SmartFarmers Policy

Contact Email:frank@faithfultech.cn

The User Service Agreement and Privacy Policy (hereinafter referred to as the \"Agreement\") and its terms establish the agreement between you and The Software (hereinafter referred to as the \"Software\") that describes your rights and obligations with the Software. \n Before registration, be sure to read the content of this Agreement carefully and fully understand the contents of each clause. If you have any objection, you may choose not to enter the software. Once you confirm this User registration Agreement, this Agreement shall have legal effect between you and the Software, which means that you fully agree to and accept all terms of this Agreement. Please read carefully and choose to accept or reject the agreement (minors should read in the presence of a legal guardian). \n User use: \n Users become users of the software after completing all the registration steps as prompted on the page. Users should keep their account and password by themselves and use their account and password accurately and securely. The software can be set by the user to provide users with personalized information services. \ n users fully understand and agree that the software provides users with personalized information service, the user shall be responsible for own behavior under registered account, including user import, upload, transmit any content and the resulting consequences, the contents of the user response to the software on its own judgments, and take all the risks caused by the use of content. The software shall not be liable for the losses caused by the user's behavior. \n Users shall be responsible for the authenticity, legality and validity of the information transmitted on the software, and any legal responsibility related to the information transmitted by users shall be borne by users themselves, which has nothing to do with the software. Any content recorded by users in the software or transmitted through the software service does not reflect the views or policies of the software, and the Software shall not be liable for this. \n The personal information provided or published by users is untrue, inaccurate or illegal; If the published content does not comply with this Agreement or laws and regulations, the Software has the right to suspend or terminate the user's use of the platform. If a user has any objection to the suspension or termination of the Software or the recall of his/her account, the customer may submit comments to the Platform and require the Platform to continue to provide services. The software receives complaints and comments from customers on such information, will review the relevant information and give feedback to users in a timely manner. If the information is truly untrue or inaccurate or illegal and valid, the software platform requires users to provide information that meets the requirements. \n In order to avoid data loss of user terminals and better serve users, the software will provide data backup service to registered users. With the authorization of registered users, the software will upload the data stored in the software database on the registered user terminals to the software server and provide the service of recovering to the terminal equipment. \n Users shall not use the software services to produce, upload, copy, publish, disseminate or reprint the following contents: \n Oppose the basic principles defined in the Constitution; Endanger state security, divulge state secrets, subvert state power or undermine national unity; N harm to the honor and interests of the state; \n Inciting ethnic hatred, ethnic discrimination or undermining ethnic unity; [n] undermining the state's religious policy, propagating cult and feudal superstition; \n Spreading rumors, disturbing social order or undermining social stability; N spreading obscenity, pornography, gambling, violence, murder, terror or abetting a crime; \n Insulting or slandering others or infringing upon the legitimate rights and interests of others; \n Other contents prohibited by laws and administrative regulations. \ n this software has the right to review on the content of the users, if the user implementation in violation of the rules mentioned in this article and the behavior of the laws and regulations, have the right to depending on the severity of the software platform, according to the tort liability act \"information network transmission right protection ordinance and other laws and regulations require the user to immediately take corrective, correction, restorable, eliminate the influence behavior, The Software has the right to take legal, effective and necessary measures (including but not limited to changing or deleting relevant infringing information, suspending or terminating users' use of the Network services, etc.), and the software reserves the right to further hold users legally liable. \ n at the same time, the BBS community edition piece initiator, managers should fulfill corresponding to rights, laws and regulations, this agreement obligations, in violation of laws and regulations and agreement and poor performance of the obligations of the service provider shall be in accordance with some restrictions () infringement info related to change or delete, suspend or cancel its administrative authority, until banned or shut down the relevant accounts, section. \n Users are forbidden to deliberately promote other competitive platforms in any form such as text, voice or picture; It is also prohibited to publicize contact information other than that of the software in the same way. If there is a need for chat, the audience can be informed to use the software for private message contact. \n Some functions of the software will incur information charges, which shall be subject to the prices published by the telecom operators. The fees shall be borne by the users themselves. \n The services provided by the Software may contain advertisements, and users agree to display advertisements provided by the Software and third-party suppliers and partners during use. Any dispute between a user and a third party over the services or products provided by the third party shall be settled by the user and the third party, and the Software shall not be liable. \n The Software reserves the right to unilaterally change, suspend, restrict, terminate or revoke all or part of the service content provided by its server at any time without any notice due to business development needs. \n Live broadcast master should try to promote the growth of visitors, self-reliance; Negative conclusions should be avoided to cause negative implication to users, or make users rely on the anchor in their future life. \n Anchors can get star tickets by giving gifts from listeners. \n Live broadcast will consume the power of communication equipment and shorten the use time of equipment; In the process of live streaming, it is necessary to make preparations for charging, so as to avoid the effect of live streaming being affected by sudden drop. \n Privacy Policy: \n The Software respects and protects the personal privacy of all users who use the service, attaches great importance to the protection of users' privacy and personal information. This Privacy Policy helps you understand what data we collect, why we collect such data, what we do with such data and how to protect such data. \ n we will be on the basis of the network security law of the People's Republic of China, the personal information security standard of information security technology, and other relevant laws and regulations, mature industry safety standards collection and this agreement agreed to use your personal information, except as otherwise provided in this privacy policy, without your prior consent, The software will not disclose or provide such information to any third party. \n Scope of collection and use of personal information. \n Account registration: when you register and log in to the software account, you should at least provide us with the account name, profile picture, mobile phone number or email, and create a password. After successful registration, the above information provided by you will continue to authorize us to use for the duration of your use of the software platform and services. When you log out of your account, we will stop using and delete the above information or anonymize your personal information, unless otherwise stipulated by laws and regulations. \n After successful registration, we may collect the following information: \n Device information: in order to enable us to provide services to you on the device, we may associate your device information or phone number with your account, and collect device attribute information, device status information, device link information. \n Identity authentication service: This software provides identity authentication service. When you apply to be a user of this software for your identity authentication, we need to collect your date of birth, time, place of birth related identification information. \n Information release function: after you register successfully, you can release information on this software platform. We will review the content of the information from time to time and save the content according to the laws and regulations. \n Browsing, following and collecting function: you can browse the published information that you have followed or have added friends, we will review the record information of your browsing, following and collecting, automatically collect the details of your use of the software, and save the content according to the legal provisions. \n Display and Push Content: Using the collected information, we will provide you with search results, personalized content, user research, analysis and statistics. \n Search function: When you use the search function provided by the software, we will collect the keyword information you query and other information and content details you read or requested when using the software services. Such keyword information usually does not identify you personally, is not your personal information and is not covered by these guidelines. Only when your search term information is linked to other information of yours and can identify you personally, we will treat and protect your search term information as your personal information during the combined use, along with your search history, in accordance with these Guidelines. \n Calendar privileges: used to allow users to see personalized horoscopes in the calendar. We may also provide you with information of interest through your personal information provided by you. \n Customer Service: We may use your name, mobile phone number, email address and other personal information provided by you for the convenience of contacting you when you lodge a complaint, suggestion or consultation with the software or when the software resolves a complaint. If you refuse to provide the above information, we may not be able to timely feedback the results of your complaint, appeal or consultation. \n Additional business functions of the Software products and/or services \n In order to provide you with better products and services, we may need to collect the following information. If you refuse to provide the following information, it will not affect your normal use of the business functions of the software described in Item 1.2 of this article, but we cannot provide you with some specific functions and services. \n Positioning function: GPS address and location information will be used for more convenient calculation of constellation information; When you enable the device location function and use the location-based services provided by the software, we will collect information about your location. \n Microphone permission, Bluetooth permission, camera permission: the main user listens to or uses the voice service, the authentication process facial recognition. \n Photo album permission: The user can use the default app profile picture. If the user chooses the profile picture, we will transfer the photo album permission to know the user's profile picture selection and replacement profile picture. \n We may indirectly obtain your personal Information from a third party \n Indirectly obtain your personal Information from a third party: When you use a third-party account to log in to the Software, you have authorized the software to obtain your registered and public information. The public information (including nicknames and avatars) that you have registered, published and recorded on the third-party platform. \n Other Uses: When we use the information for other uses not specified in this Privacy Policy, we will seek your prior consent. \n In accordance with the requirements of laws and regulations, we will not be able to meet your above request in the following cases: \n Related to national security and national interest; \n Related to public safety and public interest; \n Is related to the material interests of you or a third party and may cause serious damage; N directly related to crime, judicial procedure, governmental procedure, etc.; \n You have subjective malice or abuse of rights (such as your request will endanger public safety and other people's legitimate rights and interests, or your request beyond the general technical means and business costs can cover the scope); \n Where trade secrets are involved; \n How we Protect Your Personal Information \n In order to prevent the loss of your information, unauthorized access, public disclosure, disclosure, transfer and other damage to your personal information, the Software Platform will take all reasonable, reliable and feasible plans and measures to protect the security of your personal information. \n Security measures: \n We will collect, use, store and transmit user information in accordance with national security standards and laws and regulations, and inform you of the purpose and scope of use of the information through the user agreement and privacy policy. At the same time, we encrypt personal information to ensure data confidentiality and security. \n Sign confidentiality agreements for employees' information contacts, and conduct regular training on security ability and awareness. Only authorized employees can access personal information. If they violate the confidentiality agreement, they will be held legally liable. \n Strictly select partners, conduct background checks on them, and cooperate with well-known and reputable enterprises; Sign a confidentiality agreement with the information contact of the partner to stipulate the liability for breach of contract and provide only necessary and reasonable information. \n Set up a security team, which is responsible for developing and applying security technologies and procedures to ensure the security of the software platform and personal information. We will conduct background checks on the heads of security teams and information technology, sign confidentiality agreements, agree on the legal responsibilities for leaks, and continue to train them on their security capabilities and awareness. \n We have established a sound information security management system and internal security incident disposal mechanism. \n Retention period \n During your use of the software products and services, we will keep your personal information for you. If you change your personal information, we will save the changed information. \n If you cancel your account, we will not use your personal information again, and we will save your information and anonymize it in accordance with the network Security Law and other laws and regulations. Security event notification \ n \ n we will Internet security incident early warning in advance, timely disposal system vulnerabilities, computer viruses, network attacks, network intrusion and other security risks, the harm of network security incidents, we will immediately start emergency plans, take appropriate remedial measures, and report to relevant departments in accordance with the relevant provisions. \ n if personal information security incidents, we will set aside personal information by you (including mobile phone number, email address, etc.) in a timely manner to inform you that, and inform you that your case progress and effect, we will joint security team, legal, department jointly take positive and effective means of processing, to take remedial measures to reduce risk. At the same time, we will take the initiative to report security incidents according to the requirements of relevant government departments and laws and regulations, and may take legal measures to resolve security incidents. \n If we decide to change our Privacy Policy, we will publish these changes in this Policy and where we deem appropriate so that you understand how we collect and use your personal information, who has access to it, and under what circumstances we will disclose it. \n Your Right to Manage Your Personal Information \n We take your personal information very seriously, and do our best to protect your rights to access, correct, delete and withdraw your personal information, so that you have the full ability to protect your privacy and security. Your rights include: n access and correction of your personal information \nA. In addition to the provisions of laws and regulations, you have the right to access and correction of your personal information at any time, including: you can access or modify your email information, password, user name through [me]; \n Delete your personal information \n We provide the following ways on the software App to help you delete the information you posted on the software. 
 you can through [community → my post], delete the information you show in the community; 
 you can go through [my → follow], cancel your follow record; 
 you can through [my → Settings], cancel the fortune reminder; 
 You can go through [my → Settings], cancel the private message switch. \n You may request us to delete personal information in the following circumstances: \n If our handling of personal information violates laws and regulations; \n If we collect or use your personal Information without your consent; \n If our handling of personal information violates our agreement with you; \n If you have logged out of the software account; \n If we terminate the service and operation. \n Once the above deletion request is responded, we will also notify the third party entities that have obtained your personal information from the software (for example, using the software account as a third party login