Believe Privacy Policy
【Special Tips】
This policy applies to Believe PC, Believe mobile APP, other Believe related websites, APPs and services (hereinafter collectively referred to as " Believe "), the company name of Believe operator is WISVERSE Social MEDIA LLC . Before using Believe , please be sure to carefully read and thoroughly understand this policy (especially the content in bold), and use Believe services only after confirming that you fully understand and agree to it .
If you have any questions, comments or suggestions about the content of this policy, you can contact our customer service through the contact information stated in this policy. If you disagree with any terms in this policy, you should stop visiting Believe immediately . While reading this policy, if you disagree with the relevant agreement or any of the terms and conditions therein, you should stop using Believe immediately . Once you start using Believe , it means that you have fully understood and fully agreed to this policy.
Introductio
WISVERSE Social MEDIA LLC (hereinafter referred to as "we") is fully aware of the importance of personal information to you and will do its best to protect your personal information. We are committed to maintaining your trust in us and abiding by the following principles to protect your personal information: the principle of consistency of rights and responsibilities, the principle of clear purpose, the principle of choice and consent, the principle of minimum necessity, the principle of ensuring security, the principle of subject participation, the principle of openness and transparency, etc.
At the same time, we promise that we will take appropriate security measures to protect your personal information in accordance with the industry's mature security standards. Please read and understand this policy carefully before using our products (or services). This policy will help you understand the following:
1. How do we collect and use your personal information?
2、How do we use cookies and similar technologies?
3、How do we share, transfer, and publicly disclose your personal information?
4、How do we protect your personal information?
5、Your Rights
6、How do we handle personal information of minors?
7、How your personal information is transferred globally
8、How to update this policy
9、How to contact us
10、Keyword explanation
We strictly keep the collected user information confidential and establish a sound user information protection system to provide reliable and secure services to every user:
1. Be clear
We will explain the Privacy Policy to you in plain language as much as possible so that you can have a clearer understanding of how we protect and process your information collected.
2. Protecting rights and interests
We will take adequate and reasonable measures to protect your privacy rights and interests.
3. Respect users
We respect the free exercise of users' rights such as right to choose and right to know, and allow you to manage your personal information.
4. Necessary safety
We will only collect necessary information and use it to provide you with safe and detailed services.
5. Be timely and considerate
We will always listen to your inquiries and answer your questions as soon as possible.
1. How do we collect and use your personal information?
When you use our products and/or services, we need/may need to collect and use the following two types of your personal information:
1. In order to provide you with the basic functions of our products and/or services, you must authorize us to collect and use the necessary information. If you refuse to provide the corresponding information, you will not be able to use our products and/or services normally;
2. In order to provide you with additional functions of our products and/or services, you may choose to authorize us to collect and use information. If you refuse to provide, you will not be able to use the relevant additional functions normally or achieve the functional effects we intend to achieve, but it will not affect your normal use of the basic functions of our products and/or services.
You understand and agree that: We are committed to creating a variety of products and services to meet your needs. Because we provide you with a wide variety of products and services, and different users choose to use different specific product/service scopes, the basic/additional functions and the types and scope of personal information collected and used will be different accordingly. Please refer to the specific product/service functions; in order to bring you a better product and service experience, we are continuously working to improve our technology, and we may launch new or optimized functions from time to time, which may require the collection and use of new personal information or change the purpose or method of using personal information. In this regard, we will separately explain to you the purpose, scope and use of the corresponding information by updating this policy, pop-up windows, page prompts, etc., and provide you with a way to choose your consent, and collect and use it after obtaining your explicit consent. In this process, if you have any questions, comments or suggestions, you can contact us through the contact information provided in the How to Contact Us section of this policy, and we will answer you as soon as possible.
We will collect the following information for the following purposes described in this policy and when providing the following services:
1. Functions required to use Believe
1. Help you become our user. When you register a Believe account, in order to complete the account creation, you need to provide at least the following information for us to collect: mobile phone permissions, mobile phone number, invitation code or third-party account information (if you have one), etc. This information is collected to help you complete the Believe account registration, obtain a Believe account, and protect the security of your Believe account. We will verify whether your identity is valid by sending a text message verification code or verifying a third-party account. Your mobile phone number is personal sensitive information. This information is collected to meet the network real-name system requirements of national laws and regulations and to complete the registration of a Believe account. If you do not provide this information, you may not be able to use our services normally.
After you register a Believe account, you can provide us with your profile picture, registered recommender, driver's license, address, nickname, signature, ID card and other information. In addition, you can also choose to bind your code library account information. This information helps us provide you with more personalized services and recommendations, but refusing to provide this information will not affect your use of other features of Believe . You can also change this information through Believe 's " Personal Profile Settings ".
The above information you provide will continue to be used by us during your use of this service. We will keep your information until you cancel your account. When you cancel your account, we will stop using and delete the above information.
2. Provide you with consulting information display and search services. In order to enable you to quickly find the consulting services you need, we may collect the device information (including device name, device model, device identification code, operating system and application version, language setting, resolution, service provider network ID (PLMN)) and browser type you use for our products and/or services to provide you with the best way to display consulting information. We will also use your personal information to continuously improve and optimize the above functions.
You can also use search to accurately find the consulting object and consulting service you need. We will retain your search content to facilitate your repeated input. Please note that your search keyword information cannot identify you alone and does not belong to your personal information. We have the right to use it for any purpose; only when your search keyword information is used in combination with your other information and can identify you, we will treat your search keyword information as your personal information during the combined use period, and process and protect it together with your search history in accordance with this policy.
In order to show you the consulting information and service information that you are interested in, or to show you the information you may want to find when you search, we may collect your order information, browsing information, etc. for data analysis to form a user portrait. We may also obtain other information about you for the reasonable needs of providing services and improving service quality, including the relevant information you provide when you contact customer service, the questionnaire response information you send to us when you participate in the questionnaire survey, and the relevant information we obtain when you interact with our affiliates and our partners. We may associate the information collected from your various devices so that we can provide you with consistent services on these devices. We may combine information from a service with information from other services to provide you with services, personalized content and suggestions. If you do not want to be affected by personalized content, you can choose to browse and find information and services by category on the "Expert Zone" page; without your explicit consent, we will not provide your relevant personal information to third parties.
During the use, if you provide the following additional information, it will help us provide you with better services and experience: personal profile, occupation, company, hometown, hobbies, age, gender (hereinafter referred to as "personal information"). However, if you do not provide this information, it will not affect the basic business functions of the service. Your personal profile, occupation, company, hometown, hobbies, age, and gender are personal sensitive information, and such information is collected only for the purpose of authenticating your identity.
The above information you provide will continue to be used by us during your use of this service. We will keep your information until you cancel your account. When you cancel your account, we will stop using and delete the above information. The above information is only stored in Dubai, UNITED ARAB EMIRATES . If cross-border transmission is required, we will obtain your authorization and consent separately.
3. Necessary to ensure transaction security. In order to improve the security of your system when using our products and/or services, more accurately prevent phishing fraud and protect account security, we may determine your account risk by understanding your browsing information, order information, your frequently used software information, device information, etc., and may record some links ("URLS") that we believe are risky; we will also collect your device information to analyze Believe system problems, count traffic and check for possible risks, and check when you choose to send us abnormal information.
(II) Situations in which you may choose to provide personal information
In order to provide you with more convenient, higher quality, and personalized products and/or services and strive to improve your experience, we may collect and use your personal information in the following additional services provided to you. If you do not provide this information, it will not affect your use of Believe 's basic services such as chat and search, but you may not be able to obtain the user experience brought to you by these additional services. These additional services include:
1. Personalized recommendation service based on location information
We will access your location information after you enable location permission, and provide you with page displays and services that better suit your needs based on your location information, such as recommending nearby Believe user consulting services, nearby people, sending friends circles, etc.
2. Additional services based on camera/camera
After enabling the camera/camera permission, you can use this function to scan QR codes to add friends, take photos or videos for chatting, sharing, and perform face recognition functions authorized by you in specific scenarios. When you use this additional function for face recognition, we will collect your facial features and use them strictly within the scope of your authorization. If we intend to use your facial information to provide you with other products and/or service functions in the future, we will confirm with you again.
3. Additional services for accessing and uploading pictures/videos based on albums (picture libraries/video libraries)
After enabling the photo album permission, you can use this function to upload your photos/pictures/videos to change your avatar, post comments, chat, share, or communicate with customer service to provide proof, etc. We may use the photos/pictures you upload to identify the information you want to express or the services you require, or use the comment information containing the photos or pictures you uploaded.
4. Additional services related to microphone-based voice technology
After turning on the microphone permission, you can use the microphone to chat, consult, contact customer service, or interact with the customer service robot by voice. In these functions, we will collect your recording content to identify your consulting service needs, or respond to your customer service and dispute resolution needs. Please be aware that even if you have agreed to turn on the microphone permission, we will only obtain voice information through the microphone when you actively click the microphone icon in the client or record a video.
5. Additional services based on address book information
We will collect your address book information after you enable address book permissions so that you can more conveniently access the contact information in your address book when using Believe without having to enter it manually; in addition, with your consent, we may also collect your contacts' names and phone numbers in encrypted form to help you determine whether your contacts in your address book are also our members and then establish connections for your communication in the Believe software.
You understand and agree that the above additional services may require you to enable access to your location information (geolocation), camera, photo album, microphone (voice), and address book in your device to enable the collection and use of information involved in these permissions. You can view the status of the above permissions item by item in your device settings, and you can decide to turn these permissions on or off at any time. Please note that when you enable any permission, it means that you authorize us to collect and use relevant personal information to provide you with the corresponding services. Once you turn off any permission, it means that you cancel the authorization, and we will no longer continue to collect and use relevant personal information based on the corresponding permission, and we will not be able to provide you with the services corresponding to the permission. However, your decision to turn off the permission will not affect the collection and use of information previously based on your authorization.
(III) In accordance with relevant laws, regulations and national standards, we may collect and use your personal information without seeking your authorization or consent in the following circumstances:
1. Directly related to national security, national defense security and other national interests;
2. Directly related to major public interests such as public safety, public health, and public knowledge;
3. Directly related to criminal investigation, prosecution, trial and execution of judgment;
4. To protect your or other people's life, property, reputation and other major legal rights and interests in accordance with the law, but it is difficult to obtain the consent of the person concerned;
5. The personal information collected is disclosed to the public by you on your own initiative;
6. Collecting personal information from legally disclosed information, such as legal news reports, government information disclosure and other channels;
7. Necessary for signing and performing a contract according to your request;
8. Necessary for maintaining the safe and stable operation of the products and services we provide, such as discovering and handling failures in the network operation platform;
9. Necessary for legitimate news reporting;
10. When it is necessary to conduct statistical or academic research for the public interest and the results of academic research or description are provided to the outside, the personal information contained in the results shall be de-identified;
11. Other circumstances prescribed by laws and regulations.
(IV) Rules for the use of your personal information
1. We will use your personal information in accordance with the provisions of this Policy. When we want to use your personal information for other purposes not specified in this Policy, or use information collected for a specific purpose for other purposes, we will seek your consent in advance.
2. After collecting your personal information, we may de-identify the data through technical means. De-identified information cannot be used to re-identify you. According to the law, we have the right to use and share de-identified information for commercial applications such as data analysis.
3. All personal information that you provide or authorize us to query and collect when using our products and receiving services will continue to be authorized for us to use during your use of our products and receiving services, unless you submit a deletion application (except for customer identity information and customer transaction information that financial institutions are required to retain in accordance with relevant laws and financial regulatory laws and regulations) and receive our response.
4. When you need to use mobile phones or other devices to clearly display your personal information when using our products and receiving services, we will process your information in ways including anonymization and replacing some information with symbols to protect the security of your information.
5. We will inform you of the personal sensitive information collected by the core and additional functions of the network operation platform through methods such as the dedicated privacy policy column on the website and each mobile platform, and clearly inform you of the impact of refusing to provide or refusing to agree, such as you will not be able to use the corresponding core functions or additional functions to receive related services, to ensure that you decide whether to provide or authorize us to query, collect, and share your personal sensitive information on a fully informed basis.
2. How do we use cookies and similar technologies?
1. Use of Cookies
To ensure the normal operation of the software, we will store small data files called cookies on your mobile device. Cookies usually contain identifiers, site names, and some numbers and characters. With cookies, websites can store data such as your browsing history.
We will not use cookies for any purpose other than those described in this policy. You can manage or delete cookies according to your preferences by changing the user settings each time you visit our website. If your browser or browser plug-in allows, you can also refuse our use of cookies, except where our website must use cookies to prevent third-party fraud. In this exception, if you still refuse our use of cookies, it may prevent you from receiving services through our website, but it will not affect your normal acceptance of other services we provide through channels other than the website.
(II) Use of technologies such as web beacons
In addition to Cookies, we also use other similar technologies such as web beacons (or "pixel tags") on our websites. Web beacons are usually a tool embedded in a website or email to collect data such as your visit history. These technologies are currently commonly used by Internet service providers to improve their services. With the help of pixel tags in emails, we can know whether the email has been opened. If you do not want us to know your activities in this way, you can unsubscribe from our emails at any time.
3. Do Not Track
Many web browsers have a Do Not Track feature that sends a Do Not Track notification to websites. Track requests. Currently, major Internet standards organizations have not established policies to dictate how websites should respond to such requests. However, if your browser has Do Not Track enabled, Track, then all our websites will respect your choice.
III. How do we share, transfer, and publicly disclose your personal information?
1. Sharing
1. We will not share your personal information with any company, organization or individual other than Believe service providers, except in the following circumstances:
1.1 Obtain your explicit consent or authorization in advance;
1.2 Provide information as required by applicable laws and regulations, legal procedures, mandatory administrative or judicial requirements;
1.3 To the extent permitted by laws and regulations, it is necessary to provide information in order to protect the interests, property or safety of Believe , Believe 's affiliates or partners, you or other Believe users or the general public from damage;
1.4 Only by sharing your personal information can we realize the core functions of our products and/or services or provide the services you need;
1.5 To handle disputes or controversies between you and others upon your request;
1.6 Comply with the relevant agreements signed with you (including online electronic agreements and corresponding platform rules) or other legal documents;
1.7 Personal information that you disclose to the public on your own initiative;
1.8 We collect personal information from legally disclosed information, such as legal news reports, government information disclosure and other channels;
1.9 Use for academic research;
1.10 Use based on social public interests in accordance with laws and regulations.
2. We may share your personal information with our affiliates. However, we will only share necessary personal information and it will be subject to the purposes stated in this policy. If our affiliates want to change the purpose of processing personal information, they will ask for your authorization and consent again.
3. We may share your consultation information, account information, device information and location information with partners and other third parties to ensure the smooth completion of the services provided to you. However, we will only share your personal information for legal, legitimate, necessary, specific and clear purposes, and will only share personal information necessary to provide services. Our partners have no right to use the shared personal information for any other purpose. Our partners include the following types:
3.1 Suppliers of goods or technical services. We may share your personal information with third parties that support our functions. The purpose of sharing this information is to enable the core shopping functions of our products and/or services.
3.2 Third-party merchants. We must share your order information and necessary transaction-related information with third-party merchants to fulfill your needs to purchase goods or services from them and enable them to complete subsequent after-sales services.
3.3 Partners who entrust us to carry out promotions. Sometimes we provide promotional services to user groups who use our products and/or services on behalf of other companies. We may share your personal information and the indirect user profile formed by the collection of your non-personal information with partners who entrust us to carry out promotions ("entrusting parties"), but we will only provide these entrusting parties with information on the coverage and effectiveness of the promotions, and will not provide your personally identifiable information, or we will aggregate this information so that it does not identify you personally.
4. We will sign strict confidentiality agreements with companies, organizations and individuals with whom we share personal information, requiring them to handle personal information in accordance with our instructions, this policy and any other relevant confidentiality and security measures. In the use of personal sensitive data, we require third parties to use data desensitization and encryption technology to better protect user data.
5. Exchange information with other companies and organizations in order to comply with the law, enforce or apply our Terms of Use and other agreements, or to protect the rights, property or safety of Believe , you or other Believe customers, such as to prevent illegal activities such as fraud and reduce credit risk. However, this does not include selling, renting, sharing or otherwise disclosing personal information for profit in violation of the commitments made in this Policy.
(II) Transfer
We will not transfer your personal information to any company, organization or individual, except in the following circumstances:
1. Obtain your explicit consent or authorization in advance;
2. Provide information as required by applicable laws and regulations, legal procedures, mandatory administrative or judicial requirements;
3. Comply with the relevant agreements signed with you (including online electronic agreements and corresponding platform rules) or other legal documents;
4. In the event of a merger, acquisition, asset transfer or similar transaction, if personal information is transferred, we will require the new company or organization that holds your personal information to continue to be bound by this Policy. Otherwise, we will require the company or organization to re-solicit your authorization and consent.
(III) Public Disclosure
We will only disclose your personal information in the following circumstances and only after taking security measures that meet industry standards:
1. Disclose the personal information you specify in accordance with your needs and in the disclosure method you explicitly consent to;
2. In the event that your personal information must be provided in accordance with the requirements of laws and regulations, mandatory administrative law enforcement or judicial requirements, we may publicly disclose your personal information based on the type of personal information and disclosure method required. Subject to compliance with laws and regulations, when we receive a request to disclose the above information, we will require the production of corresponding legal documents, such as a subpoena or investigation letter. We firmly believe that the information we are asked to provide should be as transparent as possible within the scope permitted by law. We carefully review all requests to ensure that they have a legal basis and are limited to data that law enforcement agencies have a legal right to obtain for specific investigation purposes. Subject to the permission of laws and regulations, the documents we disclose are protected by encryption keys.
(IV) Exceptions to obtaining prior authorization and consent when sharing, transferring, or publicly disclosing personal information : In the following circumstances, sharing, transferring, or publicly disclosing your personal information does not require your prior authorization and consent:
1. Directly related to national security, national defense security and other national interests;
2. Directly related to major public interests such as public safety, public health, and public knowledge;
3. Directly related to criminal investigation, prosecution, trial and execution of judgment;
4. To protect your or other people's life, property, reputation and other major legal rights and interests in accordance with the law, but it is difficult to obtain the consent of the person concerned;
5. The personal information collected is disclosed to the public by you on your own initiative;
6. Collecting personal information from legally disclosed information, such as legal news reports, government information disclosure and other channels.
According to legal provisions, sharing and transferring of de-identified personal information, while ensuring that the data recipient cannot restore and re-identify the subject of the personal information, does not constitute external sharing, transfer or public disclosure of personal information, and the storage and processing of such data will not require additional notification to you and your consent.
IV. How do we protect your personal information?
(I) Our technologies and measures to protect your personal information
In order to protect your information security, we will strictly abide by the technical measures and operating procedures required by laws, regulations and other normative documents to protect the confidentiality of your information. At the same time:
1. We have used security measures that meet industry standards to protect the personal information you provide and prevent the data from being unauthorized access, improper public disclosure, improper use, improper modification, damage or loss (hereinafter referred to as "Personal Information Security Incident"). We will take all reasonable and feasible measures to protect your personal information. For example, we have adopted SSL encryption protection when exchanging data between your browser and the service; we will use encryption technology to ensure the confidentiality of data; we will use trusted protection mechanisms to prevent data from being maliciously attacked; we will deploy access control mechanisms to ensure that only authorized personnel can access personal information; we and our partners connect through dedicated lines to isolate Internet risks; and we will hold security and privacy protection training courses to enhance employees' awareness of the importance of protecting personal information and other security measures.
2. We will take reasonable and feasible measures to try our best to avoid collecting irrelevant personal information. We will only retain your personal information for the period necessary to achieve the purposes stated in this policy, unless the retention period needs to be extended or is permitted by law.
3. The Internet is not absolutely safe. It is impossible to determine whether email, instant messaging, social software and other communication methods with other users are completely encrypted. We recommend that you use complex passwords when using such tools to help us protect the security of your account and personal information.
4. We will conduct cybersecurity risk assessments and data outbound security assessments in accordance with relevant cybersecurity laws and regulations , and carry out personal information security impact assessments in accordance with relevant national standards.
5. We will do our best to ensure the security of any personal information you provide or authorize us to query and collect. If our physical protection, technical means or management measures are damaged, resulting in a personal information security incident, we will bear the corresponding legal liability in accordance with the law.
6. Due to technical limitations and various malicious means that may exist in the outside world, we cannot rule out the possibility of personal information security incidents that we cannot control. When a personal information security incident occurs or is likely to occur, we will immediately take remedial measures and report to you and the relevant competent authorities in a timely manner in accordance with regulations. We will promptly inform you of the relevant circumstances of the incident by email, letter, phone call, push notification, etc. When it is difficult to inform you one by one, we will take reasonable and effective means to issue an announcement.
(II) Storage of your personal information
1. Your personal information will be stored in Dubai, UNITED ARAB EMIRATES . If cross-border transmission is required, we will obtain your authorization and consent separately and require the recipient to process such personal information in accordance with our instructions, this policy and any other relevant confidentiality and security measures.
2. Please note that when you successfully apply to cancel your Believe account, we will complete the cancellation review of your account within 72 hours of your application. After the review is passed, we will delete or anonymize your personal information.
3. If we terminate our services or operations, we will notify you at least 30 working days in advance and delete or anonymize your personal information after the termination of the services or operations.
V. Your Rights
We attach great importance to your concern about personal information and do our best to protect your rights to access, correct, delete and withdraw consent to your personal information so that you have full ability to protect your privacy and security. Your rights include:
(I) Accessing your personal information
In addition to your device information collected to enhance your user experience and ensure transaction security, you can access your other personal information by yourself through Believe "My->Settings": including but not limited to account identity information, delivery address, privacy security, associated account information, contact information, etc.
(II) Correcting your personal information
If you find that your personal information is incorrect, you can modify your contact information and other related information in Believe's "My -> Settings -> Account and Security". Key information such as account identity information can be described and submitted in Believe's "My -> Settings -> Problem Feedback". The customer service staff will verify your identity and handle it.
(III) Deleting your personal information
If you find that we have collected, used, shared or publicly disclosed your personal information in violation of the provisions of laws, administrative regulations or the agreement between the two parties, you have the right to request us to delete your personal information. You can describe the problem in Believe's "My -> Settings -> Problem Feedback" and submit a deletion application. After the customer service staff verifies your identity, they will delete your personal information according to your request.
You may request us to delete your personal information in the following circumstances:
1. If our handling of personal information violates laws and regulations;
2. If we collect and use your personal information without your explicit consent;
3. If our handling of personal information seriously violates our agreement with you;
4. If you no longer use our products or services, or you actively cancel your account;
5. If we permanently stop providing products or services to you.
If we decide to respond to your deletion request, we will also notify the entities that obtained your personal information from us and request them to delete it in a timely manner, unless otherwise provided by laws and regulations, or these entities obtain your independent authorization. If we respond to your deletion request, we may not be able to immediately delete the corresponding information from the backup system due to applicable laws and security technologies. We will securely store your personal information and isolate it from any further processing until the backup can be cleared or anonymized.
(IV) Methods for cancelling authorization or changing the scope of authorization
You can change the scope of your authorization for us to continue to collect personal information or withdraw your authorization by deleting information, turning off device functions, or setting up privacy and security in Believe . You can also withdraw all authorizations for us to continue to collect your personal information by logging out of your account.
Please understand that each business function requires some basic personal information to be completed. Once you withdraw your consent or authorization, we will no longer be able to provide you with the services corresponding to the withdrawal of consent or authorization, and will no longer process your corresponding personal information. However, your decision to withdraw your consent or authorization will not affect the processing of personal information previously carried out based on your authorization.
(V) Account cancellation
After you cancel your account, we will stop providing products and/or services to you, and based on your request, unless otherwise provided by laws and regulations, we will delete or anonymize your personal information.
(6) Constraint information system automatic decision-making
In some business functions, we may make decisions solely based on non-human automated decision-making mechanisms such as information systems and algorithms. If these decisions significantly affect your legitimate rights and interests, you have the right to ask us for an explanation, and we will provide appropriate remedies without infringing on Believe's business secrets or other user rights and public interests.
(7) Respond to your above request
If you are unable to access, correct or delete your personal information through the above methods, or you need to access, correct or delete other personal information generated by your use of Believe , or you believe that we have violated any laws and regulations or the agreement with you on the collection or use of personal information, you can contact us through the contact information set out in this policy. For security reasons, you may need to provide a written request or prove your identity in other ways. We may ask you to verify your identity before processing your request.
We will respond within 30 working days after verifying your user identity. If you are not satisfied, you can also file a complaint through the Believe customer service platform.
In principle, we do not charge any fees for your reasonable requests, but we will charge a certain fee for repeated requests that exceed reasonable limits. We may reject requests that do not directly relate to your identity, that are unnecessarily repeated, or that require too many technical means (for example, the development of new systems or fundamental changes to existing practices), that pose risks to the legitimate rights and interests of others, or that are impractical.
In the following circumstances, we will be unable to respond to your request in accordance with laws and regulations:
1. Related to the personal information controller’s performance of obligations prescribed by laws and regulations;
2. Directly related to national security, national defense security and other national interests;
3. Directly related to major public interests such as public safety, public health, and public knowledge;
4. Directly related to criminal investigation, prosecution, trial and execution of judgment;
5. The personal information controller has sufficient evidence to show that the personal information subject has subjective malice or abuses his rights;
6. To protect your or other people's life, property, reputation and other major legal rights and interests in accordance with the law, but it is difficult to obtain the consent of the person concerned;
7. Responding to the request of the Personal Information Subject will cause serious damage to the legitimate rights and interests of the Personal Information Subject or other individuals or organizations;
8. Involving trade secrets.
VI. How do we handle personal information of minors?
(I) Our products, websites and services are primarily intended for adults. Minors under the age of 14 should not create a principal account on Believe that contains their personal information.
(II) We attach great importance to the protection of minors’ personal information. If you are a minor under the age of 18, you should obtain your guardian’s consent before using our products and/or services. We protect minors’ personal information in accordance with relevant national laws and regulations.
(III) We will not actively collect personal information from minors. In the case of collecting personal information of minors with the consent of their guardians, we will only use, share, transfer or disclose this information when permitted by law, with the consent of the guardian or when necessary to protect minors.
(IV) If there is evidence that a minor has registered for and used our products and/or services without the consent of their guardian, we will consult with the relevant guardian and try to delete the relevant personal information as soon as possible .
(V) Although the definition of children varies in laws and customs of different countries, we regard anyone under the age of 14 as a child. We further take the following measures to protect the personal information of children under the age of 14 that may be involved:
1. For the collected children’s personal information, in addition to complying with the provisions of this Privacy Policy regarding user personal information, we will also adhere to the principles of legitimate necessity, informed consent, clear purpose, security, and legal use, and strictly follow the requirements of relevant laws and regulations to store, use, and disclose it, and will not exceed the period necessary to achieve the purpose of collection and use. After the expiration of the period, we will delete or anonymize the children’s personal information;
2. When you, as a guardian, choose to use relevant services for your child, we may need to collect the child’s personal information from you for the purpose of providing you with relevant services. If it is necessary to collect children’s personal information from you in specific services, we will obtain your authorization and consent in advance and inform you of the purpose and use of the collection. If you do not provide the above information, you will not be able to enjoy the relevant services we provide. As a guardian, you should properly perform your guardianship duties and protect the safety of children’s personal information. If the child himself needs to register or use our products and/or services, you should correctly guide and supervise him;
3. Children or their guardians have the right to access and correct their personal information at any time, and can also make requests to us for correction and deletion. If you have any comments, suggestions, complaints or reports on matters related to children's personal information, please contact us. We will be happy to help you at any time.
VII. How your personal information is transferred globally
The personal information we collect and generate in the course of our operations in Dubai, UNITED ARAB EMIRATES is stored in Dubai , except in the following circumstances:
(1) The applicable law has clear provisions;
(2) Obtain your explicit authorization;
(3) Your personal proactive behavior such as conducting cross-border transactions through the Internet.
In response to the above situations, we will ensure that your personal information is adequately protected in accordance with this policy.
8. How to update this policy
Our Privacy Policy may change.
Without your explicit consent, we will not limit your rights under this policy. We will publish any changes to the privacy policy on a dedicated page.
For major changes, we will also provide more prominent notifications (including we will notify you in a public way through Believe or even provide you with a pop-up prompt).
Major changes referred to in this policy include but are not limited to:
(1) Major changes in our service model, such as the purpose of processing personal information, the types of personal information processed, the use of personal information, etc.;
(2) We have major changes in control rights, such as changes in information controllers caused by mergers, acquisitions, reorganizations, etc.;
(3) The main recipients of personal information sharing, transfer or public disclosure change;
(4) Significant changes in your rights to participate in the processing of personal information and the way in which you exercise them;
(5) Changes in our responsible departments, contact information and complaint channels responsible for handling personal information security;
(6) The personal information security impact assessment report indicates a high risk.
IX. How to contact us
(I) If you have any questions, comments or suggestions regarding this Policy or your personal information, please contact WISVERSE Social MEDIA LLC .
Email of the person in charge of personal information protection:
You can also contact us at any time by visiting the online customer service system or sending emails .
(II) Generally, we will respond within 30 working days after verifying your user identity. If you are not satisfied with our response, especially if our personal information processing behavior has harmed your legal rights and interests, you can file a complaint or report to the network regulatory department. You can also seek a solution by filing a lawsuit in the court with jurisdiction over the defendant's place of residence.
10. Keyword explanation
Personal information: refers to various information recorded electronically or otherwise that can identify a specific natural person alone or in combination with other information or reflect the activities of a specific natural person. The personal information covered in this policy includes: basic information (including personal name, birthday, gender, address, personal telephone number, email address); personal identity information (including ID card, passport, driver's license, etc.); facial features; network identity information (including system account, IP address, email address and passwords, passwords, password protection answers related to the above); personal property information (including virtual asset information ); address book; personal Internet records (including website browsing records, software usage records, click records); personal commonly used device information (including hardware model, device MAC address, operating system type, software list unique device identification code (such as IMEI/android Information describing the basic situation of personal commonly used devices, including ID/IDFA/OPENUDID/GUID, SIM card IMSI information, etc.); personal location information (including itinerary information, precise positioning information, longitude and latitude, etc.) and other personal information.