This Policy applies to the products and services of Honeygram, and prior to using the products and services of Honeygram, you must read this Policy carefully and thoroughly understand this Policy, and use the relevant products or services upon confirming that you fully understand and agree to this Policy. By starting to use the various products or services of Honeygram, you have fully understood and agreed to this Policy. If you have any questions, opinions or suggestions concerning the content of this Policy, please use the various contact details provided by Honeygram to contact us.
1. How We Collect and Use Your Personal Information
Personal information means various types of information recorded by electronic or other means that can, independently or in combination with other information, identify a specific natural person or reflect the activities of a specific natural person. We will collect and use your personal information for the following purposes set forth in this Policy:
To complete the creation of your account so that we can provide you with services, you are required to provide the following information: your mobile phone number, email address, profile photo, nickname and gender, and create a username and password. For the purpose of service and notice, we may send mails and messages to you through the information aforesaid.
Relevant personal information that you provide to us when registering for an account or using our services, such as your mobile phone number, email address, bank card number;
shared information that you provide to another party by using our services, and the information stored when you use our services. You shall ensure that you have obtained the authorization and consent of such party before you provide Honeygram with the aforementioned personal information of the party.
When you use our face recognition service, you specifically agree to the collection of your facial recognition information by us or another party.
To provide you with results that better meet your requirements and identify abnormal account activity, we will collect information about your use of services and how you use the services, and associate the information that shall include the following.
Device information: we will receive and record information about the device you use, such as the device model, operating system version, device settings, unique device identifier and other information on software and hardware features, and information about the location of the device, such as the IP address, GPS location and Wi-Fi access point, Bluetooth, base station and other sensor information that can provide relevant information, based on the specific permissions that you grant when installing and using the software.
Please note that device information, log information, etc., cannot be independently used to identify information on a specific natural person. If we combine such non-personal information with other information to identify a specific natural person, or use the same in combination with personal information, such non-personal information shall be deemed to be personal information during the period in which the information is used in combination with personal information, and unless authorized by you or otherwise provided for by laws and legislations, we will anonymize or de-identify such personal information.
When you contact us, we may store your correspondence/call records and content or contact details or other information left by you for the purpose of contacting you or helping you resolve issues, or recording the handling plan and outcomes of relevant issues.
To improve the security of your use of the services provided by us and our affiliates and partners, protect the personal safety of and prevent infringement of the property of yourself, other users, or the public, take better measures against phishing websites, fraud, network vulnerabilities, computer viruses, cyberattacks, network intrusions and other security risks, and more accurately recognize violations of laws and legislations or the provisions of relevant agreements and regulations of Honeygram, we may use or combine your user information, transaction information, device information, related network logs and information shared by our affiliates and partners with your authorization or in accordance with the law to comprehensively determine your account and transaction risks, conduct identity verification, detect and prevent security incidents, and conduct the necessary recording, audit, analysis and disposal measures in accordance with the law.
We will obtain your prior consent when using the information for any other purpose not covered by this Policy, or using the information collected for a particular purpose for any other purpose.
According to the provisions of relevant laws and legislations, we are not required to obtain your authorization and consent when collecting your personal information in the following circumstances: (I) the personal information is related to national security and the security of national defense; (II) the personal information is related to public security, public health and significant public interests; (III) the personal information is related to the investigation of a crime, prosecutions, trials, judgment executions, etc.; (IV) the personal information is collected for the protection of the life, property and other significant legitimate rights and interests of the subject of the personal information or another person, and it is difficult to obtain your consent; (V) the personal information that is collected has been publicly disclosed to the general public at your own discretion; (VI) the personal information is information that has been lawfully and publicly disclosed, such as lawful news reports, government information disclosures and other channels; (VII) the personal information is necessary for signing and entering into this contract as required by you; (VIII) the personal information is necessary for maintaining the secure and stable operations of the products or services provided, such as detecting and attending to malfunctions in the products or services; (IX) the personal information is necessary for lawful news reporting; (X) the personal information is necessary for academic research institutions to carry out statistical or academic research on the basis of public interests, and when the results of academic research or descriptions are externally provided, the personal information contained in such results shall be de-identified; (XI) other circumstances provided for by laws and legislations.
If we cease operations of the products or services of Honeygram, we will cease further collection of your personal information in a timely manner, notify you of the cease in the operations by sending a notice to every user or through an announcement, and delete or anonymize the personal information held by us.
To ensure the normal operations of the website, secure easier access for you and recommend content that may be of interest to you, we will store small data files called cookies on your computer or mobile device. Cookies often contain identifiers, site names and some numbers and characters. Cookies allow the website to store your preferences and other data.
2.2 Web Beacons and Pixel Tags Aside from cookies, we may also use web beacons, pixel tags and other similar technologies on the website. For example, an email that we send you may contain a link to content on our website, and if you click this link, we will track this click to help us understand your preferences for products or services so that we can proactively improve the customer service experience. A web beacon is usually a transparent image embedded in a website or in an email. A pixel tag in an email allows us to know whether the email has been opened. If you do not wish to have your activity tracked in such ways, you may unsubscribe from our mailing list at any time.
3. How We Share, Transfer, and Publicly Disclose Your Personal Information
We will not share your personal information with any company, organization and individual other than the service providers of Honeygram, except in the following circumstances.
3.1.1 Sharing upon obtaining your express consent: we will share your personal information with another party upon obtaining your express consent.
3.1.2 Sharing when required by law: we may externally share your personal information in accordance with the provisions of laws and legislations, based on the requirements of resolving actions and disputes or as legally required by an administrative or judicial authority.
3.1.3 Sharing with affiliates: your personal information may be shared with our affiliates to facilitate our joint provision of services to you based on the associated account, recommend information that may be of interest to you or protect the personal safety of and prevent infringement of the property of the affiliates of Honeygram, other users of Honeygram or the public. We will only share the necessary personal information, such as sharing your necessary account information with our affiliates to facilitate your use of the Honeygram account and the products or services of the affiliates, and we will seek your authorization and consent again if we share your sensitive personal information or the affiliates change the purpose for using and processing your personal information.
We will not transfer your personal information to any company, organization and individual, except in the following circumstances.
(I) Transferring upon obtaining your express consent: we will transfer your personal information to another party upon obtaining your express consent.
(II) In the case of a merger, acquisition or bankruptcy liquidation, or in other circumstances involving a merger, acquisition or bankruptcy liquidation, if the transfer of personal information is involved, we will require the new company and organization holding your personal information to continue to be bound by this Policy, otherwise, we will require such company, organization and individual to seek your authorization and consent again.
3.3 Public Disclosure
We will only publicly disclose your personal information in the following circumstances:
(I) we may publicly disclose your personal information upon obtaining your express consent or based on your proactive choice;
(II) if we establish your violation of laws and legislations or severe violation of the provisions of relevant agreements and regulations of Honeygram, or in order to protect the personal safety of and prevent infringement of the property of the users of Honeygram and its affiliates or the public, we may disclose your personal information, including relevant violations and the measures taken by Honeygram against you, upon obtaining your consent in accordance with laws and legislations or the provisions of relevant agreements and regulations of Honeygram.
3.4 Exceptions to Obtaining Prior Authorization and Consent when Sharing, Transferring and Publicly Disclosing Personal Information
We are not required to obtain your prior authorization and consent when sharing, transferring and publicly disclosing your personal information in the following circumstances:
(I) the personal information is related to national security and the security of national defense;
(II) the personal information is related to public security, public health and significant public interests;
(III) the personal information is related to the investigation of a crime, prosecutions, trials, judgment executions, etc.;
(IV) the personal information is collected for the protection of the life, property and other significant legitimate rights and interests of the subject of the personal information or another person, and it is difficult to obtain your consent;
(V) the personal information that is collected has been publicly disclosed to the general public at your own discretion;
(VI) the personal information is information that has been lawfully and publicly disclosed, such as lawful news reports, government information disclosures and other channels;
In accordance with laws and legislations, the sharing and transfer of personal information that has been de-identified with the condition that the data recipient cannot restore and re-identify the subject of the personal information shall not constitute sharing, transfer and public disclosure of personal information, and we are not required to notify you or seek your consent when storing and processing such data.
4. How We Protect the Security of Your Personal Information
4.1 We have adopted reasonably practicable security protection measures that are in line with universally adopted solutions in the industry to protect the security of personal information provided by you, and prevent the unauthorized access, public disclosure, use, modification, damage or loss of personal information. For example, data exchanged between your browser and the server is encrypted with the SSL (Secure Socket Layer) protocol; we will use encryption techniques to improve the security of personal information; we will use trusted protection mechanisms to prevent malicious attacks on personal information; we will deploy an access control mechanism, and exercise our best efforts to ensure that only authorized personnel have access to personal information; and we will organize security and privacy protection training programs to enhance employees' awareness of the importance of protecting personal information.
4.2 We have an industry-leading data security management system addressing the data lifecycle with data at the core, and improve the security of the whole system in multiple dimensions ranging from organizational development, system design, personnel management, product technology and other aspects.
4.3 We will exercise our best efforts to avoid collecting irrelevant personal information by taking reasonably practicable measures. We will only retain your personal information for as long as necessary to fulfill the purposes set forth in this Policy, except where it is necessary to prolong the retention period or permitted by law.
4.4 As the Internet is not an absolutely secure environment, we strongly advise against sending personal information using communication methods that are not recommended by Honeygram. You can establish contact and share with others through our services. When you establish communication, conduct a transaction or share through our services, you can independently choose who you want to communicate, transact or share with as the third party who can see relevant information such as your transaction content, contact details, exchanges or shared content.
Please contact the relevant personnel of Honeygram's user service immediately if you find that your personal information especially your account or password has been divulged, so that we can take the corresponding measures according to your request.
Please note that when you use our services, the information you share voluntarily or even publicly may involve personal information or even sensitive personal information about yourself or others, such as when you choose to upload pictures containing personal information. Please give more prudent consideration as to whether to share or even publicly share relevant information when using our services.
Please use complex passwords to help us keep your account secure. We will exercise our best efforts to ensure the security of any information you send us.
At the same time, we will also report the disposal of personal information security incidents in accordance with the requirements of regulatory authorities.
5. How You Can Manage Your Personal Information
You can access and manage your personal information in the following ways:
5.1 Accessing Your Personal Information
You have the right to access your personal information, except in exceptional circumstances provided for by laws and legislations. You can access your personal information on your own by the following means:
Profile-If you wish to access or edit the nickname, profile photo, signature, job and address information, interests, questions and answers, etc., in your profile, you can view the profile by clicking the profile photo on the left side of the page on Honeygram
If you are unable to access such personal information through the above-mentioned path, you can contact us via[Settings-Feedback and Suggestions].
5.2 Correcting or Supplementing Your Personal Information
If you find an error in your personal information processed by us, you have the right to require us to correct or supplement the personal information. You can submit an application to correct or supplement the personal information through the approach specified in Clause '(5.1) Accessing Your Personal Information' in this section.
5.3 Deleting Your Personal Information
You can delete part of your personal information through the approach specified in Clause '(5.1) Accessing Your Personal Information' in this section. You can request us to delete the personal information in the following circumstances: You can delete part of your personal information through the approach specified in Clause '(5.1) Accessing Your Personal Information' in this section. You can request us to delete the personal information in the following circumstances: (I) if our processing of personal information violates laws and legislations; (II) if we collect and use your personal information without obtaining your express consent; (III) if our processing of the personal information is in material breach of our agreement with you; (IV) if you no longer use our products or services; (V) if we will never provide you with products or services again. If we decide to respond to your request for deletion, we will also exercise our best efforts to notify the parties who have obtained your personal information from us, and request them to delete the personal information in a timely manner, except as otherwise provided for by laws and legislations, or when these parties have obtained your separate authorization. When you delete the information from our services, we may not immediately delete the corresponding information in the backup system, but will delete such information when the backup is updated.
5.4 Changing the Scope of Your Authorization and Consent
5.6 Responding to Your Above-mentioned Request
7. How Your Personal Information Is Transferred Globally
Sharing of information sometimes involves cross-border data transfers. We use standard contract clauses approved by the suitable regulatory authority to permit data transfers from one jurisdiction to another. Standard contractual clauses are commitments between companies transferring personal data, binding them to protect the privacy and security of your data.
9. How to Contact Us
You can contact us through the customer service channel under [Settings-Help & Feedback] on Honeygram, or sending e-mails to firstname.lastname@example.org, and we will respond to your request within 30 days. If you are unsatisfied with our reply, and particularly if you believe that our processing of personal information damages your legitimate rights and interests, you can also seek resolution by filing an action with the court with jurisdiction in the domicile of the defendant.