hereinafter referred to as “we”) is well aware of the importance of personal information to users (hereinafter referred to as users or you), and will do its best to protect the safety and reliability of your personal information and privacy. In accordance with laws, regulations, national standards and other regulations, as well as industry best protection practices, the following “smiger Privacy Policy” (hereinafter referred to as this policy or this privacy policy) is formulated.
The key points of this policy are as follows:
1.How we collect your personal information
The products or services we provide include basic business functions and extended business functions. The basic business functions we provide require some information to operate. When you choose to use this business function, you need to provide us or allow us to collect the necessary information. Otherwise, the basic business functions will not function properly and we will not be able to provide you with Services; if you also choose to use extended business functions, you need to provide us or allow us to collect the necessary information for extended business functions, otherwise the extended business functions will not function properly, but it will not affect your use of basic business functions.
2.How we use cookies and similar technologies
To ensure the normal operation of the website, we will store small data files called cookies on your computer or mobile device. Cookies usually contain identifiers, site names, and some numbers and characters. With the help of cookies, the website can remember your user identity and store your preferences.
We will not use Cookies for purposes other than those stated in this policy. You can manage or delete cookies according to your preferences. If your browser allows, you can block cookies through your browser settings. However, if you do so, it may affect your safe access to our website and may require you to change user settings each time you visit our website.
In addition to cookies, we use web beacons (Web Beacons) to collect page visits and clicks; we also use entity tags (Etags) to cache static resources to speed up website access and improve your browsing experience. experience.
3.How we use the information we collect
When smiger provides you with products or services, it is used for identity verification, customer service, security, backup and other purposes to ensure the security of the products and services we provide to you.
In order to improve our products or services, we may de-identify or anonymize the collected information and conduct internal audits, data statistics, data analysis and research, etc. It may be used for commercial purposes, such as external promotion, without disclosing your personal information.
When we want to use information for other purposes not specified in this policy, we will obtain your consent in advance.
When we want to use the information collected for a specific purpose for other purposes, we will obtain your consent in advance.
How we share, transfer and publicly disclose your personal information
4.1 Sharing
We will not share your personal information with any company, organization or individual, except in the following circumstances:
1) Sharing with explicit consent: After obtaining your explicit consent, we will share your personal information with other parties.
2) We may share your personal information externally in accordance with laws and regulations, the needs of litigation or dispute resolution, and the requirements of government departments or judicial authorities.
3) Sharing with affiliated companies: In order to facilitate us and our affiliated companies to provide you with various products or services, verify your identity, identify abnormalities in your account, etc., your personal information may be shared with our affiliated companies. We will only share personal information that is necessary and subject to the purposes stated in this Privacy Policy. If affiliated companies want to change the purpose of processing personal information, they will ask for your authorization and consent again.
4.2 Transfer.
At present, we will not transfer your personal information to any third party outside the company, except in the following circumstances:
1) Transfer with explicit consent: After obtaining your explicit consent, we will transfer your personal information to other third parties.
2) When mergers, acquisitions, asset transfers, etc. are involved, if personal information is transferred, we will require the new company or organization that holds your personal information to continue to be bound by this privacy policy, otherwise we will require the company or organization to continue to be bound by this privacy policy. The organization re-asks for your consent.
4.3 Public disclosure
We will not publicly disclose your personal information except in the following circumstances:
1) After obtaining your explicit consent or based on your active choice.
2) Disclosure based on law: We may publicly disclose your personal information when required by law, legal proceedings, litigation, government authorities or judicial authorities.
4.4 According to laws, regulations and national standards, we may share, transfer, and publicly disclose your personal information in the following situations without your consent:
1) Directly related to national security and national defense security.
2) Directly related to public safety, public health, and major public interests.
3) Directly related to criminal investigation, prosecution, trial and execution of judgments.
4) To protect your or other individuals’ life, property and other major legitimate rights and interests but it is difficult to obtain your consent.
5) Personal information that you disclose to the public on your own.
6) Collect personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels.
5. How we protect your personal information
We strive to adopt various security protection measures to protect the personal information you provide and prevent the data from unauthorized access, public disclosure, use, modification, damage or loss. For example, the data exchanged between your browser and the server is protected by SSL encryption; we provide https secure browsing for the Bismarck website; we will use encryption technology to ensure the confidentiality of data; we will use trusted protection mechanisms to prevent Data is subject to malicious attacks; we will deploy access control mechanisms to ensure that only authorized personnel can access personal information; we will conduct security and personal information protection training to enhance employees’ awareness of the importance of protecting personal information.
Our important information systems have passed the filing and evaluation of Level 3 Cybersecurity Level Protection, and we have established a good communication mechanism with regulatory authorities and third-party evaluation agencies to ensure that network security is carried out in accordance with the technical standards and management specifications of Level 3 Cybersecurity Level Protection. Construction to ensure the security of personal information.
The Internet is not an absolutely secure environment. We strongly recommend that you take active measures to ensure the security of your personal information. For example, please use complex passwords, change your account password regularly, and do not leak personal information such as your account password to others. If your personal information is unauthorized accessed, publicly disclosed, tampered with or destroyed due to our fault, resulting in damage to your legitimate rights and interests, we will bear the corresponding legal liability.
If a personal information security incident unfortunately occurs, we will activate an emergency plan in accordance with the requirements of laws and regulations to prevent the security incident from expanding, and inform you in the form of push notifications, announcements, etc. At the same time, we will also proactively report the handling of personal information security incidents in accordance with the requirements of regulatory authorities.