We also provide a Simplified Chinese version of this document.
This article is based on the EU General Data Protection Regulation and its related policy documents, and the principle of data sharing exemptions is intended to safeguard the interests of other users or society as a whole.
Normally, when we carry out data processing, your personal data will only be processed by automated processes, i.e. no organisation or individual will have access to any of your data during the data processing process. This document sets out when we may process or transfer your personal data without your permission.
To respond to relevant legal requirements:
In order to respond to the requirements of the relevant government and law enforcement authorities, your data may be required by the above subjects to be transferred to the relevant judicial bodies for manual processing with legal purposes and legal basis with due process and justifiable reasons, during which you may not be able to exercise some of your data rights (such as deletion of data, anonymisation of data, etc.), and in order to comply with the regulations of the relevant authorities on confidentiality, we may not be able to inform you of the relevant data processing at the first time. In order to comply with the confidentiality requirements of the relevant authorities, we may not be able to inform you in the first instance of the details of the relevant data processing.
We publicly disclose the amount of user data we receive through this channel, which can be obtained by sending an email to [email protected](this data includes the percentage of data disclosed, the requesting party and the fingerprint of the event).
At the same time, we will do our best to ensure that your data is protected from infringement, and that any organisation requesting your data will need to comply with local legal documentation, which will need to be provided by the requesting organisation for different types of data:
For non-content data (known in law as: non-content data)
For non-content data (known in law as: non-content data): summons or local document of the same legal nature is required.
For content data (known in law as: content data)
Requires: search warrant, court order, or local document of the same legal nature.
Special requirements for dealing with content about child sexual exploitation and abuse:
We have zero tolerance for any illegal pornographic content about children, and we will share some non-sensitive, anonymous data with National Centre for Missing and Exploited Children (NCMEC) and relevant law enforcement agencies, subject to legal compliance.
We invoke Directive 2002/58/EC of the European Union Regulation (EU) 2021/1232 for video and image files stored on our servers. image files stored on our servers, we compare file fingerprints (i.e., file hashes) with the Hash Set of Images of Child Sexual Exploitation and Abuse reported by the NCMEC in order to prevent users from storing or distributing illegal content using our services.
It is important to note that this check only involves image and video files, which are identified by their file fingerprints (i.e., irreversible “hashes”), and that the verification process is conducted securely and locally throughout the entire process; at the same time, because the NCMEC-provided set of hashes will be updated dynamically, we may check your uploaded image and video files back at certain intervals. At the same time, as the hash sets provided by NCMEC are dynamically updated, we may scan back your uploaded images and video files at certain intervals to ensure the security of the service.
It is worth noting that the data to which this entry applies does not include your private data (i.e. data that can only be accessed by the data subject), and in general terms all your unshared files are not subject to the content of this entry, but as user avatars, nicknames and profiles may be publicly displayed in some applications, the above three types of data are not considered private data.
We use the UNSC Consolidated Sanctions List as a principle to determine whether there is any terrorist content in the data, and in general your data will not be actively checked by us, when other users report to us (potential) terrorist content. potential) terrorist content to us, we detect the content with the help of machine recognition and manual inspection. When we confirm that the content is indeed terrorist content, we will remove the relevant content you have posted and notify you.