Home   > Privacy Policy

 


Slide
Privacy Policy

User Personal Information Protection and Privacy Policy Agreement
Updated: March 10, 2022
Effective date of this Privacy Policy: March 10, 2021
Version of this Privacy Policy: 2022 V1
 

Introduction
Shenzhen MicroBT Electronics Technology Co., Ltd. (here in after referred to as “MicroBT” or “we”) respects and protects all personal privacy and information related to the use of Micro Bit website (www.whatsminer.com) Safety. In view of this, MicroBT has formulated this “Users’ Personal Information Protection and Privacy Policy Agreement” (here in after referred to as “this Policy”) to confirm with you about the collection, use, sharing, matters related to the disclosure, storage and protection of your personal information.
 
This policy applies to all products and services offered on our platform. We and our affiliates use products or services provided by MicroBT in their products or services. If there is no independent privacy policy, this policy also applies to those products or services; if a product or service has a separate privacy policy, The corresponding product or service shall be subject to the corresponding privacy information protection policy.
 

It should be noted that this policy does not apply to the products or services provided to you by other third parties, and the products or services provided to you by the third party shall be subject to the privacy information protection policy explained to you by the third party. This policy is only for the behavior of MicroBT.
 

MicroBT is well aware of the importance of personal information to you, and will do its best to protect the safety and reliability of your personal information. We are committed to maintaining your trust in us and abide by the following principles to protect your personal information: the principle of consistency of rights and responsibilities, the principle of clear purpose, the principle of choice and consent, the principle of minimum necessity, the principle of ensuring security, the principle of subject participation, the principle of openness and transparency, etc. At the same time, MicroBT promises to take corresponding security protection measures to protect your personal information in accordance with the mature security standards in the industry.
 

Please read and understand this policy carefully before using our products or services. Especially the terms marked in bold, you should read them carefully, and start using them after confirming your full understanding and agreement. If you have any questions, comments or suggestions about the content of this policy, you can contact us through the various contact methods provided by MicroBT. If you/your guardian does not agree with any content of this policy, you should immediately stop using all products and services provided by our platform. When you use MicroBT products and/or services, you agree to and understand the entire content of this policy.
 

This policy will help you understand the following:
1. Definition
2. How we collect and use your personal information
3. How we use cookies and similar technologies
4. How do we share, transfer and publicly disclose your personal information
5. How we store your personal information
6. How we protect the security of your personal information
7. How we handle the personal information of minors
8. Your rights
9. How to update this policy
10. How to contact us

 

1. Definition

1. Personal information: Various information recorded electronically or in other ways that can identify a specific natural person or reflect the activities of a specific natural person alone or in combination with other information.

2. Personal sensitive information: including ID number, personal biometric information, bank account, communication records and content, property information, credit information, whereabouts, accommodation information, health and physiological information, transaction information, children under the age of 14 (inclusive) Personal information, etc. (We will highlight specific personal sensitive information in bold in this policy).

3. Deletion of personal information: The act of removing personal information from the system involved in the realization of daily business functions, so that it remains in a state where it cannot be retrieved or accessed.

4. Children: refers to minors under the age of 14.

5. Affiliate: Refers to any enterprise that controls MicroBT, or is controlled by MicroBT, or is jointly controlled by the same entity as MicroBT. Control means directly or indirectly owning more than fifty percent (50%) of the equity, voting or management rights of the enterprise, or controlling the management rights of the enterprise through agreement.
 

2. How we collect and use your personal information
When you use the products or services provided by our platform, we need/may need to collect and use your personal information:
For the information necessary to use the basic functions of our products or services, in order to ensure the normal operation of the products or services, you must authorize us to collect and use them, otherwise you will not be able to use our products or services normally.
For the information that may be required to use the additional functions of our products or services, you can choose whether to authorize us to collect and use it. If you refuse to provide it, the additional functions will not be able to be realized or the effect we intend to achieve will not be affected, but it will not affect your normal use of basic functions.
Please understand and agree that due to the diversity of products and services we provide and the differences in the scope of specific products or services that different users choose to use, the basic/additional functions and the type and scope of personal information collected and used may vary. The difference, please refer to the specific product or function.

Please understand and agree that, based on the purpose of continuously improving products and services, we will launch optimization functions from time to time, which may increase or change the scope, purpose and method of collecting and using personal information. In this regard, we will update this policy and separately explain the scope, purpose and method of personal information collection to you through page prompts, website announcements, etc. to obtain your consent.
 
The functions/scenarios where you authorize us to collect and use your personal information when using our products or services include:

1. When you visit our website, we may collect your necessary device information (device model, operating system version, unique device identifier (IDFA, AndroidID), login IP address, operation log, MAC address). We collect the aforementioned information to assign you a unique identifier, and record your operation information based on the identifier, that is, your search, browsing, playing/reading and other operation records, and save it in the form of log files. In addition, during your use, we may apply for your storage permission in order to record your log information and cache content. If you refuse to provide the aforementioned information, our products or services will not function properly, and we will not be able to serve you.

2. When you use the registration and login functions, we will collect some information (mobile phone number, email address, nickname, password) that you provide to us to identify you individually or in combination. We collect the aforementioned information to complete the registration process, provide you with products or services exclusively for registered users, protect the security of your account. If you refuse to provide the above information, you will not be able to complete the registration, but it will not affect your normal use of our other functions.

3. When you log in with an account on a third-party platform (such as twitter and facebook), we will obtain the avatar, nickname, gender (specifically subject to your authorization) and authentication information of the third-party account according to your authorization. We collect this information to provide you with account login services and to protect your account security and prevent security risks. If you refuse to authorize such information, you will not be able to use the account of the third-party platform to log in to our platform, but it will not affect your normal use of our other functions.

4. You can choose to update your personal information, which will help us to understand you better and provide you with better services and improve your service experience. If you refuse to provide this information, will affect us to provide you with more personalized services, but it will not affect your normal use of our other functions.

5. When you use account security settings, you can set a security question to retrieve your password if you forget it. If you refuse to provide this information, it will not affect your normal use of our other functions.

6. When you use the password retrieval function, you can log in to your email address and SMS to verify your password, but during this process, you are required to provide some information to verify your identity. If you refuse to provide this information, it will not affect your normal use of our other functions.

7. When you participate in the activities we conduct/jointly conduct, such as lottery draws and quizzes, you need to provide us with the personal information necessary for your participation in the activities. For example, when you do luck draw and collect tickets, you need to provide us with your name, ID number, and mobile phone number so that we can issue tickets for you. If you refuse to provide the above information, you will not be able to participate in our activities or redeem prizes, but it will not affect your normal use of other functions we provide.

8. Special Instructions for Collection and Use of Your Personal Information

(1) If we use the information for other purposes not specified in this policy, or use the information collected for a specific purpose for other purposes, we will obtain your prior consent.

(2) If we indirectly obtain your information from a third party, we will explicitly request the third party in writing to collect personal information after obtaining your consent in accordance with the law before the collection, and inform you of the content of the shared information, and it involves Sensitive information will be clearly confirmed by you in advance, and the third party will be required to make a commitment to the legality and compliance of the source of personal information. If the third party violates the law, we will clearly require the third party to bear the corresponding legal responsibility. At the same time, our professional security team will strengthen the security of personal information (including sensitive information reporting, encrypted storage of sensitive information, and access rights control). We will protect the personal information obtained indirectly by using means and measures no less than the same protection measures as we use for the personal information of our own users.

(3) In addition, according to relevant laws and regulations and national standards, the collection and use of your personal information does not require your prior authorization and consent in the following situations:

1) Those directly related to national security and national defense security;

2) Directly related to public safety, public health and major public interests;

3) Directly related to criminal investigation, prosecution, trial and execution of judgments;

4) In order to protect your or other personal life, property and other major legitimate rights and interests, but it is difficult to obtain my authorization and consent;

5) The collected personal information is disclosed to the public by you;

6) Collect personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels;

7) Necessary to sign and perform a contract according to your request;

8) Necessary for maintaining the safe and stable operation of the products or services provided, such as finding and disposing of faults in the products or services;

9) Related to our performance of obligations stipulated by laws and regulations;

10) Other situations stipulated by laws and regulations.

 

3. How we use cookies and similar technologies

(1) Cookies

To ensure the proper functioning of the website, to provide you with an easier access experience, and to recommend to you content that may be of interest to you, we may store cookies, Flash cookies, or browser (or associated applications) cookies on your computer or mobile device. Others usually contain identifiers, site names, and local storage of some numbers and characters (collectively, "Cookies"). With the help of cookies, websites can store data such as your preferences.

You can modify your cookie acceptance level or refuse our cookies if your browser or browser add-ons allow it. See AboutCookies.org for details. However, if you perform the actions described in this article, in some cases it may affect your safe access to our website and may require changing user settings each time you visit our website.

(2) Cookie-like technologies

In addition to cookies, we also use web beacons and pixel tags, ETags and other similar technologies on our website.

For example, an email we send you may contain an address link to the content of our website, and if you click on the link, we will track the click to help us understand your product or service preferences so that we can proactively improve our customers service experience. A web beacon is usually a transparent image embedded in a website or email. With the help of pixel tags in emails, we can tell if an email has been opened. If you do not want your activity to be tracked in this way, you can unsubscribe from our mailing list at any time.

ETags (entity tags) are HTTP protocol headers sent behind the scenes between internet browsers and internet servers in place of cookies. ETag can help us avoid unnecessary server load, improve service efficiency, save resources and energy, and at the same time, we may use ETag to record your identity so that we can better understand and improve our products or services. Most browsers provide users with the function of clearing browser cache data, and you can perform corresponding data clearing operations in the browser settings. However, please note that if you disable ETag, you may not enjoy the best product or service experience.

(3) Rejection or management of cookies and similar technologies

You can refuse or manage the use of cookies and similar technologies through your browser settings; however, please note that if you disable cookies, you may not be able to enjoy the best service experience, and some services may not work properly.

 

4. How do we share, transfer and publicly disclose your personal information

(1) Sharing

We will not share your personal information with any companies, organizations and individuals other than MicroBT, except in the following cases:

1. Sharing under statutory circumstances: We may share your personal information with relevant administrative and judicial organs in accordance with laws and regulations, litigation and dispute resolution needs, or as required by administrative and judicial organs in accordance with the law.

2. Sharing with Your Explicit Consent: We will share your personal information with other parties with the express consent of you or/and your parent or guardian.

3. Sharing your personal information with affiliated companies: In order for us to jointly provide you with consistent services based on linked accounts, personalize recommendations, identify account anomalies, recommend information that may be of interest to you, or protect the personal lives of our affiliates or other users or the public To protect the safety of your property from infringement, and to facilitate your unified management, you know and agree that your personal information may be shared among our affiliated companies as necessary. We will share your necessary personal information when you use our account to log in to our affiliate's products or services, and are bound by the purposes stated in this policy. If we share your personal sensitive information or our affiliates change the purpose of use and processing of personal information, we will ask for your authorization again.

4. Sharing with authorized partners: You authorize and agree that we may entrust authorized partners to provide certain services for you or perform functions on our behalf, and we will only share you for the legal, legitimate, necessary, specific and explicit purposes stated in this policy. Information. We will conduct personal information security and protection impact assessment on authorized partners before data sharing. Authorized partners can only access the information they need to perform their duties, and we will require them not to use this information for any other purpose by agreement. If an authorized partner changes the purpose of use and processing of personal information, we will require it to obtain your explicit consent separately.

Currently, our authorized partners include the following types:

(1) Authorized partners for advertising monitoring, data statistics, and data analysis services. In order to maintain and improve our products or services and provide you with better content, we may access designated partners who provide the service to read your device identification number and networking-related information to analyze your use of our services situation and optimize ad delivery.

We will entrust these partners to process information related to advertising reach and effectiveness, but we will not share your personally identifiable information with partners who provide advertising, analytics services, or with our This information will be anonymized so that authorized partners cannot identify you as an individual. Such partners may combine the above information with other data that they have lawfully obtained in order to carry out our commissioned advertising services or decision-making recommendations.

(2) Suppliers, service providers and other partners. We send information to vendors, service providers and other partners who support our business, including technical infrastructure services we commission, analyze how our services are used, measure the effectiveness of advertising and services, and provide customer service, payment convenience or academic research and investigation, bug or crash statistics, improve login experience, and realize gateway number access.

Please rest assured that, except with your explicit consent, we will not share personal information that can contact or identify you with authorized partners, and we will anonymize personal information that can identify you so that authorized partners can You cannot be identified as an individual.

(2) Transfer

We will not transfer your personal information to any company, organization or individual, except in the following cases:

1. Transfer with express consent: We will transfer your personal information to other parties with your express consent;

2. In the event of merger, division, dissolution, acquisition, bankruptcy liquidation or reorganization or other similar situations of MicroBT, we will require new companies and organizations that hold your personal information to continue to be bound by this policy if it involves the transfer of personal information, otherwise we will require the company, organization and individual to seek authorization from you again.

(3) Public disclosure

We will only publicly disclose your personal information under the following circumstances:

1. After obtaining your explicit consent or based on your active choice, we may publicly disclose your personal information;

2.Disclosure based on law: When there is a request to disclose your personal information due to laws, regulations, legal procedures, and mandatory administrative enforcement requirements of government authorities, we will request the relevant authorities to issue reasonable documents to ensure such requests. There is a lawful basis and the relevant law enforcement authorities have legitimate rights and reasonable purposes to obtain your personal information.

(4) Exceptions to prior authorization and consent when sharing, transferring, and publicly disclosing personal information:

According to relevant laws, regulations and national standards, in the following situations, sharing, transferring and publicly disclosing your personal information does not require your prior authorization and consent:

1. Related to our performance of obligations under laws and regulations;

2. Those directly related to national security and national defense security;

3. Directly related to public safety, public health, and major public interests;

4. Those directly related to criminal investigation, prosecution, trial and execution of judgments;

5. In order to safeguard your or other personal life, property and other major legitimate rights and interests, but it is difficult to obtain my authorization and consent;

6. The collected personal information is disclosed to the public by you;

7. Collecting personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels;

8. Other situations stipulated by laws and regulations.

Please be aware that in accordance with applicable laws, if we take technical measures and other necessary measures to process personal information so that the recipient of the data cannot re-identify a specific individual and cannot recover, the sharing, transfer and public disclosure of such processed data does not require You will be notified separately and with your consent.
 

5. How we store your personal information

(1) Storage location

1. Please be aware that the personal information we collect and generate in the People's Republic of China will be stored in the People's Republic of China.

2. In the event of cross-border transfer of data, we will complete the corresponding procedures in accordance with the requirements of relevant laws and regulations, and provide your personal information with protection standards no lower than those stipulated by Chinese data protection laws and regulations.

(2) Storage period

We will try to avoid collecting and processing personal information that is not related to our business. We will only retain your personal information for as long as is necessary to achieve the purposes described in this policy, unless there is a mandatory retention requirement by law.

(3) Suspension of operation

When our products or services stop operating, we will stop collecting your personal information in a timely manner, and notify you of the cessation of operation in the form of one-by-one delivery or announcement; we will delete your personal information within a reasonable period of time information or anonymize it, unless otherwise stipulated by laws and regulations.

 

6. How we protect the security of your personal information

(1) Safety protection measures

We strive to ensure the security of users' personal information to prevent leakage, tampering, loss, improper use, unauthorized access and disclosure, etc. of personal information. We use multi-faceted security protection measures to ensure that the protection of users' personal information is at a reasonable level of security, including technical protection means, management system control, security system guarantee and many other aspects.

1. We employ industry-leading technical protection measures. The technical means we use include but are not limited to firewalls, encryption (such as SSL), de-identification or anonymization, access control measures, etc. In addition, we will continue to enhance the security capabilities of the software installed on your device. For example, we will complete some information encryption work locally on your device to consolidate secure transmission; we will know the application information installed on your device and the running process information to prevent viruses, Trojans and other malicious programs.

2. We have established special management systems, processes and organizations to ensure the security of personal information. For example, we strictly limit the scope of people who access personal information, require them to comply with confidentiality obligations and conduct audits, and those who violate the obligations will be punished according to regulations. We also review the management system, process and organization to prevent unauthorized access, use or disclosure of users' personal information.

We recommend that you pay full attention to the protection of personal information when using products and services, and we will also provide a variety of security features to help you protect the security of your personal information.

(2) Measures for handling security incidents

1. In the event of security incidents such as leakage, damage, or loss of personal information, we will activate emergency plans to prevent the expansion of security incidents. After a security incident occurs, we will promptly notify you of the basic situation of the security incident, the disposal measures and remedial measures we are about to take or have taken, and our response suggestions to you in the form of push notifications and emails in a timely manner. If it is difficult to notify one by one, we will issue warnings through announcements and other means.

2. At the same time, we will also proactively report the handling of personal information security incidents in accordance with the requirements of regulatory authorities.

(3) Self-prevention of account security risks

Please use a complex password and keep your account and password properly, and be careful to provide your personal information to third parties. If you find that your personal information is leaked, especially your account and password, please contact our customer service immediately so that we can take corresponding measures.

 

7. How we handle the personal information of minors

1. We attach great importance to the protection of personal information of minors. If you are a child, we ask that you ask your parents or other guardians to read this policy carefully, and use our products or services or provide us with information with the consent of your parents or other guardians. If you are a minor over the age of 14, we require you or your parents or other guardians to read this policy carefully, and use our products with the consent of your parents or other guardians or your own consent or service or provide us with information.

2. If you are a parent or other guardian of a child, please pay attention to whether the child under your guardianship is using our products or services after obtaining your authorization. If you have questions about your child's personal information, please contact us using the contact details in Section 10.

 

8. Your rights

(1) Manage your personal information

1. During your use of the products or services provided by our platform, in accordance with relevant Chinese laws, regulations, standards, and common practices in other countries and regions, in order to make it easier for you to query, access, correct, and delete your personal information, At the same time, it guarantees your right to withdraw your consent to the use of personal information and to cancel your account. We have provided you with corresponding operation settings in the platform design, and you have the right to manage your personal information through the personal center.

2. If you are unable to cancel your account by yourself, you can contact our platform customer service and we will respond to your request within fifteen working days. After verifying the user's identity, we will release the user's mobile phone number and email to achieve the effect of logout. After you voluntarily cancel your account, we will stop providing you with products or services, delete or anonymize your personal information as required by applicable laws, unless otherwise provided by laws and regulations.

3. If you need a copy of your personal information, you can contact us. After verifying your identity, we will provide you with a copy of your personal information (basic information, identity information) in our services, but laws and regulations otherwise Except as provided or otherwise agreed in this policy.

4. For security, you may be required to provide a written request, or otherwise prove your identity. We may ask you to verify your identity before processing your request. We will respond to your request within fifteen working days. If you are not satisfied with our response, you can also lodge a complaint through other channels in this policy or directly to our dedicated personal information protection department.

For your reasonable requests, we do not charge fees in principle, but for repeated requests that exceed reasonable limits, we will charge a certain cost as appropriate. We may reject requests that are unreasonably repetitive, require excessive technical means (for example, the need to develop new systems or fundamentally change existing practices), pose risks to the legitimate rights and interests of others, or are highly impractical.

We will not be able to respond to your request in the following circumstances:

1. Related to our performance of obligations under laws and regulations;

2. Those directly related to national security and national defense security;

3. Directly related to public safety, public health, and major public interests;

4. Directly related to criminal investigation, prosecution, trial and enforcement of judgments;

5. There is sufficient evidence to show that you have subjective malice or abuse your rights;

6. Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations;

7. Involving commercial secrets.

(2) Complaints and reports

We attach great importance to your concerns about your personal information and do our best to protect your rights to your personal information. If you have any questions, comments or suggestions, or if you encounter any problems in managing your personal information, you can give us feedback through other contact methods provided by us.
 
9. How to update this policy

We may revise the User Personal Information Protection and Privacy Policy Agreement in due course. When the terms of this policy are changed, we will notify you of the changed privacy policy in a prominent way when the version is updated, and explain the effective date to you. Please read the changed privacy policy carefully. Your continued use of our products or services means that you agree to us in accordance with the updated privacy policy.

We will not reduce your rights under this policy without your express consent. We will post any changes to this policy on a dedicated page. For major changes, we will also provide more prominent notices (such as red dot prompts, pop-up windows, etc.).

Material changes referred to in this policy include, but are not limited to:

1. Significant changes to our service model. Such as the purpose of processing personal information, the type of personal information processed, the way of using personal information, etc.;

2. We have undergone significant changes in ownership structure, organizational structure, etc. Such as changes in owners caused by business adjustments, bankruptcy mergers and acquisitions, etc.;

3. The main object of personal information sharing, transfer or public disclosure has changed;

4. Significant changes in your rights to participate in the processing of personal information and the way they are exercised;

5. When our responsible department responsible for handling personal information security, contact information and complaint channels change;

We will also archive older versions of this policy for your review.

 

10. How to contact us

If you have any questions, comments or suggestions about the content of this policy, you can contact us by calling the customer service number: +86 755-26640921;

We have set up a dedicated department for personal information protection, and you can send your questions to the following address:

Contact:801, Hangsheng Technology Building, Gaoxin South Sixth Road, Yuehai Street, Nanshan District, Shenzhen,China

Postcode: 518000

Please reconfirm that you have read and fully understood the above terms.

 

Shopping Cart
Scroll to Top
WhatsMiner Official Website | Mining Hardware