Professional Documents
Culture Documents
Money Digger Privacy Policy PDF
Money Digger Privacy Policy PDF
Money Digger Privacy Policy PDF
(1)Collection of Information
The data we collect depends on the context of your interactions with us, the choices you
make, including your privacy settings, and the products and features you use. The data we
collect can include SDK/API/JS code version, browser, Internet service provider, IP address,
platform, timestamp, application identifier, application version, application distribution
channel, independent device identifier, ad identifier (IDFA), Android ad master identifier, the
equipment model, the terminal manufacturer, the terminal device operating system version,
the session start / stop time, the location of the language, the time zone and the network
state (WiFi and so on) etc.
For example, some of our services require you to sign up with your social media account or
phone number. When you do, we’ll ask for personal information like your email address,
telephone number to store with your account. If you want to take full advantage of the
sharing features we offer, we might also ask you to register with a Facebook account or
telephone number, which may include your Facebook name and photo.
Whenever you use our services, we aim to provide you with access to your personal
information. If that information is wrong, we strive to give you ways to update it quickly or to
delete it – unless we have to keep that information for legitimate business or legal purposes.
We aim to maintain our services in a manner that protects information from accidental or
malicious destruction. Because of this, after you delete information from our services, we
may not immediately delete residual copies from our active servers and may not remove
information from our backup systems.
We also share personal data with vendors or agents working on our behalf for the purposes
described in this privacy policy. For example, companies we've hired to provide data
analytical services may need collect and access to personal data to provide those functions.
In such cases, these companies must abide by our data privacy and security requirements.
If Wallet Tech is involved in a merger, acquisition or asset sale, we will continue to ensure
the confidentiality of any personal information and give affected users notice before personal
information is transferred or becomes subject to a different privacy policy.
(4)Information security:
We work hard to protect Wallet Tech and our users from unauthorized access to or
unauthorized alteration, disclosure or destruction of information we hold. In particular:
• We encrypt many of our service using SSL.
• We review our information collection, storage and processing practices, including physical
security measures, to guard against unauthorized access to systems.
• We restrict access to personal information to Wallet Tech employees, contractors and
agents who need to know that information in order to process it for us, and who are subject
to strict contractual confidentiality obligations and may be disciplined or terminated if they fail
to meet these obligations.
We keep your personal information private and safe — and put you in control.