CGTN Privacy Policy
Last updated: December 30, 2024
Effective date: December 30, 2024
CGTN (China Global Television Network, hereinafter referred to as "we") fully understands the importance of personal information to users of CGTN (hereinafter collectively referred to as "users" or “you" or "your") and will do its utmost to protect your privacy and security. When you use CGTN, we may collect and use your relevant personal information. Our Privacy Policy covers how we handle and access your data when you log in and use our services globally. We hope to explain the processing rules and other related matters concerning the collection and use of your relevant personal information through the "CGTN Privacy Policy" (hereinafter referred to as "this policy"), so as to better protect your rights and interests. In this policy, we have used bold font to highlight clauses that may be of significant importance to you, please review them carefully.
[Special Notice] Our products, websites and services are exclusively for use by adults. Please confirm that you have read, understand and agree with this policy before using CGTN. If you do not agree with the content of this policy, it may result in our services not functioning properly or failing to achieve the intended service outcomes, and you should immediately stop accessing/using our services.
This policy will help you understand the following:
I. How we collect and use your personal information
II. How we entrust you to handle, share, transfer and publicly disclose your personal information
III. How we store your personal information
IV. How we protect your personal information
V. How your personal data is transferred around the world
VI. How we manage your personal information
VII. How we use cookies or similar technology
VIII. Protection of minors
IX. How we update our privacy policy
X. How to contact us
I. How we collect and use your personal information
You understand and agree:
We will sequentially inform you in this policy about the scope of personal information that each function may collect, the purposes for collection, the methods of collection, and the consequences that may result from refusing to provide personal information. Please be aware that even if you refuse to provide the necessary information for each function to operate, you can still use other functions of CGTN.
We will adhere to the principles of legitimacy, legality and necessity, collecting and using the personal information you voluntarily provide or generate while using our products and/or services for the purposes described in this policy. If we intend to use your personal information for other purposes not specified in this policy, or if we use the information already collected for other purposes based on specific objectives, we will inform you in a reasonable manner and obtain your consent again before use. To help you quickly understand the main circumstances regarding the collection and use of your personal information, we have provided a list which you can view in detail through [Settings-Privacy-Data collection].
1.1 The personal information you voluntarily provide to us
1.1.1 Register, log in and cancel your account
To experience a richer and more complete CGTN news browsing service, you can register for and log in to your own CGTN account. When users use the registration/login function, they need to complete a series of registration procedures according to our guidelines. After becoming a registered/logged-in user, we will provide products and/or services exclusively for registered users. When you use the account registration function, we will collect basic registration or login information that you voluntarily provide to us, including: mobile phone number (supporting registration/login for Chinese mainland users), email address (supporting registration/login for non-Chinese mainland users), and the matching results of mobile phone number/email address and verification code/account password (sensitive personal information), and create your account and password. Your password will be stored, transmitted and verified in encrypted form. We will not store, transmit or verify your password in plain text. When you manage, input and use your password, you should carefully evaluate the physical and electronic environments to prevent password leakage. We collect this information to complete the registration/login process, continuously and stably provide functions and/or services exclusively for registered users, and protect your account security. You should be aware that the matching results of mobile phone number/email address and verification code/account password are considered your sensitive personal information. We collect this kind of information to meet the requirements of relevant laws and regulations/network real-name systems. This kind of information is necessary for this function. If you refuse to provide it, you may not be able to use this function, but it does not affect your use of news browsing and search functions. Please consider carefully before submitting the relevant information.
After you agree to the Privacy Policy, you can access CGTN and browse and search anonymously, but you need to register as a user to engage in user services such as comments, likes and favorites.
You can also fill in or edit information about your gender, nickname, avatar and birthday during registration or subsequent use. If you do not provide this information, it will not affect your basic functions when using CGTN. Among them, you can choose images from our system image library for avatar configuration, and we do not support the uploading of images as avatars independently.
You can also use certain third-party accounts to log in, including Apple, Google, Meta, X and WeChat. If you use a third-party account to log in, we will create an account for "CGTN" based on your authorization through the unique identification ID of the third-party Apple accounts, Google accounts, Facebook accounts, X accounts or WeChat accounts enabling you to directly log in and use this product and/or services (we will not obtain your username and email address through these third-party accounts). If you refuse to grant authorization, you will not be able to use a third-party account to log in to our platform, but it will not affect your normal use of other functions provided by us.
We also provide a function for account cancellation. Under the conditions stipulated in the service agreement and in accordance with relevant laws and regulations of various countries, you can delete all your information stored with CGTN by canceling your account. By clicking on "Delete your account" in the [Settings-Account manage] section, you will be directed to a confirmation page where you can click to confirm and cancel your account. Additionally, for users who have logged in using a third-party Facebook account, we have implemented a data deletion request callback mechanism. When you remove CGTN and request to delete your data, you only need to visit your Facebook personal homepage and navigate to [Settings & Privacy – Settings–Apps and Websites], then click the "Send Request" button to complete the data deletion.
After your CGTN account is cancelled, we will stop providing you with CGTN services and delete your personal information, except as otherwise provided by laws and regulations.
1.1.2 Search function
Each time you use the search function, we need to collect relevant information, including: the search terms, the search time, browsing history and browsing duration. In addition, to facilitate you to search more quickly, we provide you with "apply for the use of the clipboard recently copied information" convenient function. The function is closed by default, we will be in your use of the search function, apply for access to the clipboard permissions. After you authorize and agree, we will provide you with the content you need quickly. Please know that we do not collect your clipboard behavior, nor do we upload this information to our server. Only when you actively fill in the information in the search box and click on search, we will collect the information for the search function. Please be assured that we do not store other information about your clipboard and that clipboard information alone cannot identify you specifically. We collect this information to provide you with requested content and services that may be of greater interest to you, as well as to optimize our products and/or services.
1.1.3 News browsing/playback function
When you use the news content browsing and audio-video playback functions, to better present the content to you, understand the compatibility of our products and/or services with different hardware devices, ensure a secure user operation environment, etc., we need to collect your device information and log information. The aforementioned device information [including: device type, device model, system version, device identifier (including: IMEI, IDFA, Android ID, GAID, MAC, OAID, VAID, AAID, IMSI, MEID, UAID, hardware serial number information, ICCID, SIM)] and network-related information [including: latitude and longitude, IP address, WiFi information, base station information, DNS address, DHCP address, SSID, BSSID], application-related information [including: application crash information, notification switch status, App application list and activity status, App application page information, App function event information], the aforementioned log information includes operation logs and behavior logs (search/browsing/click/play records, collection records, like/comment/share records, interaction frequency, play duration, access date/time/duration, push message logs).
1.1.4 Service content display and recommendation function
We will recommend news images, news audio, and news video to you based on the news tags you select. To provide higher quality and more suitable products and/or services for you, and to offer you a better user experience with our products and/or services, under the premise of complying with relevant laws and regulations, we will collect your personal online records (including search/browsing/clicking/playing records, collection records, likes/comments/shares, viewing news images, audio, and video frequencies, as well as interaction (comments, shares) frequencies, playback duration, access dates/time/durations, etc., which are your operation records when using the products and/or services we provide) during the use of this App, and combine them with your information collected legally, including basic information [User ID], network-related information [including: latitude and longitude, IP address, WiFi information, base station information, DNS address, DHCP address, SSID, BSSID], application-related information [including: application crash information, notification switch status, App application list and activity status, App application page information, App function event information]. We use these data in a combined statistical and analytical manner, either individually or in conjunction with other information, and combine them with certain information from other services in a comprehensive statistical and analytical manner for recommendation algorithm modeling, recommending content for your browsing.Based on your browsing and sharing history, and other data, we recommend news images and graphics to you for a better user experience and news service.
Some of our content will be recommended to you according to the language you choose (for example: according to the English, Spanish, French, Arabic or Russian language option you choose, we will show and recommend news content in the language region you choose). We will not ask you to obtain your location permission.
1.1.5 Comment, like, share, save and interact functions
If users choose to comment, like, share or save news content, they may proactively provide relevant textual content information, and we will collect your nickname, avatar, posted information content, user ID and your interaction information, including comment records and save records. To facilitate your faster reference to the content you are interested in browsing, we provide you with the convenient function of "applying to use recently copied information from the clipboard." This function is disabled by default, and when you use the comment function, we will request permission to access the clipboard. After you authorize and agree, we will quickly provide you with the content you need. Please be aware that we do not collect your clipboard behavior or upload this information to our servers. We only collect this information when you actively enter relevant information in a comment and click to post. Please rest assured that we will not store any other information about your clipboard, and individual clipboard information cannot identify your specific identity. We collect this information to provide you with the content you need and potentially more interesting services, while optimizing our products and/or services.
In order to ensure the security of the uploaded content, avoid the disturbance of suspicious accounts to our platform users and audiences, and purify cyberspace, our platform will review the comments you post. Only content that passes the review will be displayed.
You can delete your favorites and cancel your previous likes through [Settings-Saved].
1.1.6 User response function
When you contact us or use other user response functions (including exercising your rights to control your personal information, other customer complaints and needs), for the security of your account and system, we may need you to first provide account information and match it with your previous personal information to verify your user identity. When you use user response functions, we may also need to collect the following personal information: contact information (telephone number/email address or other contact information that users provide to us when contacting us), communication information between users and us (including text/call records), and other necessary information related to user needs. We collect this information to investigate facts and help you solve problems, which is essential information for this function. If you refuse to provide this information, it may result in you being unable to use our user response functions.
1.1.7 Message notification function
We may send one or more types of messages to you through system notifications, application notifications, etc., such as content/hot spot recommendations, social interaction notifications, in-app messages (such as nickname in compliance, whether the review of comment content has been approved, comment restrictions, nickname modification restrictions, replying to your comments). To achieve the above functions and services and ensure that CGTN can normally receive system notifications when it is closed or running in the background, we must use the auto-start capability. We will wake up the applications auto-start behavior through system notifications within a reasonable frequency range. If you do not wish to receive our system notifications, you can choose to turn off our notification function on your device or disable it through the push notification settings we provide (i.e., select whether you accept new message notifications in [Settings-Privacy-Permissions]).
1.1.8 ASK PANDA!
When you choose English as your language, you can click "ASK PANDA!" in the Creative Lab module on the Explore page to enter the conversation interface with the PANDA (hereinafter referred to as PANDA). We will request your microphone permissions to facilitate your conversation with PANDA. PANDA will recommend corresponding news content based on your needs, but please rest assured that we will not collect your voice information or upload it to the server.
1.1.9 User annual report function
When you click on "Annual Report", you can choose to activate the user annual report function. We collect your usage data on the CGTN platform (including website, client, etc.) and provide you with personalized annual report services. This annual report can help you better understand your platform usage habits, promoting subsequent service quality improvements and experience optimization. We will use the behavioral information generated by you on the CGTN platform in 2024, including login time, search/browsing/click/play records, collection records, like/comment/share records, interaction frequency, play duration, access date/time/duration, registration time, and other personal data. The annual report will include your avatar, nickname, news browsing status and news collection status on the CGTN client. If you choose to display it publicly, others can see your publicly shared personal information through the channels you share.
1.1.10 Word Arena interactive function
When you click "Word Arena", you can choose to use the Word Arena interactive function. We collect your user information, such as your avatar and username, which will be displayed publicly in the product; we collect device identifiers as user identity to enable users to inherit their interactive history when registering in the future; we collect behavior data to store temporary cache information during gameplay to ensure consistency and stability; we collect interactive history records to help you view your interactive history and optimize the interactive experience.
1.1.11 Operation and product security functions
We need to collect some of your information to ensure the security of your account and system when using our products and/or services, and to assist in enhancing the security and reliability of our products and services, preventing any actions that may harm users, CGTN, society, including your following personal information: Basic Information [Mobile phone number, email address, nickname, unique identification ID of third-party Apple account/Google account/Facebook account/X account/WeChat account, gender, birthday information, user ID (if applicable)] device information [including: device type, device model, system version, device identifier (including: IMEI, IDFA, Android ID, GAID, MAC, OAID, VAID, AAID, IMSI, MEID, UAID, hardware serial number information, ICCID, SIM card)] Network Information [including: latitude and longitude, IP address, WiFi information, base station information, DNS address, DHCP address, SSID, BSSID] Application Information [including: application crash information, notification switch status, app list and activity status, app page information, app function event information] Personal Internet Record (including search/browsing/clicking/playing records, collection records, likes/comments/sharing records, frequency of browsing news and watching video news and their interactions (comments, sharing), playback duration) Access date/time/duration, operation records when using the products and/or services provided by us, push message logs, service log information. At the same time, we will detect the relevant sensors on your device (including accelerometer, direction sensor) to provide you with high-quality, safe and reliable products and services.
1.2 Additional services provided based on system permissions
To provide you with more convenient and higher-quality products and/or services and to strive to enhance your experience, we may collect and use your personal information in the additional services provided when you use system permissions (camera, album, microphone, notification, and internet permissions). System permissions are not enabled by default; we will only request and obtain the relevant information when you trigger the relevant additional service functions. If you do not provide this information, it will not affect your basic services such as browsing, searching and watching news, but you may not be able to enjoy the user experience provided by these additional services. You can always revoke the authorization through the relevant function settings page [Settings-Privacy-Permissions], or check the status of these permissions in your devices "Settings" and decide whether to enable or disable these permissions (if applicable). By enabling these permissions, you authorize us to access, obtain, collect and use your personal information; when you revoke this authorization, we will no longer collect this information and will no longer provide you with the corresponding services; however, unless you delete your personal information according to legal requirements, your revocation will not affect our processing and storage of personal information based on your previous authorization. These additional services have the following functional scenarios.
Device permission Corresponding business function Function scenario description Can it be closed?
Camera permission AR shooting Take photos using the AR shooting function Yes, the closure will only affect the corresponding function and not affect other functions of the App
Album permissions Store AR photos and card posters Save photos taken through the AR shooting function and card posters generated by the card flipping function in the user annual report function Yes, the closure will only affect the corresponding function and not affect any other functions of the App
Microphone permission Talk to robots Use "ASK PANDA!" Yes, closing it only affects the corresponding function and does not affect other functions of the App
Notification permission System notifications App-related news push Yes, the closure will only affect the corresponding function and not affect other functions of the App
Network permission Internet access Turn on internet access and browse real-time news Yes, after the app is closed, the App content cannot be read and updated in real time, and the App cannot be used normally
1.3 Sensor application scenarios
In the following application scenarios, we may invoke your sensor permissions to provide you with corresponding business functions through your sensor information (individual sensor information is not personal information). Please be aware that individual device sensor information does not involve any person's location information and cannot be combined with other information to identify specific individuals.
Invoke the scene Sensor name Purpose of the call
Switch between landscape and portrait screens while playing video Accelerometer, orientation sensor, gravity sensor Detect the change of screen orientation and switch between landscape and portrait mode for video playback
AR camera - 360° panoramic video Accelerometer Detect screen orientation changes
1.4. Other rules for collecting and using personal information
1.4.1. If the information you provide contains personal information of other users, you must ensure that you have obtained legal authorization before providing us with such personal information.
1.4.2 You understand and agree that we aim to provide you with complete products and/or services, so we will continuously improve our products and/or services, including technology, which means we may introduce new business functions that require the collection of new personal information or changes in the purpose or method of using personal information. If a function that requires the collection of users' personal information is not specified in this policy, we will update this policy and notify you through pop-up notifications or other means that make it easy for you to be informed of the purpose, content, usage method, and scope of information collection, and provide you with the option to choose whether to agree. We will collect information only after obtaining your explicit consent. Without your explicit consent, we will not restrict your rights under this policy. During this process, if users have any questions or related matters, they can contact us through the contact information provided at the end of this policy, and we will respond accordingly.
1.4.3 We cannot obtain or use your personal information provided to third parties or collected by external third parties in unconventional ways (such as maliciously interfering with the data of their series of apps) without authorization. If it is necessary for business development to indirectly collect (such as sharing etc.) your personal information from third parties, and if we provide you with products and/or services directly or jointly, this scenario includes you logging into our products and/or services directly through a third-party account, we will obtain the personal information that you have authorized to share from the third party. At the same time, our professional security team will strengthen the security of personal information (including encrypting sensitive information storage, access control, etc.). We will use the same protective measures and methods as when we directly collect your personal information to protect the personal information obtained indirectly.
1.4.4 Exceptions where consent is not required
According to the provisions of laws and regulations, we do not need to obtain your consent to collect and use your personal information under the following circumstances:
(1) It is necessary for the conclusion and performance of a contract in which the individual is a party, or for the implementation of human resource management in accordance with the labor rules and regulations formulated according to law and the collective contract signed according to law;
(2) It is necessary for the performance of statutory duties or obligations;
(3) It is necessary to deal with public health emergencies or to protect the life, health and property of natural persons in emergency situations;
(4) In order to implement news reporting and public opinion supervision for the public interest, and to handle personal information within a reasonable scope;
(5) In order to process personal information that has been disclosed by individuals or has been legally disclosed within a reasonable scope in accordance with the provisions of the General Data Protection Regulation (GDPR), the California Consumer Privacy Act (CCPA) and the Personal Information Protection Law of the Peopl's Republic of China;
(6) Other circumstances prescribed by laws and administrative regulations.
II. How we entrust the processing, sharing, transfer and public disclosure of your personal information
1.5 Delegated processing
We may entrust third parties to process your personal information on our behalf in order to provide you with products and/or services. We will only entrust third parties to process your personal information for legitimate, proper, necessary, specific and clear purposes as stated in this policy statement. Third parties will only have access to the information required for their duties, and we will sign strict processing agreements with them, requiring them to process personal information according to our requirements, this policy, and any other relevant confidentiality and security measures, and not to use such personal information for any purposes beyond the scope of the entrustment. If third parties use your information for purposes not entrusted to us, they will obtain your separate consent.
1.6 Sharing
We will attach great importance to the protection of your personal information, which is an important basis and component for us to provide you with products and/or services. We will only collect and use your personal information within the purposes and scope described in this policy or as required by laws and regulations, and strictly keep it confidential. We will only share your personal information for legitimate, proper, necessary, specific and clear purposes, and will only share necessary personal information. When we share information with our business partners (third-party service providers, contractors, agents, application developers, etc., such as service providers who provide us with personal behavior data collection services), we will protect your personal information in various ways, including but not limited to: (1) If there are reasonable grounds for such actions and you have authorized us to do so, we will inform you of the purpose and type of information to be shared (if it involves sensitive personal information, we will also inform you of the content of the sensitive personal information involved) before sharing and obtain your authorization and consent before sharing; (2) Our security team will conduct security assessments and processing of information data output forms, flows and usage. Please be aware that even if we have obtained your authorization and consent, we will try to anonymize the personal information in the shared content. We will share your personal information with the third party in the following circumstances:
(1) Based on your own request, or with your prior express authorization or consent;
(2) Related to our performance of obligations prescribed by laws and regulations;
(3) Directly related to national security and national defense security;
(4) Directly related to public security, public health and major public interests;
(5) Directly related to criminal investigation, prosecution, trial and execution of judgments;
(6) Your personal information that you disclose to the public;
(7) Collect personal information from legal and public information, such as through legal news reports, government information disclosure and other channels;
(8) To provide your personal information to third parties for the purpose of protecting the interests, property or safety of CGTN and its users or the public from damage within the scope required or permitted by law;
(9) Necessary sharing by third-party business partners.
You understand and agree that for the necessary/reasonable smooth operation of our business, to meet your requirements, to fulfill our obligations under relevant service agreements or this policy and to exercise our rights or comply with legal provisions, we may need to share your personal information with some business partners. We commit to requiring third parties to process the aforementioned information in accordance with our instructions, this policy, and other relevant confidentiality and security measures.
Our business partners include:
(1) Suppliers providing technical and consulting services. We may share your personal information with third parties that support our service provision. These institutions include those that provide infrastructure technology services, data processing and customer service for us. However, we require these service providers to use your information only for the purpose of providing services to us and not for their own benefit.
(2) Third-party SDK Service Providers: Our products and/or services may contain third-party SDKs or other similar applications. When you use such services provided by third parties on our platform, you agree to the direct collection and processing of your information by them. Please consider this carefully when authorizing third parties to use such information. You can learn more about the specific information of third-party SDKs or other similar applications through the following content. The aforementioned service providers collect and process information in accordance with their own privacy policies, which do not apply to this policy. However, we will also strive to review the business access qualifications of these third parties and ensure their legal compliance and security. To maximize the protection of your information security, we strongly recommend that you carefully read the privacy policies of any third-party SDK services before using them. To protect your legal rights, if you find that these SDKs or other similar applications pose risks, we advise you to immediately terminate the relevant operations and promptly contact us.
iOS
List of third-party SDK service providers
Product name Usage scenario Purpose of use Share the name of the information Name of third-party company Privacy policy link
Aurora push SDK Message push service Used to provide information push service for CGTN users Device parameters and system information (device type, device model, system version, and related hardware information)
Device identifiers (IMEI, IDFA, Android ID, GAID, MAC, OAID, VAID, AAID, IMSI, MEID, UAID, hardware serial number information, ICCID, SIM information)
Network information and location information (IP address, WiFi information, base station information, DNS address, DHCP address, SSID, BSSID, latitude and longitude)
Application list information (application crash information, notification switch status, App application list and activity status, App application page information, App function event-related information)
Shenzhen Hexun Huagou Information Technology Co., LTD https://www.jiguang.cn/license/privacy
Google Translation SDK News translation services Used to provide multilingual news translation The main content of the news https://policies.google.com/privacy#info
Microsoft Translation SDK News translation service Used to provide multilingual news translation The main content of the news https://privacy.microsoft.com/zh-cn/privacystatement
AppsFlyer SDK User attribution analysis News browsing monitoring Facility information
Device identifier
General location information
information
Behavior information
AppsFlyer Inc.
AppsFlyer UK Ltd.
AppsFlyer Ltd.
https://www.appsflyer.com/legal/services-privacy-policy/
Google Analytics for Firebase GA4 Analytics To provide users with better news recommendation content and services Mobile AD ID
IDFV/Android ID
Firebase Install ID
Analyze the application instance ID
https://firebase.google.com/support/privacy?hl=zh-cn
GEETEST Log in, sign up, and retrieve your password Safety risk control Business data: product ID, integrated web address referrer, business access time, package name/Bundle ID, application version
Basic data IP, UA, language, device model, device brand, system platform, system version, system language, screen height, screen width, whether it is a tablet, memory size, device name, operator name, network system
Security risk control: OAID, escape/Root identifier, proxy marker, simulator identifier, code tampering marker
Wuhan Jiyi Network Technology Co., LTD http://www.geetest.com/Private
Android
List of third-party SDK service providers
Product name Usage scenario Purpose of use Share the name of the information Name of third-party company Privacy policy link
Aurora push SDK Message push service Used to provide information push service for CGTN users Device parameters and system information (device type, device model, system version, and related hardware information)
Device identifiers (IMEI, IDFA, Android ID, GAID, MAC, OAID, VAID, AAID, IMSI, MEID, UAID, hardware serial number information, ICCID, SIM information)
Network information and location information (IP address, WiFi information, base station information, DNS address, DHCP address, SSID, BSSID, latitude and longitude)
Application list information (application crash information, notification switch status, App application list and activity status, App application page information, App function event-related information)
Shenzhen Hexun Huagou Information Technology Co., LTD https://www.jiguang.cn/license/privacy
Google Translation SDK News translation services Used to provide multilingual news translation The main content of the news https://policies.google.com/privacy#info
Microsoft Translation SDK News translation service Used to provide multilingual news translation The main content of the news https://privacy.microsoft.com/zh-cn/privacystatement
WeChat SDK Wechat friends sharing and WeChat collection function Used to share CGTN content to Wechat Facility information Shenzhen Tencent Computer System Co., LTD https://www.wechat.com/zh_CN/privacy_policy.html
Sinaweibo sdk / Weibo SDK Weibo sharing function Used to share CGTN content to Weibo Facility information Beijing Weimengchuangke Network Technology Co., LTD https://open.weibo.com/wiki/Sdk/privacy
GEETEST Log in, sign up, and retrieve your password Safety risk control Business data: product ID, integrated web address Referer, business access time, package name, Bundle ID, application version
Basic data: IP, UA, language, device model, device brand, system platform, system version, system language, screen height, screen width, whether it is a tablet, memory size, device name, operator name, network mode
Security risk control: OAID, escape/Root identifier, proxy marker, simulator identifier, code tampering marker
Wuhan Jiyi Network Technology Co., LTD http://www.geetest.com/Private
(3) Other partners whose sharing is necessary for the realization of the functions or services of our products and/or services or the provision of services you need, or to handle disputes or controversies between you and others.
You may share your personal information or other information with a third party (including unspecified objects) based on the CGTN platform, but we shall not be liable for any information leakage or use caused by your sharing behavior. You shall bear the corresponding legal responsibilities by yourself.
1.7 Possession transfer
Transfer refers to the process of transferring control of personal information to other companies, organizations or individuals. In principle, we will not transfer your personal information to other companies, organizations or individuals, except in the following cases:
(1) based on your own request, or with your prior express authorization or consent;
(2) related to our performance of obligations prescribed by laws and regulations;
(3) directly related to national security and national defense security;
(4) directly related to public security, public health and major public interests;
(5) directly related to criminal investigation, prosecution, trial and execution of judgments;
(6) in order to protect your or other individuals' vital rights and interests such as life and property, but it is difficult to obtain your consent;
(7) your personal information that you disclose to the public;
(8) collect personal information from legal and public information, such as through legal news reports, government information disclosure and other channels;
(9) transfer when the company merger, acquisition or liquidation of bankruptcy occurs and the operating entity changes.
(10) other circumstances prescribed by laws and administrative regulations.
If we conduct mergers, acquisitions, reorganizations, divisions, bankruptcies, asset transfers or similar transactions, and your personal information may be transferred as part of such transactions, we will require the new holder to continue to comply with and enforce the full content of this policy (including purposes of use, rules of use, security measures, etc.), otherwise we will require them to obtain your express authorization and consent again;
If the transfer is indeed necessary due to the above reasons, we will inform you of the purpose and type of the transfer information (if it involves sensitive personal information, we will also inform you of the content involved), and transfer after obtaining your explicit consent, except as otherwise provided by laws and regulations or otherwise agreed in this policy.
1.8 Public disclosure
In principle, we will not disclose any of your personal information, except in the following circumstances:
(1) Public disclosure with explicit consent: After obtaining the explicit consent of users, we will publicly disclose the personal information of users;
(2) In the event of a merger, acquisition or bankruptcy liquidation of our platform service provider, or any other situation involving a merger, acquisition, or bankruptcy liquidation, if it involves the public disclosure of personal information, we will require the new company or organization holding the users' personal information to continue to be bound by this policy; otherwise, we will require that company, organization or individual seeks authorization and consent from the user again;
(3) Directly related to national security and national defense security;
(4) Directly related to public safety, public health or major public interests;
(5) Directly related to criminal investigation, prosecution, trial and execution of judgments;
(6) In order to safeguard the vital interests, property and other major legitimate rights and interests of an individual but it is difficult to obtain his consent;
(7) Personal information disclosed by users to the public;
(8) Collect personal information from legally disclosed information, such as legal news reports and government information disclosure channels.
III. How we store your personal information
1.9 Storage location
Currently, we have data storage servers in four regions: Hong Kong, Beijing, Frankfurt and Virginia. According to the laws and regulations of your region, we store your personal information collected and generated during our operations on the nearest server in the region where you have registered your account. However, there are exceptions: if business needs require providing data overseas, we will conduct a security assessment as required by regulations, ensuring it meets security standards and obtaining your informed consent before transferring it overseas for storage. For example, we collect your review content, user ID, nickname, review time, article ID, approval time and user avatar, among other personal data, and transmit them to Hong Kong, China, where we store or process the personal data; when you use our Interactive function services, the data generated will be transmitted to North America.
1.10 Storage period
We retain your personal information only for as long as necessary to achieve the purposes described in this policy and as required by laws, regulations and regulatory provisions. After the statutory retention period, we will delete your personal information. For example:
Mobile phone number: When you register and log in with your mobile phone number, we need to keep your mobile phone number continuously so as to provide you with normal services, deal with your possible inquiries and complaints, and ensure your account and system security.
E-mail: When you register and log in with your email, we need to keep your email address continuously so that we can provide you with normal services, respond to your possible inquiries and complaints, and protect your account and system security.
We will retain the information you have posted, liked and saved during the period when you have not withdrawn, deleted or cancelled your account for providing you with continuous business functions.
We will delete your personal information (including any comments you have previously published) if you cancel your account, actively delete your personal information or after the necessary period of time has expired. Exceptions apply:
(1) Compliance with the requirements of laws and regulations on information retention
(2) The time limit needs to be reasonably extended for the purpose of financial, audit and dispute settlement.
IV. How we protect your personal information
1.11 We have implemented industry-standard security measures to protect the personal information you provide, preventing unauthorized access, public disclosure, use, modification, damage or loss of data. We will take all reasonable and feasible measures to protect your personal data. For example, we will use encryption technology to ensure data confidentiality; we will employ trusted protection mechanisms to prevent malicious attacks on data; we will implement access control mechanisms to ensure that only authorized personnel can access personal data; and we will regularly organize security and privacy protection training courses to enhance employees awareness of the importance of protecting personal data.
1.12 We will take all reasonable and feasible measures to ensure that only the personal data necessary for achieving the purposes outlined in this policy is collected. We will retain your personal data only for as long as necessary to fulfill the purposes outlined in this policy unless there is a compelling need to extend the retention period and obtain your separate authorization or consent or as required by applicable laws, regulations, or specific regulatory requirements regarding data retention periods.
1.13 The internet environment is not one hundred percent safe. Although we are committed to protecting your personal data, we cannot guarantee or ensure its absolute security therefore you should also take active measures to ensure the security of your personal data.
1.14 In the event of an unfortunate personal data security incident or data breach, we will inform you in a timely manner according to the requirements of laws and regulations such as the General Data Protection Regulation (GDPR), the California Consumer Privacy Act (CCPA), and the Personal Information Protection Law of the People's Republic of China: the basic situation and potential impact of the security incident, the measures we have taken or will take to address it, suggestions for you to independently prevent and mitigate risks, and remedial actions for you. We will promptly inform you of the relevant circumstances of the incident through email, letter, phone call, push notifications, etc. When it is difficult to inform each individual data subject individually, we will issue an announcement through reasonable and effective means. If you have any questions about our personal data protection, such as if you discover that your personal data has been compromised, please contact us immediately through the contact information provided at the end of this policy so that we can take appropriate measures. At the same time, for personal data security incidents that pose risks to your rights and freedoms, we will notify the relevant regulatory authorities in the corresponding region within 24 hours and report the handling of the personal data security incident in a timely and proactive manner according to the requirements of relevant laws and regulations.
1.15 Some interactive functions, social media and related services may contain network links operated and maintained by third parties, which we cannot control. Please note that any data you provide to third parties will be subject to their privacy policies or personal data protection policies. We recommend that you understand and inquire before providing any data to third parties. We do not assume any responsibility for the content, actions or policies of third parties. The appearance of third-party links on some of our products and/or services does not indicate that we endorse the content, actions, or policies of the third parties.
V. How your personal information is transferred around the world
By agreeing to this policy, you agree that your personal information may be transmitted and stored across borders when you log in or use our services. We will strictly comply with relevant laws and regulatory policies in your region and follow relevant national regulations.
In principle, the personal information we collect and generate will be stored on servers located in the region where you registered your account. However, due to our engineering, technical and other support teams being based in China, your personal information may be transferred to jurisdictions outside the country where you use our products and/or services, or accessed from these jurisdictions.
Although such jurisdictions may have different data protection laws, we will ensure that your personal information receives adequate and equivalent protection through organizational and technical measures. For example, we will conduct security initiatives such as personal data security impact assessments before cross-border data transfers, and implement technical and management measures to effectively fulfill our data security obligations.
VI. How you manage your personal information
CGTN, in accordance with the requirements of laws and regulations such as the General Data Protection Regulation (GDPR), California Consumer Privacy Act (CCPA), and the Personal Information Protection Law of the People's Republic of China, provides convenient methods for you to access, correct and delete your account information at any time, as well as other personal information you provide when using our services, and you can also withdraw your previous consent to the processing of your personal information. At the same time, you can also deactivate your registered account. You can access and manage your personal information through the following methods.
1.16 Access, correction and supplementation of personal information
If you want to access or edit the basic personal data information in your account and change your password, add personal information (such as birthday information, gender), you can query, modify your personal data (nickname, avatar), privacy settings, and correct your personal registration information (mobile phone number, email) through [Settings-Edit profile].
In order to protect the security of your account, we may need you to fill in relevant information to verify your identity when correcting your mobile phone number or email address.
1.17 Delete personal information
You can delete the personal information you have filled in through [Settings-Edit profile]. In the following circumstances, you can request us to delete the personal information:
(1) We violate the provisions of laws and administrative regulations or agreements with you to collect, store, use, transfer or disclose users' personal information;
(2) We collect, store, use, transfer or disclose users' personal information beyond the scope of purpose or necessary time limit;
(3) We collect and use users' personal information without obtaining clear consent or withdrawing users' consent;
(4) The user no longer uses our products and/or services, or the user voluntarily cancels the account;
(5) We permanently cease to provide products and/or services to users;
(6) Other circumstances prescribed by laws and administrative regulations.
1.18 Personal information subject cancels the account
If you need to cancel your CGTN account, you can do so through [Settings-Account manage-Delete your account]. Alternatively, you can contact us via the contact information at the end of this policy. After verifying your identity, we will release your phone number and email address to achieve the effect of account cancellation. Account cancellation does not log you out; after clicking the cancel account button, you will see a "Are you sure you want to cancel?" screen. Please read carefully and confirm that you understand the impact of account cancellation before proceeding with the cancellation.
After the user voluntarily cancels the account, we will stop providing the product and/or service and delete the users' personal information in accordance with the requirements of applicable laws.
You have the right to obtain a copy of your personal information according to laws, regulations or national standards. You can send an email to cgtndpo@cgtncorp.com to contact us. After verifying your identity, we will respond to you within fifteen days to assist in resolving your issue.
Withdraw your authorization
Please understand that each business function often requires the activation of certain permissions and the collection of necessary personal information in order to be realized. For the collection, use and management of your personal information and device permissions, you can contact us through device system permissions or the contact information at the end of this article to request withdrawal of consent, or you can operate it yourself through the following ways:
a.When you want to withdraw authorization for photo album, camera, microphone, network function, the withdrawal path is [Settings-Privacy-Permissions];
b.When you want to withdraw your consent to this policy, you can close the authorization of privacy terms by re-selecting "Disagree" in the Privacy Policy through [Settings-Privacy-Privacy policy]. After closing, you will exit the App.
After you withdraw your authorization and consent, we will no longer process the corresponding personal information, but please understand that when you withdraw your authorization and consent, we will be unable to continue providing you with the specific functions and/or services corresponding to the withdrawn authorization and consent. Your decision to withdraw your consent will not affect the personal information processing activities previously conducted based on your authorization.
1.19 Protection of personal information of deceased users
The close relatives of the deceased user may exercise the rights of viewing, copying, correcting and deleting the relevant personal information of the deceased user through the contact information at the end of this article for their own legitimate and proper interests, except where the deceased user has other arrangements during his/her lifetime.
You understand and confirm that to fully protect the personal information rights of deceased users, the close relatives of deceased users who apply to exercise this right must submit the identity documents of the deceased user, death certificate, identity documents of the applicant, proof of kinship between the applicant and the deceased user, and provide the type of right to be exercised and the purpose. We will legally provide the corresponding services to the user and their close relatives after verification, unless otherwise stipulated by laws, regulations, or this rule.
1.20 Marketing of personal data
We will not use your personal data for marketing and promotion. When the purpose of data use changes (such as marketing promotion), we will clearly state the purpose of use in the privacy policy, and obtain your consent again, allowing you to refuse the data processing of relevant purposes.
1.21 In response to your request
To ensure security, we may first require you to verify your identity before processing your request. In principle, we will respond to your request within 15 days after receiving it and verifying your user identity, to assist in resolving your issue.
For your reasonable requests, we generally do not charge fees. However, for multiple repetitive requests that exceed a reasonable limit, we may charge a certain cost fee depending on the circumstances. For requests that are contrary to legal and regulatory requirements, feature unwarranted repetition, require excessive technical means (such as developing new systems or fundamentally changing current practices), pose risks to others legitimate rights and interests, or are extremely unrealistic, we may refuse them.
In the following circumstances, we will not be able to respond to your request in accordance with the requirements of laws and regulations:
(1) related to our performance of obligations prescribed by laws and regulations;
(2) directly related to national security and national defense security;
(3) directly related to public security, public health and major public interests;
(4) directly related to criminal investigation, prosecution, trial and execution of judgments;
(5) We have sufficient evidence to show that you have subjective malice or abuse of rights;
(6) In order to protect your or other individuals' vital rights and interests such as life and property, but it is difficult to obtain your authorization or consent;
(7) Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations;
(8) Involving trade secrets.
If you have further requirements or any questions, comments or suggestions about your rights as a data subject, you can contact us through the contact information at the end of this article and exercise your relevant rights.
VII. How we use cookies and similar technology
1.22 If you accept cookies, CGTN will set up or access cookies on your computer and related mobile devices so that you can log in or use CGTN platform services or features that depend on cookies.
1.23 If your browser allows, you can (partially or fully) reject cookies and/or similar technologies through the settings of your browser; or delete cookies and/or similar technologies that have been stored in your computer or mobile device or other devices so that we cannot track your personal information in whole or in part. If you need to know more about how to change your browser settings, please refer to the relevant settings page of the browser you are using. You understand and acknowledge that some of our products and/or services can only be realized through the use of cookies or similar technologies. If users refuse to use or delete these technologies, they may not be able to use our relevant products and/or services normally or may not receive the best service experience through our products and/or services which could also affect the protection of user information and account security.
1.24 The information obtained through cookies established by CGTN shall apply to this policy.
Ⅷ. Protection of minors
Our products, websites and services are primarily aimed at adults. If we discover that we have collected personal information from minors without obtaining verifiable parental or legal guardian consent beforehand, we will endeavor to delete such data as soon as possible. If you are the legal guardian of a minor and believe that your minor has used our services or provided us with personal information, please contact us promptly through the contact information provided in Article 10 of this policy.
Although the definition of a minor varies from place to place, we consider anyone under the age of 18 to be a minor.
IX. How we update our privacy policy
To provide you with a better service we may modify the terms of this policy from time to time according to the updates of CGTN services and relevant legal requirements. Without your explicit consent we will not reduce the rights you are entitled to under this policy. We will publish any modifications to this policy on this page which form part of this policy.
For major changes, we will also provide more significant notifications (including but not limited to pop-up prompts, explaining the specific changes of this policy).
Major changes referred to in this policy include but are not limited to:
(1) Major changes have taken place in our service model, such as the purpose of processing personal information, the type of personal information processed and the way personal information is used;
(2) Major changes have taken place in our ownership structure, such as changes in ownership caused by business adjustments, bankruptcy, and mergers and acquisitions;
(3) Major changes have occurred in the main objects of personal information sharing, transfer or public disclosure;
(4) Major changes have taken place in your rights and the way you exercise them in the processing of personal information;
(5) Major changes occur in the department responsible for personal information security, contact information and complaint channels;
(6) When the personal information security impact assessment report indicates high risk.
Any changes we make will put your satisfaction first. We encourage you to review our Privacy Policy each time you use our services. After this policy is updated, we will seek your consent again or inform you of the updates.
X. How to contact us
If you have any complaints or reports about network information security, or you have any questions, comments or suggestions about this policy, especially if you believe that our personal information processing behavior has damaged your legitimate rights and interests, you can contact us at any time through the following ways:
1.China Global Television Network
  • Address: Room 2210, Building 2, No.1 Xi Da Wang Lu, Chao Yang District, Beijing, the People's Republic of China
  • Email: cgtn@cgtn.com
2.China Global Television Network UK Representative
  • Address: 11th Floor, Building 7, Chiswick Park, London W45YG, UK
  • Email: dataprotection@cgtn-europe.com
3.Data Protection Officer in Europe
  • Name: iuro Attorneys at Law represented by Dr. Andreas Maetzler
  • Address for Requests: 11th Floor, Building 7, Chiswick Park, London W45YG, UK
  • Email: cgtndpo@cgtncorp.com
We will respond to your complaints and reports in a timely manner after verifying and authenticating your user identity. In general, we will respond within 15 days.