Y2mate mp4 knows the importance of personal information to you and will do its best to protect your personal information. We are committed to maintaining your trust in US and abide by the following principles to protect your personal information: the principle of consistent rights and responsibilities, the principle of clear purpose, the principle of choice and consent, the principle of minimum adequacy, the principle of ensuring security, the principle of subject participation, the principle of openness and transparency, etc. At the same time, we promise that we will take corresponding security protection measures to protect your personal information according to the mature security standards in the industry.
1. How do we collect and use your personal information
Personal information refers to all kinds of information recorded electronically or in other ways that can identify the identity of a specific natural person or reflect the activities of a specific natural person alone or in combination with other information.
We collect data based on your interaction with us and your choices, including your privacy settings and the products and features you use. The data we collect may include SDK / API / JS code version, browser, Internet service provider, IP address, location, platform, timestamp, application identifier, application version, application distribution channel, independent device identifier, IOS advertising identifier (IDFA), Android advertiser identifier, network card (MAC) address, international mobile device identification code (IMEI), device model, terminal manufacturer Terminal device operating system version, session start / stop time, language location, time zone and network status (WiFi, etc.), hard disk, CPU and battery usage, etc.
When we want to use the information for other purposes not specified in this policy, we will seek your consent in advance.
When we want to use the information collected for a specific purpose for other purposes, we will ask for your consent in advance.
To ensure the normal operation of the website, we will store a small data file named cookie on your computer or mobile device. Cookies usually contain identifiers, site names, and numbers and characters. With the help of cookies, the website can store data such as your preferences or goods in the shopping basket.
Website beacons and pixel Tags
In addition to cookies, we will also use other similar technologies such as website beacons and pixel tags on the website. For example, the email we send you may contain a click URL that links to the content of our website. If you click this link, we will track this click to help us understand your product or service preferences and improve customer service. A website beacon is usually a transparent image embedded in a website or email. With the help of pixel labels in e-mail, we can know whether the e-mail is opened or not. If you don't want your activities to be tracked in this way, you can unsubscribe from our mailing list at any time.
Do Not Track
Many web browsers are equipped with do not track function, which can publish do not track requests to websites. At present, the major Internet standards organizations have not set up relevant policies to specify how websites should respond to such requests. However, if your browser enables do not track, all our websites will respect your choice.
How do we share, transfer and publicly disclose your personal information
Y2mate mp4 will not share your personal information with any other company, organization or individual, except for the following circumstances:
1. Share with explicit consent: after obtaining your explicit consent, we will share your personal information with other parties.
2. We may share your personal information in accordance with laws and regulations or the mandatory requirements of the competent government departments.
transfer the possession of
We will not transfer your personal information to any company, organization or individual, except for the following circumstances:
1. Transfer with explicit consent: after obtaining your explicit consent, we will transfer your personal information to other parties;
We will only publicly disclose your personal information under the following circumstances:
1. With your express consent;
2. Disclosure based on Law: we may publicly disclose your personal information when required by law, legal procedures, litigation or government authorities.
How do we protect your personal information
We have used industry standard security measures to protect the personal information provided by you from unauthorized access, public disclosure, use, modification, damage or loss. We will take all reasonable and feasible measures to protect your personal information. For example, when exchanging data (such as credit card information) between your browser and the "service", it is protected by SSL encryption; We also provide HTTPS safe browsing for our website; We will use encryption technology to ensure the confidentiality of data; We will use trusted protection mechanisms to prevent malicious attacks on data; We will deploy an access control mechanism to ensure that only authorized personnel can access personal information; And we will hold security and privacy protection training courses to enhance employees' awareness of the importance of protecting personal information.
We will take all reasonable and feasible measures to ensure that irrelevant personal information is not collected. We will only retain your personal information for the period required to achieve the purpose stated in the cost policy, unless the retention period needs to be extended or permitted by law.
The Internet is not an absolutely secure environment, and e-mail, instant messaging and communication with other users are not encrypted. We strongly recommend that you do not send personal information in this way. Please use a complex password to help us ensure the security of your account.
The Internet environment is not 100% secure. We will try our best to ensure or guarantee the security of any information you send us. If our physical, technical or management protection facilities are damaged, resulting in unauthorized access, public disclosure, tampering or destruction of information, resulting in damage to your legitimate rights and interests, we will bear corresponding legal liabilities.
After the unfortunate personal information security incident, we will timely inform you of the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, the suggestions you can independently prevent and reduce the risk, and the remedial measures for you in accordance with the requirements of laws and regulations. We will timely inform you of the relevant information of the event by email, letter, telephone, push notification, etc. when it is difficult to inform the personal information subject one by one, we will take a reasonable and effective way to make an announcement.
At the same time, we will also actively report the disposal of personal information security incidents in accordance with the requirements of regulatory authorities.
In accordance with relevant laws, regulations, standards and the prevailing practices of other countries and regions, we guarantee that you exercise the following rights to your personal information:
Access your personal information
You have the right to access your personal information, except for exceptions provided by laws and regulations. If you want to exercise data access, you can access it by yourself in the following ways:
Search information - you can access or clear your search history, view and modify interests, and manage other data in your browser.
If you cannot access these personal information through the above link, you can contact us at any time using our web form or send us an email. We will reply to your visit request within 30 days.
We will provide you with other personal information generated in the process of using our products or services as long as we don't need too much investment. If you want to exercise data access, please email us.
Correct your personal information
When you find that there are errors in your personal information processed by us, you have the right to ask us to make corrections. You can apply for correction through the methods listed in "(I) access your personal information".
If you cannot correct these personal information through the above link, you can contact us at any time using our web form or send us an email. We will reply to your request for correction within 30 days.
Delete your personal information
You can request us to delete your personal information in the following cases:
If our handling of personal information violates laws and regulations; If we collect and use your personal information without your consent; If our handling of personal information violates the agreement with you; If you no longer use our products or services, or you cancel your account; If we no longer provide you with products or services.
If we decide to respond to your deletion request, we will also notify the entities that obtain your personal information from us and ask them to delete it in time, unless otherwise stipulated by laws and regulations, or these entities have obtained your independent authorization.
When you delete information from our service, we may not delete the corresponding information in the backup system immediately, but we will delete it when the backup is updated.
Change the scope of your authorization and consent
Each business function needs some basic personal information to be completed. For the collection and use of additional collected personal information, you can give or withdraw your authorization and consent at any time.
You can operate by yourself in the following ways:
When you withdraw your consent, we will no longer process the corresponding personal information. However, your decision to withdraw your consent will not affect the previous personal information processing based on your authorization.
Automatic decision of constraint information system
In some business functions, we may only make decisions based on non manual automatic decision-making mechanisms such as information systems and algorithms. If these decisions significantly affect your legitimate rights and interests, you have the right to ask us for an explanation, and we will also provide appropriate remedies.
Respond to your above request
For security, you may need to provide a written request or otherwise prove your identity. We may ask you to verify your identity before processing your request. We will reply within 30 days.
In principle, we will not charge for your reasonable request, but we will charge a certain cost for repeated requests that exceed the reasonable limit. We may reject requests that are unreasonably repeated, require too many technical means (e.g., need to develop new systems or fundamentally change current practices), pose a risk to the legitimate rights and interests of others, or are very impractical (e.g., involve information stored on backup tapes).
Under the following circumstances, we will not be able to respond to your request in accordance with the requirements of laws and regulations:
Related to national security and national defense security; Related to public safety, public health and major public interests; Related to criminal investigation, prosecution and trial; There is sufficient evidence that you have subjective malice or abuse of power; Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals and organizations.
How does your personal information move around the world
As we provide products or services through resources and servers all over the world, this means that after obtaining your authorization and consent, your personal information may be transferred to or accessed from overseas jurisdictions in the countries / regions where you use the products or services.
Such jurisdictions may have different data protection laws or even no relevant laws. In such cases, we will ensure that your personal information is adequately and equally protected. For example, we will ask for your consent to the cross-border transfer of personal information, or implement security measures such as data De identification before cross-border data transfer.
How to contact us
Email: [email protected]
Generally, we will reply within seven working days.