This Privacy Policy applies to the Tomato Internet platform.

Respecting and protecting the user's personal privacy information is our consistent system. We take reasonable steps to protect the user's personal privacy information when making products.

Collection of personal information

When we need information or communication information that identifies you, we will ask for your consent. Usually, when you sign up for Tomato, we will ask you for this information. The information we collect is usually limited to your gender, age, date of birth, hobbies, etc.

Use of personal information

Our products may disclose your personal information as required by law or in accordance with the terms of the User Agreement.

a, get your permission under the agreement;

b, get your permission in the product interaction;

c. According to the law or the requirements of the government and the judiciary;

d. In an emergency, the right to endanger public safety and other individuals more important to your privacy is subject to real danger.

In addition, we will not disclose your private information to the outside world.

Account security

The user name and password of your registration "Tomato" are confidential information. We will take active technical measures and management measures to protect the security of user accounts and passwords. Whenever possible, follow the security measures we provide to increase the security of your account.

Security of personal information

Please be careful not to disclose your own property accounts, bank cards, credit cards, third-party payment accounts and corresponding passwords in our services.

Use of cookies

We use cookies to help you personalize your online experience. A cookie is a text file that is stored on your hard drive by a web server. Cookies cannot be used to run programs or deliver viruses to your computer. The cookie assigned to you is unique and can only be read by the web server that publishes the cookie to your domain.

One of the main uses of cookies is to provide a time-saving utility. For example, if you personalize a web page or register on Tomato, cookies will help you call your specific information for subsequent visits. This simplifies the process of recording your personal information (such as billing address, preferred email address, etc.). When you return to Tomato, the site can bring up the information you have previously provided so that you can easily use your custom features. When doing work related to their products and services, they use web beacons to access our website to extract cookies.

You can accept or decline cookies. Most web browsers automatically accept cookies, but you can usually modify your browser settings to reject cookies according to your needs. If you choose to decline cookies, you may not be able to fully experience the interactive features of the websites you visit.

Collection and use of personal information for young people

We attach great importance to the safety and protection of the collection and use of personal information for young people. We recommend that any minor under the age of 16 to participate in online activities should obtain the prior consent of the parent or his legal guardian (hereinafter referred to as "guardian").

We will not use the personal information of adolescents without the prior consent of the guardian, nor will we disclose identifiable information to any third party, except as permitted by law or in order to provide services to young people. With the consent of the guardian, we may collect personal information from adolescents, but the guardian has the right to refuse to further collect personal information of her child or ward, and has the right to review or ask us to delete the personal information of the teenager.

We guarantee that young people will not be required to provide additional personal information as a condition to allow them to participate in online activities.

About disclaimer

We are not liable for any leakage of user information or private information caused by the following:

(1) Due to legal policy reasons, or due to the requirements of the government and the judiciary, your information will be provided to the relevant units.

(2) Any leakage of personal information resulting from the user's password being shared with others or shared with others; or other leakage caused by the user's personal actions.

(3) Any information leakage caused by hacking, computer virus intrusion, computer system crash; the above-mentioned accidents occur, and the current technology of such accidents is difficult to defend.

(4) In an emergency, use your information when making trade-offs due to the balance of interests in the event of endangering public safety, other personal physical and property safety. If you are entitled to damage, you can claim rights from the beneficiary.

(5) Force majeure events and all other uses or leaks caused by our subjective faults.