<template>
  <div class="el-bg">
    <img class="img-head" :src="logo"/>
    <div class="line"></div>

    <label class="title-lable">LinkCredit - Privacy Policy</label>

    <label class="lable-context"><font class="blod-font">Updated Date: Jan 21, 2021</font></label>
    <label class="lable-context"><font class="blod-font">Effective Date: Feb 1, 2021</font></label>

    <p class="p-context">
    Welcome to use LinkCredit suite products and services that are provided, operated and controlled by ERIC VSTA LIMITED
    (hereinafter referred to as “<font class="blod-font">we</font>”, “<font class="blod-font">us</font>” or “<font class="blod-font">ERIC VSTA LIMITED</font>”),
    including LendCredit (and applications available in LinkCredit which are provided and operated by ERIC VSTA LIMITED), LinkCredit loan,
    High amount loan and other products and services (hereinafter referred to “<font class="blod-font">this Platform</font>”).
    </p>

    <p class="p-context">
    This Privacy Policy sets out the basis on which your personal information will be collected, processed,
    used and disclosed by us in the process of your access and use of this Platform.
    </p>

    <p class="p-context">
    This Privacy Policy constitutes a legally binding agreement between you and us and therefore,
    we hereby specifically remind you to read carefully and fully understand all the terms of this Privacy Policy,
    especially such terms that disclaim or relieve our liabilities, terms that restrict your rights, terms of dispute resolution and governing law etc.
    <font class="blod-font">The terms that may exclude or limit our liabilities are marked in bold or underlined for your special attention.</font>
    Please read this Privacy Policy prudently and choose whether or not to accept this Privacy Policy and please cease to use or access to this Platform
    if you disagree with this Privacy Policy.
    </p>

    <p class="p-context">
    <font class="blod-font">If you are using this Platform as an Authorized User,
    we may either collect and check your personal information through your employer (e.g. by contact with your employer via email, phone call and etc.)
    or from yourself (e.g. when you are using this Platform).</font>
    </p>

    <p class="p-context">
    Permissions to access contact list, geographic location, camera, microphone, messages and album will not be automatically turned on
    and they will only be used with your express authorization and to the extent of particular use of functions and services.
    You can withdraw any of the foregoing permissions.
    <font class="blod-font">It should be noted that notwithstanding your express authorization to grant us these sensitive permissions,
    we will not collect any of these information from you if it is not required for the relevant functions and services.</font>
    </p>

    <p class="p-context">
    Before you continue to read this Privacy Policy to understand how we process your personal information and our practical methods of processing your personal
    information, we hereby set forth the following table of contents. You may click on the headings to directly browse the relevant content you would like to check.
    </p>

    <p class="p-context">
    <font class="blod-font">I. Basic Definitions</font>
    </p>

    <p class="p-context">
    1. <font class="underline-font">Personal Information</font> refers to all types of information recorded electronically or otherwise that can be used independently or collectively to identify
    the identification of a specific natural person or reflect the activities of such person.
    </p>

    <p class="p-context">
    2. <font class="underline-font">Personal Sensitive Information</font> refers to the personal information that may endanger personal and property safety,
    easily lead to personal reputation, physical and mental health damage or discriminatory treatment once it has been leaked, illegally provided or misappropriated,
    including identification number, personal biometric information, correspondence record and content, property information, whereabouts,
    physical health information and transaction information, etc.
    </p>

    <p class="p-context">
    3. <font class="underline-font">Affiliates</font> refer to the entities that are controlled by ERIC VSTA LIMITED, control ERIC VSTA LIMITED and under common control with ERIC VSTA LIMITED.
    <font class="underline-font">Control</font> herein refers to the power of an entity to dominate the main commercial business or activities of another entity and such power can be formed based
    on equity, voting rights and other relationships that are generally considered to be dominant or significant.
    </p>

    <p class="p-context">
    4. <font class="underline-font">De-identification</font> refers to the process during which the data subject cannot be identified without additional
    information by technical processing of personal information.
    </p>

    <p class="p-context">
    5. <font class="underline-font">Anonymization</font> refers to the process during which the data subject cannot be identified by technical processing of personal information and the processed
    information shall not be recovered.
    </p>

    <p class="p-context">
    <font class="blod-font-16">II. Personal Information We Collect on this Platform</font>
    </p>

    <p class="p-context">
    In the process of your use of this Platform, we may collect the following types of personal information.
    </p>

    <p class="p-context">
    1. Basic personal information: name, identification number, profile picture, phone number and email address
    </p>

    <p class="p-context">
    2. Work information: name of organization, department and position
    </p>

    <p class="p-context">
    3. Network identity information: account, IP address
    </p>

    <p class="p-context">
    4. Personal communication information: messages, chats, documents, calendar information uploaded, released, submitted, and sent by you
    </p>

    <p class="p-context">
    5. Contact information: phone contact list, friend list and group list
    </p>

    <p class="p-context">
    6. Personal Internet records: operations stored in logs, including history of using software, search history, click history, Cookies
    </p>

    <p class="p-context">
    7. Personal active device information: including hardware model, type and version of operating system, device screen size,
    device hardware serial number, MAC address, unique device identity number (IMEI, Android ID, IDFA, OpenUDID, SIM card IMSI information), time zone,
    language setting
    </p>

    <p class="p-context">
    8. Personal location information: GPS information, WLAN access point, Bluetooth, base station and other sensor information,
    itinerary, travel and residence information
    </p>

    <p class="p-context">
    Please note that part of the abovementioned information alone will not be sufficient to identify a specific individual.
    In case we combine such non-personal information with other information to identify certain natural person,
    or use the same in combination with personal information, then such non-personal information may be deemed as personal information during such combination,
    and we will anonymize and de-identify such personal information unless with your authorization or otherwise provided by laws and regulations.
    </p>

    <p class="p-context">
    <font class="blod-font-16">III. How We Use Your Personal Information</font>
    </p>

    <p class="p-context">
    A. Basic functions of this Platform shall only be operated properly and securely based on certain information and therefore,
    we may need you to provide us with or allow us to collect the following information
    </p>

    <p class="p-context">
    1. <font class="blod-font">Authentication Function</font>
    </p>

    <p class="p-context">
    <font class="blod-font">In the process of your use of this Platform, you need to provide your phone number and/or email address which is necessary for
    your use of this Platform. If you refuse to provide such information, you will not be able to use the normal functions of this Platform.
    You may also choose to upload profile picture for personalized display purpose once you have logged in with your account.
    You are not required to register an account and provide the foregoing information if you only browse and search
    introduction of ERIC VSTA LIMITED products, functions and services on the official website of this Platform.</font>
    </p>

    <p class="p-context">
    2. <font class="blod-font">Security Inspection</font>
    </p>

    <p class="p-context">
    In order to improve the security of your use of this Platform and protect you or other users or the public’s personal
    and property security from infringement, prevent fishing websites, frauds, network vulnerabilities, computer viruses,
    network attacks, network intrusion and other security risks, and more accurately identify violations of laws and regulations,
    we will automatically collect your IP address, unique device identity number, hardware model and settings,
    operation system and application functions (such as MAC address) and the details of your use of our services,
    such as browsing history, time zone, region and language settings, server logs (including visit date and time) and application
    crash to conduct comprehensive assessment of risks of your account and transactions, authenticate,
    detect and prevent security incident and take necessary measures including record, audit,
    analysis and intervention in accordance with laws.
    </p>

    <p class="p-context">
    B. In order to optimize your service experience and improve our service quality, you may at your own discretion provide us with
    or allow us to collect the following information
    </p>

    <p class="p-context">
    1. <font class="blod-font">Face Recognition Based Check-in Function</font>
    </p>

    <p class="p-context">
    <font class="blod-font">For identity verification purpose, we may collect face images that you voluntarily provide to us and compare with your face image.
    The aforesaid information is sensitive information and you will not be able to use such function if you reject to provide
    information on face images, however your use of other functions of this Platform will not be affected.</font>
    </p>

    <p class="p-context">
    2. <font class="blod-font">Geographical Location Information</font>
    </p>

    <p class="p-context">
    In the event that you intend to have the function of cash withdraw, mobile phone top-up and other function provide by this platfrom,
    you shall authorize us to obtain the location information set by your SIM card, IP address and mobile device address,
    as well as location information obtained by using GPS (in case your mobile device has activated such function).
    We will use such information to provide you with relevant location-based services. If you reject to provide such information,
    we may not provide any location-based services to you, and might will affect your normal use of this Platform.
    </p>

    <p class="p-context">
    3. <font class="blod-font">Function of Invitation</font>
    </p>

    <p class="p-context">
    <font class="blod-font">We will collect your mobile phone contact lists voluntarily provided by you to match external contacts.
    The aforesaid information will only be used to match your friends and will not be stored or be used by us for any other purposes.
    Such information is sensitive information and you will not be able to use the abovementioned function
    if you reject to provide such information, however your use of other functions of this Platform might be affected.</font>
    </p>

    <p class="p-context">
    4. <font class="blod-font">Service Optimization Function</font>
    </p>

    <p class="p-context">
    <font class="blod-font">In order to provide you with better and more personalized services,
    such as providing more personalized but consistent services on different server or devices, providing search recommendations,
    customer service or push information and other services suitable for your needs and understanding product suitability,
    we will collect your preference, user behavior, location and device information.</font>
    </p>

    <p class="p-context">
    <font class="blod-font">We will take appropriate and feasible measures to avoid collection of personal information irrelevant
    to the purposes of collection and use. If we use your personal information beyond the intended purposes and the reasonable
    and directly related scope of use, we will further inform you and obtain your explicit consent before using your personal
    information.</font>
    </p>

    <p class="p-context">
    <font class="blod-font-16">IV. How We Use Cookie or Similar Technologies</font>
    </p>

    <p class="p-context">
    We will use cookies and other similar technologies (such as, web beacons, flash cookies, etc., together, “Cookies”)
    in order to optimize your experience of using this Platform. When you are using this Platform,
    we may use relevant technologies to place Cookie(s) or anonymous identifier(s) to your device to collect
    and store information of your access and use of this Platform.
    </p>

    <p class="p-context">
    <font class="blod-font-16">V. How We Share, Transfer and Disclose Your Personal Information</font>
    </p>

    <p class="p-context">
    A. <font class="blod-font">Sharing of Personal Information</font>
    </p>

    <p class="p-context">
    1. <font class="blod-font">We will not share and transfer your personal information to any third parties unless authorized and
    approved by you in advance. Otherwise, we may share and transfer the personal information which has been de-identified
    and the recipient cannot re-identify the data subject.</font>
    </p>

    <p class="p-context">
    2. <font class="blod-font">In the event that we share your personal information, we shall comply with the following principles:</font>
    </p>

    <p class="p-context">
    <font class="blod-font">Authorization and Consent</font>: we shall not share your personal information without your consent
    unless the shared information has been de-identified and the recipient cannot re-identify the data subject.
    If the purposes of third party using personal information exceed the original scope of your authorization and consent,
    they shall further obtain your consent to their use of your personal information.
    </p>

    <p class="p-context">
    <font class="blod-font">Legitimacy and Necessity</font>: data sharing must have legitimate purpose and the scope of sharing
    shall be limited to such categories and amount of personal information necessary to achieve the purposes.
    </p>

    <p class="p-context">
    <font class="blod-font">Prudence and Diligence</font>: we will prudently evaluate the purposes of third parties’ use of our
    shared personal information and will conduct a comprehensive assessment of such third parties’ security capability
    and require them to comply with relevant cooperation agreement for information sharing.
    We will also conduct rigorous security monitoring of software development kit (SDK) and application programming interface (API)
    used by the third parties to obtain information in order to protect data security.
    </p>

    <p class="p-context">
    3. <font class="blod-font">Sharing of information to enable functions and services</font>
    </p>

    <p class="p-context">
    If you choose to use the services provided by third-party service provider on this Platform, such third-party service
    provider may share certain of your information with us. You shall review the relevant privacy policy of third-party
    services for such data which may be shared with us.
    </p>

    <p class="p-context">
    For example, in order to complete the registration of your account on this Platform, you agree that the carrier will send
    a SMS verification code to us based on your personal phone number, otherwise you will not be able to register your account.
    </p>

    <p class="p-context">
    (1) Log in and link products in this Platform: With your consent, when you use your LinkCredit account to log in to a
    third-party product and/or service or bind your account to other third-party accounts, we will share your basic information
    (name, profile picture) and other information authorized by you with the abovementioned products and services.
    </p>

    <p class="p-context">
    (2) Location service provider. We will share your de-identified location data to the Location service provider.
    </p>

    <p class="p-context">
    (3) Affiliates. We undertake not to share your personal information with any Affiliates under unnecessary circumstances.
    Exceptions deemed as necessary circumstance shall include: we may provide you with the service you need only after sharing
    your information, and for the purpose of providing you with better relevant services, we may store, transfer,
    and process your personal information using more sophisticated services.
    </p>

    <p class="p-context">
    (4) Other processing assistance program supporters: you understand and agree that in order to ensure the implementation of
    the functionalities of this Platform and safe and stable operation of relevant applications,
    we may integrate SDK provided by third parties for realizing such purposes. We will conduct rigorous security monitoring of
    SDK used by the third parties to obtain information in order to protect data security.
    </p>

    <p class="p-context">
    <font class="blod-font">We will only share with third parties the information necessary to achieve the purpose,
    and you understand and authorize our information sharing under such circumstances.
    If the third party is required to use personal information beyond the foregoing purpose for business reason,
    such third party shall further obtain your consent for such use of personal information.</font>
    </p>

    <p class="p-context">
    Before our collaboration with any third parties, we will make commercially reasonable efforts to test the third party’s
    security capabilities, assess the legitimacy and necessity of sharing relevant information with such third party,
    enter into a non-disclosure agreement, conduct technical monitoring of the third parties’ inquiries,
    and make commercially reasonable efforts to urge third parties to comply with laws and regulations and confidentiality
    and security measures as agreed in the agreement when using users’ information.
    </p>

    <p class="p-context">
    B. <font class="blod-font">Transfer of Personal Information</font>
    </p>

    <p class="p-context">
    With the continuous development of our business, your personal information may be transferred in the event that we are
    involved in a merger, acquisition or asset transfer and if it occurs, we will continue to protect or request the successor
    to protect your information in accordance with laws, regulations and security standards not less than what have been required
    in this Privacy Policy, otherwise we will require the successor to obtain your authorization and consent again.
    </p>

    <p class="p-context">
    C. <font class="blod-font">Disclosure of Personal Information</font>
    </p>

    <p class="p-context">
    <font class="blod-font">We will not disclose your information to the public unless your consent is obtained. However,
    when we are required to disclose your personal information as per the requirements of laws, regulations, rules,
    other normative documents, mandatory administrative or judicial requirements, we may disclose your personal information
    to administrative or judicial authorities in accordance with the requested type of personal information and the methods
    of disclosure as requested. Upon receiving any requests for disclosure, subject to compliance with the applicable laws
    and regulations, we will ask such authorities to present the corresponding legal documents, and we will only provide
    the information to the extent that the administrative and judicial authorities are authorized to obtain for specific
    investigation purposes. To the extent permitted by laws and regulations, all the disclosed documents will be encrypted.</font>
    </p>

    <p class="p-context">
    Please understand that in accordance with laws, regulations and national standards, we may share, transfer,
    disclose your personal information without your authorization and consent under the following circumstances:
    </p>

    <p class="p-context">
    (1) directly related to national security and national defense security;
    </p>

    <p class="p-context">
    (2) directly related to public security, public health and significant public interests;
    </p>

    <p class="p-context">
    (3) directly related to crime investigation, prosecution, trial and judgment enforcement;
    </p>

    <p class="p-context">
    (4) for the purpose of protecting your and others’ life, property and other significant legitimate interests,
    and where it is difficult to obtain personal consent, unless explicitly prohibited by applicable laws;
    </p>

    <p class="p-context">
    (5) personal information disclosed by you to the public;
    </p>

    <p class="p-context">
    (6) where personal information is legally collected from publicly disclosed information,
    such as from legal news reports, government information disclosure and other channels.
    </p>

    <p class="p-context">
    <font class="blod-font">In accordance with the laws, sharing and transferring of de-identified personal information
    which cannot be recovered by the recipient to re-identify the data subject does not constitute an external share,
    transfer, and disclosure of personal information and therefore it may be processed without further notice
    to you and obtaining your consent.</font>
    </p>

    <p class="p-context">
    <font class="blod-font-16">VI. How We Store Your Personal Information</font>
    </p>

    <p class="p-context">
    A. <font class="blod-font">Location of Storage</font>
    </p>

    <p class="p-context">
    Currently, we will not transmit such information abroad and if there is cross-border data transmission,
    we will comply with relevant national regulations or ask for your permission.
    </p>

    <p class="p-context">
    B. <font class="blod-font">Term of Storage</font>
    </p>

    <p class="p-context">
    When you are using this Platform, we will continuously retain your personal information for such term that does not exceed
    the necessary duration of providing services to you. Unless otherwise stipulated in the laws and regulations for the terms
    of storing specific information, we will delete or anonymize your personal information upon your termination of using this
    Platform or withdrawal of relevant authorization. We will also delete or anonymize your personal information within
    a reasonable period in the event that we suspend the operation of this Platform.
    </p>

    <p class="p-context">
    <font class="blod-font-16">VII. How We Protect Your Personal Information</font>
    </p>

    <p class="p-context">
    A. We are highly concerned with the security of your personal information. We have established a data security
    system to regulate and implement relevant security technical measures in order to prevent your personal information
    from unauthorized access, amendment and from damage or loss of data. Our network services have adopted a transport
    layer security protocol and other encryption technologies to ensure the security of your data transmission in the network.
    </p>

    <p class="p-context">
    B. We have taken strict data processing permission control to avoid illegal use of data; we have applied various data
    desensitization methods such as coding and screening and other de-identification technologies to enhance the security
    of personal information in use; we have adopted encryption technology widely used in the industry to store your personal
    information and isolated it with data isolation technology, for example, we will encrypt all the information stored in our
    servers and your terminal devices. We have always implemented such technical measures and organizational management methods
    and may revise them from time to time to enhance the overall security of the system.
    </p>

    <p class="p-context">
    C. <font class="blod-font">In spite that the foregoing reasonable and effective measures have been taken and the
    standards requested by relevant laws and regulations have been complied with, please understand that even though
    we have taken every effort to strengthen security measures, the security of personal information for the Internet
    industry cannot be perfectly guaranteed and warranted due to technical limitations and various potential malicious methods.
    Nevertheless, we will try our best to assure the security of personal information provided by you to us.
    Please acknowledge and understand that problems may occur to the system and communication network accessed by you
    to our services due to the factors beyond our control and therefore we strongly recommend you to take proactive measures
    to protect the security of your personal information, including without limitation, using complex passwords,
    changing passwords on a regular basis, and not disclosing personal information such as account password to others.</font>
    </p>

    <p class="p-context">
    D. In case of any incidents endangering network security, we will take appropriate remedies in a timely manner in accordance
    with the emergency precautions for Internet security incident. We will strictly assume corresponding liabilities for
    any infringement upon your legitimate interests due to any leakage, illegal provision and misappropriation of your personal
    information arising from the destruction of our physical facilities or technical protection measures.
    </p>

    <p class="p-context">
    E. <font class="blod-font">Upon our awareness and knowledge of the unfortunate leakage, illegal provision and misappropriation
    of your personal information, we will promptly inform you in accordance with the requirements stipulated in laws and
    regulations and no later than [10] days of: the basic situation and possible impact of such security incident,
    the measures we have taken or to be taken, suggestions for your own prevention and risk reduction measures,
    any remedies provided to you, etc. The situation of security incident shall be notified to you by pushing notification
    in the Platform and we will adopt reasonable and effective means to publish announcements in case it is difficult to
    notify each subject of personal information. We will also report the personal information security incident and its disposal
    in accordance with the requirements of regulatory authorities.</font>
    </p>

    <p class="p-context">
    <font class="blod-font-16">VIII. Your Rights</font>
    </p>

    <p class="p-context">
    A. <font class="blod-font">How to Access to and Correct Your Personal Information</font>
    </p>

    <p class="p-context">
    Access to your personal information: to access to your profile picture, name, work status, department, direct supervisor,
    email address, mobile phone number- access to check personal information.
    </p>

    <p class="p-context">
    B. <font class="blod-font">Delete Your Personal Information</font>
    </p>

    <p class="p-context">
    <font class="blod-font">You may request us to delete your personal information under the following circumstances:</font>
    </p>

    <p class="p-context">
    1. <font class="blod-font">If we deal with personal information in violation of laws and regulations;</font>
    </p>

    <p class="p-context">
    2. <font class="blod-font">If we collect and use your personal information without your explicit consent;</font>
    </p>

    <p class="p-context">
    3. <font class="blod-font">If our processing of personal information seriously violates the agreement with you;</font>
    </p>

    <p class="p-context">
    4. <font class="blod-font">If you no longer use our products and services, or you voluntarily cancel your account;</font>
    </p>

    <p class="p-context">
    5. <font class="blod-font">If we no longer provide you with our products and services.</font>
    </p>

    <p class="p-context">
    <font class="blod-font">If we agree with your request to delete information, we will also notify entities that obtain
    your personal information from us to require them to delete the information concerned in a timely manner
    (unless otherwise stipulated by laws and regulations or such entity has obtained your separate authorization).</font>
    </p>

    <p class="p-context">
    <font class="blod-font">Once you have deleted or we have assisted you in deleting the relevant information,
    we may not be able to delete the corresponding information from the backup system immediately due to the applicable laws
    and security technologies. We will store your personal information securely and isolate it from any further processing until
    the backup can be cleared or anonymized.</font>
    </p>

    <p class="p-context">
    <font class="blod-font-16">IX. Amendment</font>
    </p>

    <p class="p-context">
    We will make every reasonable effort to notify every user in case of any substantial amendments to this Privacy Policy,
    such as post notifications on this Platform. Please review this Privacy Policy on a regular basis in order to check such amendments.
    We will also update the last update date and the effective date at the top of this Privacy Policy.
    Your continued use and access to this Platform after the renewal of this Privacy Policy will be deemed as your acceptance of
    the updated Privacy Policy and otherwise please cease to use or access to this Platform.
    </p>

    <p class="p-context">
    <font class="blod-font-16">X. How to Contact Us</font>
    </p>

    <p class="p-context">
    For any questions, suggestions, or requests of this Privacy Policy, please e-mail us at contact@lincredit.ng. In normal cases,
    we will revert to you within [15] days after the receipt of your contact information and verification of your identity.
    </p>

    <p class="p-context">
    We do not charge any fees for your reasonable requests in principle. However, if your requests are lodged repeatedly
    or beyond a reasonable extent, we will charge fees of a proper amount depending on the cost. We may refuse your requests
    if they are not directly related to your identity, repeated without reason, need to be replied through too many technical
    methods (for example, a new system needs to be developed or the existing common practices need to be fundamentally reformed),
    pose risks to others' legal rights or interests, or are fairly unrealistic.
    </p>

    <p class="p-context">
    <font class="blod-font-16">XI. Miscellaneous</font>
    </p>

    <p class="p-context">
    A. This Privacy Policy only applies to your use of the services of this Platform within the territory of Nigeria.
    There may be multilingual versions of this Privacy Policy. If there is any inconsistency or conflict between
    the terms of each language version, the Nigeria version shall prevail.
    </p>

    <p class="p-context">
    B. The headings of this Privacy Policy are for convenience and readability only and the headings shall not have any effect
    on the meaning or interpretation of any terms of this Privacy Policy.
    </p>

    <div class="line-bottom"></div>

    <div class="img-bottom">
      <img class="img-bottom-info" :src="logo"/>
    </div>

  </div>
</template>

<script>
export default {
  //name: "Privacy Policy",
  data() {
    return {
      logo: require('../assets/images/link_credit_logo.png'),
    };
  },
  created() {
    document.title = 'LinkCredit - Privacy Policy';
  },
  methods: {
  }
};
</script>

<style rel="stylesheet/scss" lang="scss">
.el-bg {
  display: flex;
  flex-direction: column;
  justify-content: flex-start;
  height: 100%;
  width: 100%;
  padding: 20px;
}

.img-head {
  width: 80px;
}

.line{
  margin-top: 10px;
  width:100%;
  border: 0.5px solid #ffcc02;
}

.title-lable {
  padding-top: 16px;
  display: flex;
  flex-direction: row;
  justify-content: center;
  text-align: center;
  color: #000000;
  font-family: Arial;
  font-size: 18px;
  font-weight: 700;//加粗
  padding-bottom: 20px;
}

.lable-context {
  color: #3b3c40;
  font-family: Arial;
  letter-spacing:0.5px;
  line-height:22px;
  font-size: 14px;
}

.p-context {
  padding-top: 20px;
  margin: 0px;
  color: #3b3c40;
  font-family: Arial;
  letter-spacing:0.5px;
  line-height:22px;
  font-size: 14px;
}

.blod-font {
  color: #000000;
  font-weight: 700;//加粗
}

.blod-font-16 {
  font-size: 16px;
  font-weight: 700;//加粗
}

.underline-font {
  text-decoration: underline;
}

.line-bottom{
  margin-top: 40px;
  width:100%;
  border: 0.5px solid #ffcc02;
}

.img-bottom {
  margin-top: 10px;
  width:100%;
  margin-bottom: 20px;
  display: flex;
  flex-direction: row;
  justify-content: flex-end;
}

.img-bottom-info {
  width: 80px;
}

</style>
