WildCoin APP Privacy Agreement

I.Scope of Application
This Privacy Agreement applies to WildCoin APP's operations in Europe, America, Indonesia and other countries. WildCoin APP is committed to complying with local laws and regulations in its operations in these regions to protect user privacy.
II.Legal regulations

A. Europe and America

1. United States

There are many laws and regulations at the federal level that involve privacy protection, such as the Federal Trade Commission Act (FTC Act), which gives the Federal Trade Commission the power to regulate unfair or deceptive business practices, which requires WildCoin APP to be honest and transparent when handling user information. In terms of state-level laws, such as the California Consumer Privacy Act (CCPA), there are strict regulations on the collection, use and sharing of consumers' personal information.
In terms of child protection, the Children's Online Privacy Protection Act (COPPA) is an important legal basis. The law stipulates that online services targeting children under the age of 13 must obtain verifiable parental consent before collecting children's personal information, such as name, address, telephone number, etc.

2. European Union

The General Data Protection Regulation (GDPR) is the main privacy legal framework. It requires WildCoin APP to follow the principles of legality, fairness, transparency, etc. when processing user personal data. Data processing must have a legal basis, such as user consent, contract performance, legitimate interests, etc. At the same time, users have multiple rights to their personal data, including the right to access, the right to correct, the right to delete (the right to be forgotten), the right to restrict processing, the right to data portability, etc.

B. Indonesia

1. Indonesia's Electronic Information and Transactions Act and other relevant laws and regulations regulate the behavior of electronic service providers. WildCoin APP needs to comply with these laws in terms of information protection, user rights, etc. to ensure that its operations in Indonesia are legal and compliant.
III.Child Protection

A. Age Definition and Restriction

1. In Europe and the United States, WildCoin APP complies with COPPA regulations and does not actively provide services to children under the age of 13. If it is found that a child under the age of 13 attempts to register or use the app, measures will be taken to prevent it and the relevant guardian will be notified.
2. In Indonesia, WildCoin APP does not provide services to minors under the age of 18 unless there are special legal circumstances and appropriate regulatory approval and guardian consent is obtained.

B. Special protection measures

1. Limitation of Information Collection

If there are special circumstances involving the provision of services to children or minors, the information collected will be strictly limited to the necessary scope, such as basic identity verification information (only used to ensure compliance with laws, regulations and security requirements), and verifiable parent or guardian consent must be obtained. For example, only the name is collected for identification, and a specific process of parental consent must be followed, such as sending a verification email to the parent's email address and requiring the user to click a confirmation link.

2. Restrictions on Use

Information of children or minors shall not be used for any marketing purposes, including advertising push, product recommendations, etc., unless explicit consent is obtained from their parents or guardians.

3. Enhanced security

For information related to children's or minors' accounts, higher-level security measures are adopted, such as enhanced encryption algorithms and stricter access control. Only employees who are strictly authorized and have passed background checks can access relevant information in accordance with strict security procedures.
IV.Information Protection

A. Information Collection

1. Registration Information

Collect users' basic registration information, such as user name, password, email address, etc., to create and manage user accounts and ensure that users can log in and use the WildCoin APP services normally.

2. Transaction Information

When users withdraw WildCoin , information such as the withdrawal amount and withdrawal time is collected to ensure the accuracy, security and traceability of the transaction.

B. Use of Information

1. Purpose of providing services

Use the collected information to provide the core services of WildCoin APP, such as account management and withdrawal execution policy.

2. Security and Compliance

Use information for security monitoring to prevent fraud, money laundering and other illegal activities. Identify abnormal situations and take timely measures by analyzing users' withdrawal and login behavior. At the same time, conduct information reporting and compliance checks in accordance with local laws and regulations.

3. Enhanced security

For information related to children's or minors' accounts, higher-level security measures are adopted, such as enhanced encryption algorithms and stricter access control. Only employees who are strictly authorized and have passed background checks can access relevant information in accordance with strict security procedures.

C. Information Sharing Restrictions

1. Internal Sharing

When information is shared between different departments within the WildCoin APP, it is only done for the purpose of achieving service and in compliance with strict security and privacy policies. For example, the customer service department may need to access the user's basic information to solve user inquiries, and the technical department may need transaction information to optimize system performance.

2. External Sharing

When sharing information with external partners, explicit consent from users must be obtained (except in special circumstances provided by law). For example, necessary transaction information may be shared with payment gateway partners to complete the payment process, but the partners will be required to comply with the same privacy protection standards.
Cookies. We and our business partners use cookies and other similar technologies (e.g., web beacons, flash cookies, etc.) ("Cookies") to automatically collect information, measure and analyze how you use the Platform, including which features you view most often and how you interact with friends, to serve you advertising, and to measure the effectiveness of advertising and other content. We and our partners also use Cookies to promote the Platform on other platforms and websites. Cookies enable the Platform to provide certain features and functionality.
We may use your email, contact or account information to link your activity across all devices in and outside of our apps. We may use this information to display ads on our apps that are tailored to your interests, preferences and characteristics.

D. Information protection

We attach great importance to information security. We have established a dedicated security team and take all reasonable and feasible measures to protect your personal information:

1. Data security technical measures

We will adopt security measures that meet industry standards, including establishing reasonable system specifications and security technologies to prevent your personal information from being accessed, used, or modified without authorization, and to avoid data damage or loss.
Our services adopt a variety of encryption technologies. For example, in some services, we will use encryption technology (such as SSL) to encrypt and store your personal information, and isolate it through isolation technology to protect your personal information.
We will also adopt strict data access permission control and multi-factor identity authentication technology to protect personal information and prevent data from being used in violation of regulations.

2. Other security measures we take to protect personal information

We have an industry-leading data security management system that focuses on data and is centered around the data life cycle. We improve the security of the entire system from multiple dimensions, including organizational construction, system design, personnel management, product technology, etc. We manage and regulate the storage and use of personal information by establishing a data classification and grading system, data security management specifications, and data security development specifications.
We implement comprehensive security controls on data through confidentiality agreements with information contacts, monitoring and auditing mechanisms.
We also hold security and privacy protection training courses to enhance employees' security awareness and understanding of personal information protection policies and related regulations.

3. Access rights control and monitoring

We only allow employees and partners who need to know this information to access your personal information, and we have set up strict access control and monitoring mechanisms for this purpose. We also require all personnel who may have access to your personal information to fulfill the corresponding confidentiality obligations. If you fail to fulfill these obligations, you may be held legally liable or your cooperation relationship with us may be terminated.

4. Security incident handling

In order to deal with the possible risks of personal information leakage, damage and loss, we have formulated a number of systems to clarify the classification and grading standards of security incidents and security vulnerabilities and the corresponding handling procedures. We have also established an emergency response team for security incidents. In accordance with the requirements of the security incident handling specifications, we launch security plans for different security incidents, conduct loss prevention, analysis, location, formulate remedial measures, and cooperate with relevant departments to trace and combat. We also regularly organize internal training and emergency drills so that our relevant staff can master the corresponding emergency response strategies and procedures.
In the unfortunate event of an information security incident, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, suggestions for you to prevent and reduce risks on your own, and remedial measures for you, etc. We will also promptly inform you of the relevant situation of the incident by email, letter, phone, push notification, etc. When it is difficult to inform the information subject one by one, we will take reasonable and effective means to issue an announcement. At the same time, we will also proactively report the disposal of the information security incident in accordance with the requirements of the regulatory authorities.
V.Information storage part

A. Storage location

1. In Europe and the United States, in accordance with local data protection regulations, data may be stored in data centers that meet relevant security and privacy standards, such as data centers located in the European Union (in compliance with GDPR requirements for data storage locations) or data centers in the United States that comply with relevant state and federal laws.
2. In Indonesia, in accordance with Indonesian legal requirements, data may be stored in data centers in Indonesia or in overseas data centers that comply with Indonesian laws (if there is a relevant cross-border data storage agreement).

B. Storage period

1. Basic Information

The user's basic registration information will be stored while the user account is active and will be retained for a reasonable period of time (e.g. 1-2 years) after the account is cancelled to handle possible subsequent issues such as refunds, dispute resolution, etc.

2. Transaction Information

Transaction information will be stored for a certain period of time according to local financial regulatory requirements and tax laws. For example, in Europe and the United States, it may be stored for 5-7 years according to the regulations of different countries, and in Indonesia, it may be stored for 3-5 years according to local financial regulatory requirements.
VI.Privacy Information Storage Methods and Information Security

A. Encrypted storage

1. For sensitive information of users, such as passwords, advanced encryption algorithms (such as symmetric encryption algorithms such as AES or asymmetric encryption algorithms such as RSA) are used for encrypted storage. In this way, even if the data storage device is illegally obtained, it is difficult for unauthorized personnel to obtain the original information.
2. Encrypt user information stored in the database to ensure the confidentiality and integrity of data during storage.

B. Access Control

1. Establish a strict access control mechanism to authenticate and manage the rights of people who access user privacy information. Only authorized employees can access user information based on legitimate business needs and in accordance with strict security procedures.
2. Use multi-factor authentication (such as password + token or biometric technology such as fingerprint recognition) to strengthen access control to data storage systems.

C. Backup and recovery

1. Back up user information regularly and store the backup data in a secure location different from the primary storage location to prevent data loss or damage.
2. Ensure data privacy and security during backup and recovery operations, following the same encryption and access control standards as primary storage.
VII.Your Rights and Choices

A. Access rights

1. Users have the right to request WildCoin APP to provide a copy of their personal information to understand what information WildCoin APP has collected and stored about them.
2. Within a reasonable time frame, WildCoin APP will provide users with a copy of their personal information in an easily understandable manner.
B. Right to rectification
1. If a user finds that there are errors in their personal information stored by WildCoin APP, they have the right to request correction.
2. WildCoin APP will promptly correct the erroneous information pointed out by the user after verifying the user's identity.

C. Right to Deletion

1. Users have the right to request WildCoin APP to delete their personal information. WildCoin APP will delete it in a timely manner in compliance with laws and regulations .
2. However, in certain circumstances, some information may be retained, such as to comply with laws and regulations (such as tax and audit requirements) or based on legitimate business interests (such as fraud prevention).

D. Right to restrict processing

1. In certain circumstances, such as when a user questions the accuracy of personal information, the user has the right to request WildCoin APP to limit the processing of their personal information.
2. WildCoin APP will take necessary measures to ensure the security of information during the restricted processing period.
E. Right to data portability
1. Users have the right to request that WildCoin APP provide their personal information to them in a structured, commonly used format or transfer it to other service providers (where technically feasible).
2. WildCoin APP will assist users in realizing their right to data portability in accordance with user requirements, while ensuring data security and privacy.
VIII.Sharing, transfer, and public disclosure of personal information

A. Sharing

1. As mentioned above, WildCoin APP follows strict regulations for sharing information internally, and external sharing requires user consent. The information shared is only necessary to achieve the purpose of the service, and the sharing party must comply with the same privacy protection standards.
2. When sharing sensitive information such as user financial information, additional security measures will be taken, such as encrypted transmission and signing of confidentiality agreements.

B. Transfer

As our business continues to develop, we may conduct mergers, acquisitions, asset transfers or similar transactions, and your information may be transferred as part of such transactions. We will require the new company or organization that holds your personal information to continue to be bound by this policy. Otherwise, we will require the company or organization to re-ask your authorization and consent.
We will transfer your personal information to third parties with your explicit consent.

C. Public Disclosure

1. WildCoin APP will not disclose user personal information at will, except in the following circumstances:
- Legal and regulatory requirements, such as cooperating with law enforcement investigations.
- With the user's explicit consent, for example, for marketing purposes (but this is extremely rare and will strictly follow the privacy protection principles).

D. Exceptions to prior authorization and consent when sharing, transferring, or disclosing information

In the following circumstances, sharing, transferring, and disclosing your information does not require your prior authorization and consent:
1. Directly related to national security and national defense security;
2. Directly related to public safety, public health, and major public interests;
3. Directly related to judicial or administrative law enforcement such as criminal investigation, prosecution, trial and execution of judgment;
4. To protect your or other individuals’ life, property and other major legal rights and interests, but it is difficult to obtain their consent;
5. Information that you disclose to the public on your own initiative;
6. Information collected from legally disclosed information, such as legal news reports, government information disclosure and other channels;
7. Related to our performance of obligations prescribed by laws and regulations.
IX.Account cancellation

A. User initiates logout

1. Users have the right to cancel their WildCoin APP account at any time. Users can make a cancellation request through the account settings function in the APP or contact customer service.
2. Upon receiving the cancellation request, WildCoin APP will initiate the cancellation process, including verifying the user's identity (to ensure that the request is made by the account owner).

B. Processing after cancellation

1. After the account is cancelled, WildCoin APP will stop using and delete the user's personal information, except for information that needs to be retained according to laws and regulations (such as transaction records for financial audits or compliance checks, etc.).
2. Send an account cancellation confirmation notification to the user, informing the user that the account has been successfully cancelled and the status of personal information processing.
X.Infringement

A. User Infringement

1. If a user is found to have infringed upon the intellectual property rights (such as the use of unauthorized trademarks or copyrighted content), privacy rights (such as malicious dissemination of other users' private information) or other legitimate rights and interests of others, WildCoin APP has the right to take measures including but not limited to warnings, restricting account functions, freezing account funds, and permanently banning accounts in accordance with relevant laws and regulations and the usage rules of this APP.
2. When dealing with user infringements, we will follow the principles of fairness, justice and transparency and give users reasonable explanations and opportunities to appeal.

B. WildCoin APP Infringement

1. If users believe that WildCoin APP has infringed their legal rights and interests, they can file a complaint with us through legal channels. We will investigate promptly and respond within a reasonable period of time. If there is indeed infringement, we will take measures to correct it, such as stopping the infringement, compensating users for losses (if applicable), improving privacy policies and service processes, etc.
XI.Advertisers, Ad Networks and Measurement Partners

A. Information Sharing Restrictions

1. If WildCoin APP cooperates with advertisers, ad networks or measurement partners, it will follow strict restrictions on sharing user information. Only non-personally identifiable information (such as anonymous user behavior data, such as the frequency of users browsing different sections in the APP, etc.) will be shared, and these sharing behaviors must be carried out with the user's consent (if required by applicable local laws and regulations).
2. Require advertisers, ad networks, and measurement partners to comply with the same privacy protection standards and not use shared information for other unauthorized purposes.

B. Advertising control

1. Users have the right to choose whether to receive personalized ads. If a user chooses not to receive, WildCoin APP will take measures to limit the delivery of personalized ads based on their personal information to the user.
2. When placing advertisements, we will ensure that the content of the advertisements complies with local laws and regulations and does not contain any content that infringes on user rights or violates moral ethics.
XII.Ownership of Account Information

A. User Ownership

1. Users have ownership of the account information they provide to WildCoin APP, which is an important reflection of the user's personal identity and transaction records.
2. Users have the right to decide how their account information is used (within the scope permitted by laws and regulations and this Privacy Agreement). For example, users can request to modify or delete part of their account information.

B. WildCoin APP Rights Restrictions

1. WildCoin APP only uses account information within the scope of user authorization and shall not use account information for other purposes without the user's consent.
2. When a user requests to delete or transfer his or her account information, WildCoin APP shall cooperate in accordance with relevant laws and regulations and the provisions of this Privacy Agreement.
XIII.Third-party services
APP services may access or link to social media or other services provided by third parties, including:
1. You can use the "Share" button to share certain APP service content to third-party services. These functions may collect your information (including your log information) and may install COOKIES in your device to operate the above functions normally;
2. We provide you with links through advertisements or other means of our services, allowing you to link to third-party services or websites;
3. Other situations of accessing third-party services. For example, to achieve the purposes stated in this policy, we may access SDKs or other similar applications (such as embedded codes, plug-ins, etc.) provided by third-party service providers to provide you with better customer service and user experience. Currently, the third-party service providers we access mainly include the following types:
(1) Used for advertising-related services, including advertising display, advertising data monitoring/statistics, etc.;
(2) For transaction-related services, including transaction time, settlement amount, etc.;
(3) Used for third-party authorization services, including third-party account login, sharing of relevant content to third-party products, etc.;
(4) Used to optimize product performance, including improving hardware networking capabilities, reducing server costs, and performing functional hotfixes;
(5) Used for account security and product reinforcement related services, including network monitoring, domain name resolution, anti-hijacking, anti-spam and anti-cheating, encryption and decryption services, etc.
We will evaluate the legality, legitimacy and necessity of the collection of personal information by such third-party services, and require such third parties to take protective measures for your personal information and strictly comply with relevant laws, regulations and regulatory requirements.
XIV.Revision and Notification
In order to provide you with better services, we may modify the terms of this policy from time to time according to the updates of APP services and relevant requirements of laws and regulations. We will announce any changes made to this policy. Major changes referred to in this policy include but are not limited to:
1. Our service model has undergone major changes;
2. We have major changes in our ownership structure, such as changes in ownership due to business adjustments, bankruptcy, mergers and acquisitions, etc.;
3. Major changes occur to the main objects of sharing, transfer or public disclosure of personal information;
4. There are significant changes in your rights to participate in the processing of personal information and the way in which they are exercised;
5. Other situations that are important or may seriously affect your personal rights and interests occur.
XV.Contact Us
If you have any questions, please contact us in time. We will contact you within 7 working days. Our contact email address is: houmeng1016@gmail.com