Terms of service and privacy
This website (hereinafter referred to as "we") understands the importance of personal information to you, and will do our best to protect your personal information safe and reliable.We are committed to maintaining your trust in us and protecting your personal information by abiding by the following principles: principle of consistent power and responsibility, principle of clear purpose, principle of choice consent, principle of least sufficient use, principle of ensuring safety, principle of subject participation, principle of openness and transparency, etc.At the same time, we promise that we will take appropriate security measures to protect your personal information in accordance with the industry's mature security standards。
How do we collect and use your personal information
Personal information refers to all kinds of information recorded electronically or by other means that can identify the identity of a particular natural person or reflect the activities of a particular natural person independently or in combination with other information.
We will only collect and use your personal information for the purposes set forth in this policy:
(I) provide you with online assimilation light solutions
1. Business function 1: register as a user
to complete the account creation, you need to provide the following information: your name, email address, created username and password.
in the registration process, if you provide the following additional information, will help us to provide you with better service and experience: mobile phone number, job title, company, education background.However, if you do not provide this information, it will not affect the basic functionality of using the service.
the above information provided by you will continue to be used by us during your use of the service.When you log out, we will stop using and delete the above information.
the above information will be stored in the territory of the People's Republic of China.If cross-border transmission is required, we will obtain your authorization separately.
2. Business function 2: commodity display, personalized recommendation, sending new product release information.
(ii) carry out internal data analysis and research, third-party SDK statistical services, and improve our products or services
we collect data based on your interactions with us and the choices you make, including your privacy Settings and the products and functions you use.We collect data may include the SDK/API/JS code version, browser, Internet service providers (isps), IP address, platform, timestamp, identifier, version of the application, the application distribution channels, independent device identifier, iOS advertising identifier (IDFA), android advertisers identifier, nic (MAC) address, international mobile equipment identification number (IMEI), equipment type, terminal manufacturers, terminal equipment operating system version, session start/stop time, local language, time zone and network status (WiFi, etc.), hard disk, CPU, and battery usage, etc.
we will seek your prior consent to use the information for other purposes not specified in this policy.
when we want to use the information collected for a specific purpose for other purposes, we will ask for your prior consent.
To ensure the normal operation of the website, we will store small data files called cookies on your computer or mobile device.Cookies usually contain identifiers, site names, and some Numbers and characters.With cookies, websites can store data such as your preferences or the items in your shopping basket.
(2) website beacons and pixel labels
In addition to cookies, we also use other similar technologies such as web beacons and pixel tags on our websites.For example, an email we send you may contain a click URL that links to the content of our website.If you click on the link, we will track the click to help us understand your product or service preferences and improve customer service.A web beacon is usually a transparent image embedded in a web site or email.With the help of the pixel tag in the E-mail, we can know whether the E-mail is opened or not.If you do not wish your activities to be tracked in this way, you may unsubscribe from our mailing list at any time.
（3）Do Not Track
Many web browsers have a Do Not Track feature that publishes Do Not Track requests to web sites.Major Internet standards organizations have yet to set policies for how web sites should respond to such requests.However, if Do Not Track is enabled in your browser, all our websites will respect your choice.
How do we share, transfer and publicly disclose your personal information
We will not share your personal information with any other company, organization or individual, except for the following:
1. Sharing with express consent: after obtaining your express consent, we will share your personal information with other parties.
2. We may share your personal information in accordance with laws and regulations or mandatory requirements of government authorities.
we will not transfer your personal information to any company, organization or individual, except for:
1. Transfer with express consent: after obtaining your express consent, we will transfer your personal information to other parties;
(3) public disclosure
We will only publicly disclose your personal information if:
1. With your express consent;
2. Law-based disclosure: we may disclose your personal information publicly under the mandatory requirements of laws, legal procedures, lawsuits or competent government authorities.
How do we protect your personal information
(I) we have used industry-standard security measures to protect your personal information from unauthorized access, public disclosure, use, modification, damage or loss.We will take all reasonable measures to protect your personal information.For example, data (such as credit card information) exchanged between your browser and the service is protected by SSL encryption;We also provide HTTPS for secure browsing of our sites;We will use encryption to ensure the confidentiality of the data;We will use trusted protection against malicious attacks on our data;We will deploy access control mechanisms to ensure that only authorized personnel have access to personal information.In addition, we will conduct security and privacy protection training courses to enhance employees' awareness of the importance of protecting personal information.
(b) we will take all reasonably practicable measures to ensure that no irrelevant personal information has been collected.We will only retain your personal information for as long as is necessary to achieve the purposes stated in the cost policy, unless the retention period is extended or permitted by law.
(iii) the Internet is not an absolutely secure environment, and E-mail, instant messaging and communication with other our users are not encrypted. We h3ly recommend that you do not send personal information through such means.Please use complex passwords to help us secure your account.
(4) the Internet environment is not 100% secure, we will try our best to ensure or guarantee the security of any information you send us.If our physical, technical, or management protection facilities are damaged, resulting in unauthorized access, public disclosure, tampering, or destruction of information, resulting in damage to your legitimate rights and interests, we will assume the corresponding legal responsibility.
(5) in the unfortunate occurrence of personal information security incident, we will, in accordance with the requirements of laws and regulations, timely inform you of the basic situation of the security incident and the possible impact, we have taken or will take the disposal measures, you can independently prevent and reduce the risk of the proposal, your remedial measures, etc.We will timely inform you of the relevant information by email, letter, phone call, push notification and other means. When it is difficult to inform the subject of personal information one by one, we will release the announcement in a reasonable and effective manner.
at the same time, we will also comply with the requirements of the regulatory authorities, take the initiative to report the handling of personal information security incidents.
In accordance with the relevant laws, regulations and standards of China and the common practices of other countries and regions, we guarantee that you exercise the following rights with respect to your personal information:
(a) Access to your personal information
you have the right to access your personal information, except for exceptions stipulated by laws and regulations.If you want to exercise data access, you can do so yourself by:
account information - if you wish to access or edit your personal information and payment information in your account, change your password, add security information or close your account, you can do this by contacting customer service.
search information - you can contact customer service to clear your search history, view and modify interests, and manage other data.
(ii) correct your personal information
you have the right to ask us to make corrections when you find errors in the personal information we process about you.You may make an application for correction by means of (a) access to your personal information.
if you are unable to correct this personal information through the above link, you can always contact us using our Web form.We will reply to your request for correction within 30 days.
(iii) delete your personal information
You may request us to delete your personal information if:
1. If our handling of personal information violates laws and regulations;
2. If we collect or use your personal information without your consent;
3. If our handling of personal information violates our agreement with you;
4. If you no longer use our products or services, or you cancel your account;
5, if we no longer provide you with products or services.
if we decide to respond to your request for deletion, we will also notify the entities receiving your personal information from us and request them to delete it in a timely manner, unless otherwise stipulated by laws and regulations, or such entities obtain your independent authorization.
when you remove information from our service, we may not immediately remove the corresponding information from the backup system, but we will remove the information when the backup updates.
(iv) change the scope of your authorized consent
Each business function requires some basic personal information to complete (see part I of this strategy).You may at any time grant or withdraw your authorized consent for the collection and use of additional personal information collected.
(5) the subject of personal information cancels the account
After the cancellation of the account, we will stop providing products or services to you and delete your personal information according to your requirements, unless otherwise stipulated by laws and regulations.
(6) the subject of personal information obtains copies of personal information
If the technology is feasible, such as data interface matching, we can also directly transfer copies of your personal information to the third party designated by you according to your requirements.
(7) constraint information system automatic decision-making
In some business functions, we may only make decisions based on non-manual automatic decision-making mechanisms such as information systems, algorithms, etc.If these decisions significantly affect your legitimate rights and interests, you have the right to ask us for an explanation, and we will provide appropriate remedies.
(viii) respond to your above request
For security reasons, you may need to provide a written request or otherwise prove your identity.We may ask you to verify your identity before processing your request.
for your reasonable request, we do not charge a fee in principle, but for repeated requests, beyond the reasonable limit, we will charge a certain cost as appropriate.We may reject requests that are unreasonably repetitive, that require too much technology (for example, a new system needs to be developed or existing practices need to be radically changed), that pose a legitimate risk to others, or that are very impractical (for example, involving information stored on backup tapes).
in the following cases, we will not be able to respond to your request according to the requirements of laws and regulations:
1, related to national security or national defense security;
2. Related to public security, public health or major public interests;
(3) related to criminal investigation, prosecution and trial;
4. There is sufficient evidence that you have subjective malice or abuse of rights;
5. The response to your request will result in serious damage to the legitimate rights and interests of you or other individuals or organizations.
How do we handle children's personal information
our products, websites and services are primarily aimed at adults.Children are not allowed to create their own user accounts without the consent of their parents or guardians.
in the case of collection of children's personal information with the consent of parents, we will only use or publicly disclose such information when permitted by law, with the explicit consent of parents or guardians or necessary to protect children.
although local laws and customs have different definitions of children, we regard anyone under the age of 14 as a child.
if we find ourselves collecting personal information about a child without prior, verifiable parental consent, we will try to delete the data as soon as possible.
How is your personal information transferred globally
in principle, the personal information we collect and generate in the People's Republic of China will be stored in the People's Republic of China.
since we provide products or services through our worldwide resources and servers, this means that, subject to your authorization consent, your personal information may be transferred to or accessed from overseas jurisdictions in the countries/territories where you use products or services.
such jurisdictions may have different or no data protection laws.In such cases, we will ensure that your personal information is adequately and equally protected within the People's Republic of China.For example, we may ask you to approve the transfer of personal information across borders, or to implement security measures such as data de-identification prior to the transfer of data across borders.
How to contact us
Tel:+86 756 7630168