User Service Agreement and Privacy Policy This system attaches great importance to the protection of user information and user privacy, and promises to take corresponding security measures to protect user information in accordance with relevant security standards. This privacy policy will explain to you how the system collects, uses and stores your personal information and what rights you have. Please be sure to read carefully and fully understand all the terms of this privacy policy before registering and using this system, especially You should read the terms marked in bold and make sure you fully understand and agree before you start using them. If you check "Read and Agree" to this Privacy Policy, it means that you agree and accept all the terms of this Privacy Policy. It is important to note that this Privacy Policy does not apply to products or services provided to you by other third parties. If you use products or services provided by a third party, please pay attention to the user privacy protection policy of the third-party product or service. Please note that this system will check and update the system's policies from time to time, so the relevant measures will change accordingly. This system kindly asks you to visit this page regularly to ensure that you are always aware of the latest version of this Agreement. After reading this agreement, if you have any questions about this agreement or matters related to this agreement, you can consult this system through QQ: 3161839606 or phone number 02989288027. "User" in this Agreement refers to all users who use this system and services related to this system, including natural persons, legal persons and other organizations, etc., who are referred to as "users" or "you" in this agreement. "This system" in this agreement refers to the China Open University Candidate Identity Verification System and China Open University Candidate Identity Verification App. The owner of this system is the Open University of China. The rights and obligations of "this system" under this agreement are enjoyed and assumed by the Open University of China. 1. Information collected by the system (1) The user must agree that the system collects user information and photo information submitted by the user, and agrees that the system will use the user's personal information based on business needs under the premise of being legal, compliant, and reasonable. The details are as follows: 1. Provide you with services. The information collected and used by this system is a necessary condition for providing you with this system's services. Without relevant information, this system will not be able to provide you with the core content of this system's services. For example: (1) When you use the services of this system, if you upload a photo of your face taken on site, this system will collect the information you upload or form, and has the right to display the information you upload; (2) When you use the services of this system, you will take a photo of the candidate's face at the examination entrance. The system will analyze the key points of the facial features, compare it with the registered face photo of the candidate, confirm the candidate's identity information, and have the right to display the information you uploaded. Information; (3) When you use the services of this system, the examination admission system performs three-dimensional detection on on-site candidates (such as opening mouth, opening eyes), and does not store the detection; (3) In order to determine the location of your examination center, this system will collect information about your location, including: your geographical location collected through GPS or Wifi when you use the services of this system through a mobile device with positioning function. information. Before collecting your location information, the system will ask whether you allow access to location information, and you can refuse. You can also turn off the positioning function of your mobile device to stop the collection of your geographical location information. (4) When you contact this system, this system may save your communication/call records and content or the contact information you left and other information in order to contact you or help you solve your problem, or record the handling of related problems. Plans and results. (5) In order to provide you with page display that better suits your needs, understand product suitability, and identify abnormal account status, this system may collect information about the services you use and how you use them, and associate this information. include: ¡ñLog information: When you use the services of this system, the system may automatically collect your detailed usage of the system services and save them as relevant network logs. For example, your login account, search query content, IP address, browser type, network environment, language used, access date and time, Push opening record, length of stay, and refresh record. ¡ñDevice information: This system may receive and record information related to the device you use based on the specific permissions you granted during software installation and use. (For example, device model, operating system and version, client version, device resolution, package name, device settings, process and software list, unique device identifier, software and hardware feature information). Please note that individual device information and log information are information that cannot identify a specific natural person. If this system combines such non-personal information with other information to identify a specific natural person, or uses it in combination with personal information, such non-personal information will be treated as personal information during the period of combined use, except to obtain your Unless otherwise provided by authorization or laws and regulations, this system will anonymize and de-identify such personal information. (6) Based on the above information you provide to this system, the information this system may collect, and your information collected by this system through indirect means. 2. To provide you with security guarantees. In order to improve the security of your use of this system, protect the personal and property safety of you or other users or the public from infringement, and better prevent phishing websites, fraud, network vulnerabilities, computer viruses, network attacks, Security risks such as network intrusion, and more accurately identify violations of laws and regulations or agreement rules related to this system's services. This system may collect, use or integrate your account information, transaction information, device information, and log information to comprehensively judge your account and transaction risks, conduct identity verification, detect and prevent security incidents, and take necessary recording, auditing, analysis, and disposal measures in accordance with the law. 3. To improve the services of this system, you understand and agree that after collecting your information, this system will de-identify the data through technical means. The de-identified information will not be able to identify you. In this case, This system has the right to use de-identified information to analyze the user database and make commercial use of it. 4. Please note that for other uses, if this system wants to use your information for other purposes not specified in this privacy policy or collect additional information not mentioned, we will ask for your consent in advance. Once you agree, such additional uses will be considered part of this Privacy Policy, and this Privacy Policy will also apply to such additional information. 5. Exceptions to Obtaining Authorization and Consent According to relevant laws and regulations, collecting your information does not require your authorization and consent in the following circumstances: (1) Related to national security and national defense security (2) Relevant to public safety, public health, and major public interests; (3) Related to criminal investigation, prosecution, trial and judgment execution, etc. (4) To protect the life, property and other major legitimate rights and interests of the information subject or other individuals but it is difficult to obtain your consent; (5) The information collected is disclosed to the public by you yourself; (6) Collect information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels; (7) Necessary to sign a contract according to your requirements; (8) Necessary to maintain the safe and stable operation of this system service, such as discovering and handling product or service failures; (9) Necessary for legitimate news reporting; (10) When it is necessary for an academic research institution to conduct statistical or academic research based on public interests, and when providing the results of academic research or description to the outside world, the information contained in the results will be de-identified; (11) Other situations stipulated by laws and regulations. 6. Tips on sensitive information The above information provided by you or collected by us may include your personal sensitive information, such as virtual property information, system accounts and related web browsing records. Please be careful and pay attention to your sensitive personal information. You agree that we can process your sensitive personal information in accordance with the purposes and methods described in this privacy policy. (2) The information filled in by users in this system must comply with laws, regulations and social ethics and not infringe upon the legitimate rights and interests of any other third party. Otherwise, this system has the right to cancel the user's account or disable the user's services. (3) This system strictly abides by the "Cybersecurity Law of the People's Republic of China" and "Information Security Technology Personal Information Security Specifications" in the process of collecting user information. (GB/T 35273-2017), "Law of the People's Republic of China on the Protection of State Secrets", "Implementation Measures of the Law of the People's Republic of China on the Protection of State Secrets" and other relevant laws and regulations. 2. How we use COOKIES or similar technologies We or our third-party partners may obtain and use your information through COOKIES or similar technologies, and store such information as log information. By using COOKIES, we provide users with a simple, easy and personalized network experience. A COOKIES is a small amount of data that is sent to your browser from a web server and stored on your computer's hard drive. We use COOKIES to benefit its users. For example, to make the login process faster, you can choose to save the username in a COOKIES. This will make it more convenient and faster when you want to log in to our system next time. COOKIES can help us determine the page and content you are connected to. COOKIES allow us to serve you better and faster and make your experience on this website more personalized. However, you should be able to control whether and how COOKIES are accepted by your browser. Please consult the documentation provided with your browser for more information on this. We may collect and use your information through COOKIES or similar technologies, and store such information. We use our own COOKIES or similar technologies, which may be used for the following purposes: (1) Remember your identity. For example: COOKIES or similar technologies help us identify you as our registered user; (2) Analyze your use of our services. We can use COOKIES or similar technologies to understand what activities you use the system services for, or which services or services are the most popular; you can refuse or manage COOKIES or similar technologies through your browser or user selection mechanism. However, please note that if you disable COOKIES or similar technologies, we may not be able to provide you with the best service experience, and some services may not work properly. 3. Storage of information (1) We will only retain your information for the period necessary for the purposes stated in this Privacy Policy and within the time limits required by laws and regulations. (2) The information we collect and generate during our operations in the People¡¯s Republic of China is stored in China, except for the following circumstances: 1. Laws and regulations have clear provisions; 2. Obtain your authorization and consent; 3. The products and services you use involve cross-border use, and this system needs to provide your information overseas. In response to the above situations, we will ensure that your information is adequately protected in accordance with this Privacy Policy and national laws and regulations. (3) The Internet is not an absolutely secure environment, and it is impossible to determine whether the communication methods with other users such as email, instant messaging, social software or other service software are fully encrypted. We recommend that you use complex passwords when using such tools, and Pay attention to protecting the security of your information. (4) The Internet environment is not 100% safe, and we will try our best to ensure or guarantee the security of any information you send us. If our physical, technical, or management protection facilities are damaged, resulting in unauthorized access, public disclosure, tampering, or destruction of information, resulting in damage to your legitimate rights and interests, we will bear corresponding legal liability. Please understand that due to technical limitations and risk prevention limitations, even if we have tried our best to strengthen security measures, we cannot always guarantee 100% security of information. You need to understand that the system and communication network you use to access the services of this system may have problems due to circumstances beyond our control. When accessing, updating, correcting and deleting the aforementioned information, this system may require you to perform identity verification to ensure information security. For your information collected through COOKIES or similar technologies, this system also explains the choice mechanism provided to you in the "How We Use COOKIES or Similar Technologies" section of Article 2 of this Privacy Policy. If you want to query, modify or delete some of your information, please log in and contact customer service and follow the customer service's specific instructions | 4. Information security (1) The system promises to provide user information security with reasonable and feasible security protection measures that comply with industry standards. For example, use advanced encryption storage and transmission technology and regularly upgrade it to ensure the reliability of security protection and prevent data from malicious attacks. Deploy access control mechanisms to ensure that only authorized personnel can access user information; establish a data classification and classification system and data security. Management specifications and data security development specifications are used to manage and regulate the storage and use of personal information to ensure that no personal information irrelevant to the services provided by this system is collected; it is equipped with professional technical personnel for information security management to conduct strict daily monitoring of system information and regularly conduct System information security protection testing. (2) The system ensures that information will not be leaked to unauthorized users or entities during storage, use, and transmission, ensures that information is not tampered with by unauthorized users during storage, use, and transmission, and prevents authorized users from unauthorized access to user information. Appropriate tampering to maintain the consistency of information; ensuring that authorized users or entities can use information and resources normally and not be abnormally rejected, allowing them to access information and related resources reliably and promptly. (3) The user is responsible for the security of his account. Only the user can use it. The account cannot be lent, transferred, donated, rented or sold to others without the consent of the system. When any security issues occur in the user account, the user is obliged to notify the customer service of the system. The system is not responsible for the economic losses caused by the user's improper use. (4) This system will take reasonable and feasible measures to try its best to avoid collecting irrelevant personal information. This system will only retain your personal information for the period necessary to achieve the purposes stated in this privacy policy, unless there are mandatory retention requirements by law. The criteria for this system to determine the aforementioned period include: 1. Complete the transaction purposes related to you, maintain corresponding transaction and business records, and respond to your possible inquiries or complaints; 2. Ensure the safety and quality of the services this system provides you; 3. Do you agree to a longer retention period; 4. Is there any other special agreement on the retention period? After your personal information exceeds the retention period, this system will delete your personal information or make it anonymized in accordance with the requirements of applicable laws. (5) The Internet is not an absolutely secure environment. When using the services of this system, this system strongly recommends that you do not use communication methods other than those recommended by this system to send your information. Please protect your personal information properly and provide it to others only when necessary. If you find that your personal information, especially your account or password, has been leaked, please contact us immediately so that the system can take appropriate measures according to your application. Please note that the information you voluntarily share or even share publicly when using this system service may involve your or others' personal information or even personal sensitive information. Please consider more carefully whether to share or even share relevant information publicly when using the services of this system. Please use complex passwords to help this system ensure the security of your account. This system will try its best to ensure the security of any information you send to this system. If the physical, technical or management protection facilities of this system are destroyed, resulting in unauthorized access, public disclosure, tampering or destruction of information, resulting in damage to your legitimate rights and interests, this system will bear corresponding legal liability. (6) After the unfortunate occurrence of a personal information security incident, this system will inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures that the system has taken or will take, and your own prevention and control measures. Recommendations for reducing risk, remediation measures for you, etc. This system will notify you of event-related information through emails, letters, phone calls, push notifications, etc. When it is difficult to notify personal information subjects one by one, this system will issue announcements in a reasonable and effective manner. 5. How to use information (1) The sharing system does not share users¡¯ personal information with any company, organization, institution or individual, except in the following circumstances: 1. Sharing when necessary for actual business needs: Only by sharing your personal information can the core functions of the products and/or services of this system be realized or the services you need be provided. 2. Share with the explicit consent of the user. 3. Sharing under legal conditions: The system will share users' personal information externally in accordance with legal provisions, litigation and dispute resolution needs, and in accordance with mandatory requirements proposed by government departments or judicial organs in accordance with the law. 4. Use based on social and public interests that comply with laws and regulations. (2) Transfer This system will not transfer your personal information to any company, organization or individual, except in the following circumstances: This system will transfer your personal information to other parties with your explicit consent. (3) The public disclosure system will not publicly disclose user information, except in the following circumstances: 1. Disclosure with the explicit consent of the user; 2. The system will disclose user information in accordance with legal provisions, litigation and dispute resolution needs, and in accordance with mandatory requirements imposed by government departments or judicial authorities in accordance with the law; 3. If this system determines that you have violated laws and regulations or seriously violated the relevant agreements and rules of this system, or to protect the personal and property safety of users of this system or the public from infringement, this system may act in accordance with laws and regulations or with your consent. Disclosure of personal information about you, including relevant violations and the measures this system has taken against you. 4. Use based on social and public interests that comply with laws and regulations. (4) According to relevant laws and regulations, under the following circumstances, this system can collect, share, transfer or publicly disclose some necessary user information without obtaining the user's authorization and consent: 1. Directly related to national security and national defense security; 2. Directly related to public safety, public health, and major public interests 3. Directly related to criminal investigation, prosecution, trial and judgment execution, etc. 4. To protect the life, property and other major legitimate rights and interests of the user or other individuals but it is difficult to obtain the consent of the user; 5. Necessary to sign and perform the contract according to the user's requirements; 6. When it is necessary to carry out statistical or academic research in the public interest, and when providing the results of academic research or description to the outside world, the personal information contained in the results will be de-identified; . 7. Collect personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels. 8. Other situations stipulated by laws and regulations. Please be aware that, in accordance with applicable laws, if we take technical measures and other necessary measures to process personal information so that the data recipient cannot re-identify a specific individual and cannot recover it, the sharing, transfer, and public disclosure of such processed data do not require You will be notified separately and your consent obtained. 6. How to use information The system attaches great importance to users' concerns about personal information and makes every effort to protect users' rights to access, correct, delete, and withdraw consent authorization, so that users have sufficient ability to protect privacy and security. (1) Access and correct user information Users can access or modify information, including mobile phone number, password, and user photo, through the CDB integrated examination platform. (2) Deletion of user information In the following circumstances, users can request the system to delete personal information: 1. If the system¡¯s handling of user information violates laws and regulations; 2. If this system collects and uses users' personal information without obtaining the user's consent; 3. If the system¡¯s processing of user information violates the agreement with the user; 4. If the user logs out of this system account; 5. If this system terminates service and operation. Once the above deletion request is responded to, the system will also notify the subject who has obtained the user information as much as possible and delete the corresponding information in a timely manner. When you or we assist you in deleting relevant information, we may not be able to immediately delete the corresponding information from the backup system due to applicable laws and security technologies. We will securely store your personal information and isolate it from any further processing. Until the backup can be purged or made anonymous. (3) Withdrawal of user authorization For the collection and use of user information, users can contact this system at any time to withdraw their authorization consent. When users withdraw certain authorizations, related system functions and services will be unavailable. After you withdraw your authorization, we will no longer process the corresponding personal information. However, your decision to withdraw your authorization will not affect the previous processing of personal information based on your authorization. (4) Cancel account Users can contact this system to cancel their account. After canceling the account, the system will stop providing system functions or services to the canceled user, and delete or anonymize the user information, unless otherwise provided by laws and regulations. (5) In response to user requests, in order to ensure security, this system may first require users to verify their identity before processing user requests. Users may be required to provide a written request or otherwise prove their identity. In the following situations, in accordance with legal and regulatory requirements, the system will not be able to respond to user requests: 1. Directly related to national security and national defense security; 2. Directly related to public safety, public health, and major public interests 3. Directly related to criminal investigation, prosecution, trial and judgment execution, etc. 4. There is sufficient evidence that the user is subjectively malicious or abuses his rights. 5. Responding to the user's request will result in the user or other individuals or organizations 7. How the system handles minors¡¯ personal information (1) The system attaches special importance to the protection of minors¡¯ personal information. If you are a minor under the age of 18, before using the functions and services of this system, you must be accompanied by your guardian to read this privacy policy, and ensure that you have obtained the explicit consent of your guardian before using this system. and provide your personal information to this system. (2) For the use of this system with the consent of the guardian to collect personal information of minors, the system will only use, share, transfer or disclose this information when permitted by laws and regulations, with the explicit consent of the guardian, or when necessary to protect the minor. information. (3) If your guardian does not agree with you using the system's services or providing personal information to the system in accordance with this privacy policy, please immediately terminate the use of the system's services and notify the system in a timely manner. (4) If you have any questions about the use of this system by the minors under your supervision or the user information they provide to this system, please contact this platform in time. 8. Changes and Termination Information of this Privacy Policy (1) If a user is found to have violated the provisions of this privacy policy, the system has the right to unilaterally terminate the provision of system services to the user and issue a notice to the user; (2) When this system terminates the provision of photo detection and processing services, this privacy policy will terminate automatically; (3) Any disputes arising from the implementation of this privacy policy shall be resolved through friendly negotiation. During the dispute resolution period, this privacy policy shall continue to be implemented. (4) This privacy policy may change. This system may modify the terms of this privacy policy from time to time, and such modifications shall form part of this privacy policy. For major changes, this system will provide a more prominent notice. If you do not agree to the changes, you can choose to stop using the system services; if you continue to use the system services, you agree to be bound by the revised privacy policy. constraint. Any modifications will be made with your satisfaction at the forefront. This system encourages you to review our privacy policy every time you use this system's services. For major changes, this system will also provide more prominent notifications (Including this system will notify you through the system announcement and even provide you with pop-up prompts). Major changes referred to in this system include but are not limited to: 1. The service model of this system has undergone major changes. Such as the purpose of processing personal information, types of personal information processed, how personal information is used, etc.; 2. This system has undergone major changes in aspects such as control rights. Such as changes in information controllers caused by mergers, acquisitions, reorganizations, etc.; 3. The main objects to whom personal information is shared, transferred or publicly disclosed change; 4. Significant changes in your rights to participate in the processing of personal information and the way in which you exercise them; 5. The responsible department, contact information and complaint channels of this system responsible for handling personal information security have changed; 6. The personal information security impact assessment report indicates that there is a high risk. This system may, when necessary (For example, when the system suspends a service due to system maintenance) issue service-related announcements. You may not cancel these service-related announcements that are not promotional in nature. 9. Contact this system When you have any questions about this privacy policy, you can consult this system through QQ: 3161839606 or phone number 02989288027 .