SecondLive
Search…
Privacy Policy
Last updated: 03-12-2021.

1.Preface

1.1 This Privacy Policy (hereinafter referred to as "Policy") applies to the products provided by SecondLive. We will collect and use your personal information (hereinafter referred to as “PI”) in accordance with this Policy when you use the services. We hope that through this Policy, we will give you a clear introduction of how we handle your PI, therefore we recommend that you read this Policy in its entirety to help you understand how to protect your privacy.
1.2 We strive to present this Policy in a concise, clear and intelligible form. We understand the importance of PI to you and will do our best to protect the security and reliability of your PI. We are committed to maintaining your trust in us and adhering to the following principles to protect your PI: the principles of balancing rights and responsibility, clear purpose, consent, minimum necessary, transparency, security, participation of PI subject, etc. At the same time, we are committed to protecting your PI by taking appropriate security measures in accordance with mature security standards of the industry.
1.3 Please read and understand this Policy carefully before using our products so that you can better understand our products and the various services they offer and make appropriate choices. We strongly recommend that you first read the introduction carefully and give your authorized consent or explicit consent based on a full understanding of this Policy. ****If you have any questions, comments or suggestions, please contact us through the following contact information:
Contact email: [email protected]

2.How we collect and use your PI

2.1 In accordance with the principles of lawfulness, fairness and necessity, we collect and process your PI from you for the purpose of realizing the relevant business functions. We will disclose to you the collection and use of your PI in a comprehensive, complete and timely manner as possible. If you find any error or omission in our disclosure, please contact us promptly.
2.2 The PI collected from you generally may include:
2.2.1 Network information regarding transactions, including, among other things, the type of device you use, access times, hardware model, operating system and version, and other unique device identifiers.
2.2.2 Information about plugins you might be using, included but not limited to those related to the management of cryptocurrency assets and any information provided by them.
2.2.3 Your email and BSC address.
2.2.4 The SecondLive Client may requires the highest level of browser permissions that could potentially lead to procurement of more PI.
2.3 As with nearly all interactions that take place on the World Wide Web, the servers may receive information by virtue of your interaction with them, including but not limited to IP Addresses.
2.4 The SecondLive Client requires full browser permissions that could potentially be used to access additional PI. Such browser permissions are used for an extremely limited technical purpose for allowing the SecondLive Client to properly interact with your browser. No additional information is obtained beyond what is necessary to provide the SecondLive Client. No information received is shared with any third-party except as required for provision of the SecondLive Client.
2.5 Your PI may be used in the following ways:
2.5.1 To analyze trends for how the Site and Tools are being used;
2.5.2 To improve the functions of Site and the Tools;
2.5.3 To help personalize your experience of the Site and the Tools; and
2.5.4 If you provide your contact information, you may receive technical notices, updates, confirmations, security alerts, to provide support to you, to tell you about other products and services that might interest you, or to respond to your comments or questions.
2.6 Your information may be shared with third parties who need to access it in order to do work related to the Site and the Tools, including doing things like helping make the Site or SecondLive Client available, or providing analytics services. These third parties only access and use your information as necessary to perform their functions.
2.7 Aggregations and anonymizations that contain your information may be created in a way that does not directly identify you. Those aggregations and anonymizations may be used or shared for a variety of purposes related to the Site and the SecondLive Client.
2.8 Your PI may be disclosed to agents, businesses, or service providers who process your PI for providing the Site and the Tools to you. The agreements with these service providers limit the kinds of information they can use or process and ensure they use reasonable efforts to keep your PI secure.
2.9 We also have the right to reserves or disclose PI that it believes, in good faith, is appropriate or necessary to enforce the Terms of Use, take precautions against liability or harm, to investigate and respond to third-party claims or allegations, to respond to court orders or official requests, to protect the security or integrity of the Site or the Tools, and to protect the rights, property, or safety of the Foundation, the SecondLive community of users and Space owners, or others.
2.10 In the event which is involved in a merger, acquisition, sale, bankruptcy, insolvency, reorganization, receivership, assignment for the benefit of creditors, or the application of laws or equitable principles affecting creditors’ rights generally, or other change of control, there may be a disclosure of your information to another entity related to such event.

3. How we protect your PI

3.1 We have used safety protection measures meeting industrial standards to protect the PI provided by you, and prevent data from unauthorized access, public disclosure, use, alteration, damage or loss. We will adopt every reasonable and feasible measure to protect your PI. For example, your browser is under SSL encipherment protection when exchanging data (such as credit card information) with “service”; meanwhile, we will provide https safe browsing methods to the website; we will use encryption technique to ensure the confidentiality of data and store PI and non-PI separately; we will use reliable protection mechanism to prevent data from hostile attack; we will deploy access control mechanism to ensure that only authorized personnel have access to PI; and we will hold training courses for security and privacy protection, so as to strengthen our employees’ understanding about the importance of protecting PI.
3.2 We has a strong information security department to build a complete and advanced data security protection system for products and services, including hierarchical classification and encrypted storage of user data and access control. The internal data management system and operating procedures have been formulated, containing strict process requirements on data collection, use and destruction to prevent illegal use of users’ personal data. The safety and security management responsibilities of each department and its heads that may get to know users’ personal data have been determined. The workflow and security management system for collection and use of users’ personal data and other related activities have been established. The authority control has been implemented for staff and agents, the export, copy and destroy of data in batch are subject to review and measures have been taken to prevent information leakage. The paper, optical and electromagnetic media that carry users’ personal data have been properly maintained and appropriate security storage measures have been taken. Any connection to the information systems for storing users’ personal data will be examined and checked, and anti-intrusion and anti-virus measures have been in place. The information about the persons who conduct an operation on users’ personal data and the operation times and places as well as relevant matters are required to be recorded. Trainings on security and privacy protection are held on a regular basis to improve employees’ awareness of personal data protection.
3.3 We will take all reasonably practicable steps to ensure that no unrelevant PI is collected. We will only retain your PI for as long as necessary to achieve the purposes described in the specific privacy policies, unless an extended retention period is required or permitted by law.
3.4 The Internet environment is not 100% secure, but we will do our best to ensure or guarantee the security of any information you send to us. If our physical, technical, or administrative protective facilities are destroyed, resulting in unauthorized access, public disclosure, tampering, or destruction of user data, which causes damage to your legitimate rights, we will assume legal liabilities accordingly.
3.5 In the event of any PI security incident, we will promptly notify you according to the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, suggestions about how you can prevent by yourself and how to lower the risk, remedies for you, etc. We will promptly notify you of the relevant circumstances of the incident by mail, letter, telephone, push notification, etc. When it is difficult to inform each information subject one by one, we will issue a notice in a reasonable and effective manner.

4.Your rights

4.1 In accordance with the general requirements of the laws, we will endeavour to protect your rights in relation to your PI. If you do not have control over your PI through the means we have published, you may contact us at any time through the contact details in section 9 "How to contact us" and we will respond to your request for access within a reasonable period of time, provided that you cooperate with us in verifying your identity.
4.2 Subject to applicable law, you may have some or all of the following rights in respect of your PI:
4.2.1 Right to withdraw consent. You may withdraw your consent at any time. When you withdraw your consent, we will no longer process the corresponding PI. However, your decision to withdraw your consent will not affect the processing of PI previously carried out on the basis of your authorization.
4.2.2 Access, rectification and deletion of your PI. You can access, rectify and delete your PI by visiting the Site and logging to your personal account to enter the user account center. Please note that although we do our best to allow you to access and rectify your PI, some of your PI cannot rectified or deleted, which mainly include account information (including account ID, cell phone number, email address and other login information), mainly for the security of online transactions and to identify the person to whom online products and services are provided.
4.2.3 Restriction or objection to process your PI. According to "2.1 Collection and use of PI for basic business functions", "2.2 Collection and use of PI for extended business functions" and "2.3 Analytics data analysis business ", we need to process your PI for our own business interests, including for profiling, and you have the right to object to the aforementioned processing and profiling, unless we can prove that our interests outweigh your interests or that we are processing your PI for litigation purposes.
Notwithstanding the aforementioned profiling, you are aware that we do not yet use your PI that has been identified and analyzed for automated decision-making purposes (e.g., commercial advertising), and that if we plan to use it, in particular for direct marketing purposes (including data profiling), we will notify you in advance in an appropriate manner and you may then exercise your right to objection in accordance with the law.
4.2.4 Right to PI portability. You have the right to request that we provide your PI collected on the basis of your authorized consent or as necessary for the conclusion and performance of a contract, to a third party designated by you in writing, in electronic form. We will make reasonable efforts to protect this right to the extent technically feasible.
4.2.5 Right to file a complaint with supervisory authority. If you are not satisfied with our response, especially if you believe that our PI processing has harmed your legitimate rights and interests, and cannot reach an agreement through negotiation, you have the right to file a complaint with [the relevant PI protection supervisory authority].
4.2.6 Right to opt-out. If you reside in California, you have the right to opt out of the disclosure of PI about you for monetary or other valuable consideration. To opt-out, you can choose Do Not Sell My PI.
4.2.7 in addition to the above, you have the right to file a complaint with the supervisory authority.

5.How to exercise your rights

  • You can exercise your rights by:
Fill out the online request form and submit to us
5.2 Please note that we may take steps to verify your identity before granting you access to information or acting on your request to exercise your rights, as required or permitted by law.
5.3 You may designate an authorized agent to make a request in certain circumstances on your behalf. To do so, you must provide an authorized agent written permission to submit a request on your behalf, and we may require that you verify your identity directly with us.
5.4 In some instances, we may not be able to honor your request. For example, we will not honor your request if we cannot verify your identity or if we cannot verify whether an authorized agent has the right to make a request on behalf of you. Additionally, we may not honor your request where an exception applies under applicable law.
5.5 We will endeavor to fulfill your request within 45 days of receiving that request. If we require additional time, we will inform you of the reason and extension period in writing.

6.Cookies

6.1 To personalize your online experience and make it easier for you to access. We may send one or more small data files called cookies or similar technical files on your computer or mobile device. The cookie assigned to you is unique and can only be read by the web server that issued the cookie to your domain. We send cookies to you to simplify the steps of repeatedly logging by you, to help determine your login status, and for account or data security purposes.
6.2 We do not use cookies for any purpose other than those described in this Policy. You can manage or delete cookies according to your preferences. You can clear all cookies stored on your computer, and most web browsers automatically accept cookies, but you can usually change your browser settings to reject cookies if you wish; alternatively, you can clear all cookies stored within the software. However, if you do so, you may need to change the user settings yourself each time you visit us, and any information you have previously recorded will be deleted, which may affect the security of the services you use. For more information on how to change your browser settings, please visit the relevant settings page of your browser.
6.3 Many web browsers have Do Not Track function, which can send Do Not Track requests to websites. As of now, the main Internet standards organizations have not establish policies on how websites should respond to such requests. However,if your browser enables Do Not Track, all of our websites will respect your choice.

7.How your PI is transferred globally

7.1 You are aware of and expressly consent to our collection of your personal data for storage and processing in Singapore .
7.2 Our service providers and authorized partners may be located outside of Singapore and data protection requirements of different jurisdictions will apply. We will endeavor to meet such requirements.

8.How this Policy is updated

8.1 This Policy may be revised. We will not undermine your rights under this Policy without your explicit consent. We will post updated versions of this Policy.
8.2 For major changes, we will also provide more apparent notices (for certain services, we will send a notification via email stating the specific changes to this Policy).
8.3 Major changes referred to in this Policy include, but are not limited to:
8.3.1 Major changes to our service mode, such as the purposes for which PI is processed, the types of PI processed, and the manner in which PI is used.
8.3.2 Major changes in our ownership structure, organizational structure, etc. Such as change of ownership caused by business restructuring, bankruptcy and merger, etc.
8.3.3 Changes in the primary recipients of PI sharing, transfer or public disclosure.
8.3.4 Major changes in your rights to participate in the handling of PI and the manner in which they are exercised.
8.3.5 When there is a change in the department responsible for handling PI security, our contact information and complaint channels.
8.3.6 When a PI security impact assessment report indicates a high risk.
8.4 We will also archive older versions of this Policy for your review.

9.HOW TO CONTACT US

If you have any questions or comments about our products or services, or if you would like us to update information we have about you or your preferences, please contact us by email at: