Tencent privacy protection platform

Science and technology are good, and data are reasonable.

Tencent regards user information security and privacy protection as its lifeline. We follow Tencent's privacy protection PBD, and P represents Person, with the protection of user privacy as the core; B represents Button and hopes to provide reasonable and efficient privacy protection for users through the "privacy button" (product design); D stands for Data, which guarantees data security in all aspects.

Tencent Privacy Protection Platform

Technology is deployed for social good and data is put in manageable use

It is Tencent’s lifeline to protect users’ information security and privacy. We strictly adhere to the Tencent Privacy Protection PBD Guideline. P, stands for “Person”, representing users’ privacy as the essence of our protection. B, stands for “Button”, providing “privacy button” (product design) to offer users a reasonable and efficient privacy protection channel. D means “Data”, representing data security, which we provide our users an overall data security protection.

Safe and reliable Security Safeguard and Reliance

We make every effort to prevent your information from leaking, damaging and losing through reasonable and effective information security technology and management process. We try our best to prevent your information from breach, damage or loss via effective and reasonable information security technology and administrative process.

Protect communication secrets Protection of Communication Secret

We strictly abide by laws and regulations to protect your communication secrets and provide you with safe communication services. We will strictly protect your communication secrets in compliance with the applicable laws and regulations.

Self selection Choice

We provide you with convenient information management options so that you can make appropriate choices and manage your personal information. We provide you convenient privacy management options so that you may make proper choices to control or manage your privacy.

Reasonable necessity Reasonableness and Necessity

In order to provide better services to you and other users, we only collect necessary information. We will collect necessary data so that we can provide you and other users with better service in order to achieve products' functions.

Clear and transparent Transparency

We try to introduce our privacy policy to you in a concise and understandable way, so that you can clearly understand our information processing methods. We endeavor to introduce our privacy policy in an easy and straightforward way and help you better understand our information process practice.

Integrate privacy PBD into product design Integrate Privacy PBD Principle with Tencent’s Product Designs

In all aspects of product or service development, we integrate multiple factors such as law, product and design, integrate the concept of privacy protection, and implement Tencent PBD privacy protection methodology. We take legal, product, design and other elements into considerations of every aspect of our product and service development, to integrate with Privacy PBD Principle, in order to carry out the methodology of Tencent PBD Privacy Protection.

P=Person, which means to take users as the center and improve the transparency of user data processing; B=Button, which represents the control power. Users can control their personal information by providing convenient information management functions; D=Data, representing data security, provides all-round security for user data through effective security technologies and standardized processes of the system.

P, stands for “Person”, representing our user-centric work attitude, and it stress on improving the transparency of user data processing. B, stands for “Button”, which represents controlling, by providing convenient information management function, to allow users to control their own personal information. D, stands for “Data”, representing data security, which we provide our users an overall data security protection with comprehensive and effective security techonologies and standard procedures.

common problem Frequent Questions  ?