《NicheBay Privacy Policy》

Update Time: 2024-10-11

This Policy applies to the NicheBay mobile application product or service (the “Application”).

The Application is also referred to as the “NicheBay App” as an alternative name for the Application and the same applies to this Policy.

This Privacy Policy section will help you understand the following:

I. Definitions and scope of application

II. How we collect and use your information;

III. How we use cookies and similar technologies;

IV. How we share, transfer, and publicly disclose users' personal information;

V. How we protect the security of our users' information;

VI. How you manage personal information;

VII. How we handle information from minors;

VIII. How your information is transferred globally;

IX. How this privacy policy is updated;

X. How to contact us

Winning Supply Chain Management Co.,Ltd (hereinafter referred to as “we”) understands the importance of personal information to you, we will comply with the legal and regulatory requirements and reference to industry best practices to provide adequate protection for the security of your personal information, we are committed to maintaining your trust in us, and adhere to the following principles to protect your personal information We are committed to maintaining your trust in us and adhering to the following principles to protect your personal information: the principle of consistency of authority and responsibility, the principle of clarity of purpose, the principle of opt-in consent, the principle of minimum sufficiency, the principle of ensuring security, the principle of participation of the subject, the principle of openness and transparency. Accordingly, we have developed this Privacy Policy (“this Policy / this Privacy Policy”) to help you fully understand how we collect, use, share, store and protect your personal information in the course of your use of our products/services and how you can manage your personal information.

Before using the products or services of this application, please be sure to read and thoroughly understand this policy and use the relevant products or services after confirming that you fully understand and agree to it. Once you start using the products or services of the Application, it means that you have fully understood and agreed to this Policy. If you have any questions, comments or suggestions regarding the content of this Policy, you may contact us through the various contact methods provided in this application.

I. Definitions and scope of application

Personal information: Information recorded electronically or otherwise that can identify a specific natural person or reflect the activities of a specific natural person, either alone or in combination with other information. Personal information includes (name, date of birth, identity document number, personal biometric information, address, means of communication, communication records and content, account number and password, property information, credit information, whereabouts, tracks, etc.), Accommodation information, health and physiological information, transaction information, etc.).

Sensitive personal information: personal information that, if leaked, illegally provided or misused, could jeopardize the safety of persons and property, and could easily lead to damage to a person's reputation, physical or mental health, or discriminatory treatment, etc. Sensitive personal information includes (identity card numbers, personal biometric information, bank accounts, communication records and contents, property information, credit information, whereabouts, accommodation information, health and physiological information, transaction information, personal information of children under 14 years of age, etc.). Personal information of children under the age of 14, etc.), etc.

Handling of personal information: This includes the collection, storage, use, processing, transmission, provision, disclosure, and deletion of personal information.

Deletion of Personal Information: This refers to the act of removing personal information from the systems involved in the realization of daily business functions, so that it remains unavailable for retrieval or access.

Anonymization of personal information: A process in which the subject of personal information is rendered unidentifiable or unrelated through the technical processing of personal information, and the processed information cannot be recovered.

De-identification of personal information: The process of technically processing personal information so that the subject of the personal information cannot be identified or associated with the subject of the personal information without the aid of additional information.

Subject of Personal Information: The natural person identified or associated with the personal information.

Personal information controller: An organization or individual that has the ability to determine the purpose, manner, etc. of handling personal information.

Device information: including device identifier (IMEI, IDFA, Android ID, MAC, OAID, IMSI and other device-related information), application information (application crash information, notification switch status, application installation list and other application-related information), device parameters and system information (device type, device model, operating system and hardware-related information), device network environment information (IP address, WiFi information, base station information and other network related information), subject to the actual collection of the product.

Child: means a minor under the age of fourteen years.

II. How we collect and use your information

When you use our products/services, we need to collect and use your personal information including the following two kinds:

1, in order to achieve the basic function of providing you with our products / or services, you must authorize us to collect, use the necessary information, if you refuse to provide the appropriate information, you will not be able to normal use of our products and / or services;

2. In order to realize the additional functions of our products and/or services provided to you, you may choose to individually the same or not agree to the information we collect and use, if you refuse to provide, you will not be able to use the relevant additional functions or not be able to achieve the effect of the functions that we intend to achieve, and it will not affect your use of our basic functions.

3、When providing you with the content of the same city channel or the content or services related to the location of the device, after your authorization, we will use the geographic location information related to this service (such as precise positioning information, WLAN access points, Bluetooth and base stations, sensor information) to ensure the quality of the content or services. Among them, the precise location information is personal sensitive information, if you refuse to authorize the location authority will affect the accuracy of the positioning, but will not affect the normal use of other functions and services, we will also only based on the network information (e.g., IP) corresponding to the city and/or district to show you may be related to the content or service.

4. When you use the App, you will get the information of direction sensor and gyroscope device sensor, which is used to identify whether you are a real user. When you use the video and photo related functions, it will get the acceleration device sensor information, which is used to get the angle of the shooting cell phone.

We would like to remind you that this information is not necessary for the operation of this business function, but it is very important for the improvement of service quality and the development of new products or services, etc. We will not force you to provide this information. We will not force you to provide this information, and your refusal to do so will not adversely affect the use of this business function.

We offer you various specific functional scenarios including:

1、Help you become our users

In order to complete the creation of an account so that we can provide you with services, you will need to provide the following information: your cell phone number and other information. When you register to provide us with the cell phone number used for registration (for receiving verification code), we will send SMS verification code to verify whether your identity is valid. You can modify and supplement your nickname, gender, birthday, avatar, real-name verification binding, as well as your Alipay account, WeChat account (for account withdrawals) and other related information, which are all part of your “account information”. When you use a third-party account (WeChat account, Apple account) to log in, if you decide to bind the account of the third-party platform, after your third-party platform account binding authorization, the third-party platform will synchronize a part of your information under the account of the third-party platform to us, such as user name, cell phone number, avatar, nicknames, region, gender, etc. (subject to your authorization) as well as identity verification Information. We collect the above information for the purpose of providing you with account login services and safeguarding your account against security risks. If you refuse to authorize the above information, you will not be able to use the account of the third party platform to log in to the Application Platform, but it will not affect the other products we provide for you and the normal use of other services.

In the course of use, if you provide the following additional information to complete your profile, it will help us to provide you with better service and experience: your birthday, occupation, interests, cell phone number. However, if you do not provide this information, it will not affect the use of the basic functions of the application products or services.

The above information provided by you will be continuously licensed to us for the duration of your use of the Service. In the event that you voluntarily request to cancel your account, we will make it anonymous or delete your personal information as soon as possible in accordance with applicable laws and regulations.

2. Provide you with services and needs

In order to display content or services to you, we may collect and use device information (including device identifiers (IMEI, IDFA, Android ID, MAC, OAID, IMSI and other device-related information), application information (application crash information, notification on/off status, application installation lists and other application-related information), device parameters and system information (device type, device model, operating system and hardware-related information), device network environment information (IP address, WiFi information, base station information and other network-related information)), service log information (browsing records, click-to-view records, search and query records, favorites, attention and sharing information, posting information, as well as IP address, browser type, telecommunication carrier, usage language, date and time of access), and basic information submitted by you (such as nickname, gender, and cell phone number), which are used to improve your personal information.

3. Providing goods or services to you

3.1 Information you provide to us

Relevant personal information you provide to us when you register for an account or use our services, such as basic WeChat information (nickname, avatar, gender), phone number, etc;

Shared information that you provide to other parties through our Services, and information that is stored when you use our Services. Before providing the foregoing personal information of such other parties to the Application, you need to ensure that you have obtained their authorized consent.

3.2 Information we collect in the course of your use of the Services。

In order to provide you with search results, understand product suitability, and identify account anomalies, we collect and correlate information about the services you use and how you use them, including:

3.2.1 Equipment information:

In order to ensure the secure operation of applications and services, we collect your device model number, application list (installation list), device name, device unique identifier, login IP address, product version number, and mobile network information.

We will collect your (device identifier, app list, IMEI, IDFA, MAC, name, phone number, location) and other information in a silent/background state for the purpose of identifying user information.

3.2.2 Specific permissions granted by us based on your installation and use of the software: The purpose, manner and scope of the collection of personal information by this application during your installation and use are described below:

(1) Permission to read photos or take photos

When you change your profile avatar information, or need to upload pictures or videos, we will ask you for album or camera permissions. On some models, the permission to read photo albums is expressed as “read content from memory card”. If you refuse to authorize the provision of album or camera permissions, you will not be able to use the corresponding functions, but it will not affect your normal use of other functions of the application.

(2) Write Album Permissions

When you use the download photo function, we will ask you for album write permission or memory card write permission. On some models, the album write permission is expressed as “modify or delete the contents of the memory card”.

(3) Permission to make telephone calls

In order to provide you with dialing services, we will request you to enable dialing privileges. If you do not agree to enable dialing privileges, you will not be able to use this feature, but it will not affect the use of other features.

(4) Getting a list of applications

In order to provide you with push service support, we will apply to you to open the access to the application list permissions, so that we can push the message to you, authorize the push service providers to carry out link adjustment, and promote each other to activate the SDK push process that has been closed, to ensure that you can receive the message that we push to you in a timely manner, if you do not agree to open the access to the application list permissions, it will affect the success of the message that you receive the push.

(5) Obtaining address book privileges

In order to facilitate you to add friends, we want to get your address book permissions, used to read your address book list uploaded to the server to find your friends information, such as you refuse to authorize the provision of address book permissions, you will not be able to use the corresponding functions, but does not affect the normal use of the other features of this application.

Our products are developed based on DCloud uni-app(5+ App/Wap2App). During the running period of the application, we need to collect your device's unique identifier (device ID, IMEI/android ID/DEVICE_ID/IDFA, device's MAC address, OAID, software list, and SIM card IMSI information) in order to provide statistical analysis services, and improve performance and user experience by analyzing application startup data and abnormal error logs to provide better services to users. For more details, please visit DCloud User Terms of Service.

uni-app integrates the following three-party SDKs by default for guaranteed operation:

(1) SDK name: uni-app (5+, web2app)

Package Name: io.dcloud

Usage: uni-app base module

Permissions: stored personal files, device information (IMEI, ANDROID_ID, DEVICE_ID, IMSI, OAID), network information.

Official website link: https://ask.dcloud.net.cn/article/36937

(2) SDK Name: Ali weexSDK

Package Name: com.taobao

Purpose: default integration of the uni-app base module for rendering the nvue page engine of uniapp.

Permissions: stored personal files, read external memory, write external memory.

Official website link: https://weexapp.com/zh

(3) SDK name: fresco photo gallery

Package Name: com.facebook.fresco

Usage: default integration of uni-app base module, used for loading images on nvue pages.

Permissions: stored personal files, read external memory, write external memory.

Official website link: https://www.fresco-cn.org/

(4) SDK name: glide gallery

Package Name: com.bumptech.glide

Purpose: default integration of uni-app base module for image preview use.

Permissions: stored personal files, read external memory, write external memory.

Official website link: http://bumptech.github.io/glide/

(5) SDK name: gif-drawable

Package Name: pl.droidsonroids.gif

Usage: default integration of uni-app base module for loading gifs.

Permissions: stored personal files, read external memory, write external memory.

Official website link: https://github.com/koral--/android-gif-drawable

(6) SDK name: fastjson

Package Name: com.alibaba.fastjson

Purpose: default integration of uni-app base module for JSON parsing.

Permissions: None

Official website link: https://github.com/alibaba/fastjson

(7) SDK Name: Mobile Security Alliance OAID

Wrappers: com.bun.miitmdid, com.zui.opendeviceidlibrary, com.netease.nis, com.samsung.android, com.huawei.hms

Purpose: default integration of uni-app base module, used to get oaid

Permission: device information (OAID).

SDK official website link: http://www.msa-alliance.cn/col.jsp?id=105

Supplementary note on OAID of Mobile Security Alliance: “Supplementary Device Identification System and SDK for Mobile Intelligent Terminal” strictly abides by relevant laws and regulations such as China's Network Security Law, Data Security Law and Provisions on the Protection of Personal Information of Telecommunications and Internet Users, as well as the National Standard Requirements for Personal Information Security of Information Security Technology, etc. The SDK will not actively collect any data, and will only obtain the following data for local judgment: it will not transmit any network. The SDK will not collect any data on its own initiative, and only obtains the following data when the APP is called, which is used for local judgment and will not be transmitted over any network:

● Device manufacturer, device model, and device brand, used to determine the terminal calling interface.

● The name of the device network operator, used to determine the virtual machine environment.

● APP package name for signature verification.

The purpose, manner, and scope of information collected by the third-party SDKs integrated with this application are described below:

(1) SDK Name: AliCloud OSS Storage

Company: Alibaba Group Holding Ltd.

Purpose: for uploading files to AliCloud OSS server

Permissions: network information, device identification information (IMEI/IMSI/Android_ID, SIM card serial number, Mac address)

Privacy Policy Link: Aliyun Legal Notice and Privacy Policy

(2) SDK name: AUO Statistics

Wrapping names: com.uc.crashsdk, com.efs, com.umeng

Company: AUO Tongxin (Beijing) Technology Co.

Purpose: For statistical purposes

Permissions: APP frontend runtime needs to get device information (IMEI, ANDROID_ID, DEVICE_ID, IMSI), app installed list, network information, get device serial number.

Link to Privacy Policy: AUO Privacy Policy

3.2.3 Service log information: including browsing records, clicking and viewing records, search query records, favorites, transactions, after-sales service, attention to sharing information, release information, as well as IP address, browser type, telecommunication carriers, use of language, date and time of access.

When you use the products or services offered by our website or clients, we automatically collect details of your use of our services and keep them as relevant web logs. For example, the content of your search query, the Idiv address, the type of browser, the telecommunication operator, the language used, the date and time of access and a record of the web pages you visit.

Please note that device information, log information, etc. alone is information that cannot identify a specific natural person. If we combine such non-personal information with other information for the purpose of identifying a specific natural person or use it in combination with personal information, such non-personal information will be regarded as personal information for the duration of such combination, and we will anonymize and de-identify such personal information unless we have obtained your authorization or as otherwise provided for by laws and regulations.

When you contact us, we may keep information such as records and contents of your correspondence/calls or the contact information you have left in order to contact you or help you to solve the problem, or to record the solutions and results of the related problems.

3.3 Your personal information collected by us through indirect means of acquisition

You can use the products or services provided by our affiliates through the linked portals provided by us through this application account. In order to facilitate the provision of one-stop services to you based on our affiliated accounts and to facilitate your unified management, we centrally display your information in this application. You can discover and use the above services through the functions of basic information and authentication information in your personal center.

When you use the above services through our products or services, you authorize us to receive, aggregate, and analyze your personal information or activity information from our affiliates that we confirm to be from legitimate sources or that you authorize to consent to its provision to us based on actual business and cooperation needs.

If you refuse to provide the above information or refuse to authorize, you may not be able to use the corresponding products or services of this application normally, or display the relevant information, but it does not affect the use of this application to browse, participate in some of the activities that do not require privacy authorization and other core services.

4、Provide you with security

Please note that in order to ensure the authenticity of the user's identity and provide you with better security, you can provide us with identity information such as ID card to complete the real-name authentication. If you refuse to provide the above information, you may not be able to use services such as account management, continue transactions that may be at risk, but will not affect your use of services such as browsing and purchasing goods.

In order to improve the security of your use of the services provided by us and our affiliates and partners, to protect your personal and property safety or that of other users or the public from being infringed upon, to better prevent phishing websites, fraud, network vulnerabilities, computer viruses, network attacks, network intrusion, and other security risks, and to more accurately identify violations of laws and regulations or rules of agreements related to the application, we may use or integrate your user We may use or integrate your user information, transaction information, device information, relevant network logs, and information shared by our affiliates and partners with your authorization or in accordance with the law, to comprehensively determine the risk of your account and transactions, authentication, detection and prevention of security incidents, and to take the necessary measures of recording, auditing, analyzing, and disposing in accordance with the law.

5、Provide you with collection, attention and sharing function

As you browse our website or client, you may choose to bookmark products and/or services, share information with other third parties through the functionality components we provide. In the course of your use of these features, we may collect service log information, including records of your favorites and access to coupon information, sharing history, etc. for the purposes of these features and for other purposes we expressly advise.

6. Exceptions to authorized consent

According to relevant laws and regulations, the collection of your personal information in the following cases does not require your authorized consent:

6.1 Relating to the fulfillment of obligations imposed by laws and regulations by the controller of personal information;

6.2 Directly related to national security and national defense security;

6.3 Directly related to public safety, public health, and significant public interest;

6.4 Directly related to criminal investigations, prosecutions, trials and enforcement of sentences;

6.5 For the purpose of safeguarding the life, property and other significant legitimate rights and interests of the subject of personal information or other individuals but it is difficult to obtain the authorized consent of the person himself/herself;

6.6 The personal information in question is disclosed to the public by the subject of the personal information himself/herself;

6.7 Necessary for the conclusion and performance of the contract at the request of the subject of the personal information;

6.8 Where personal information is collected from lawful publicly disclosed information, such as lawful news reports, open government information and other channels;

6.9 Necessary to maintain the safe and stable operation of the products or services provided, such as detecting and disposing of malfunctions in the products or services;

6.10 The person in control of the personal information is a news organization and it is necessary for it to carry out legitimate journalism;

6.11 If the controller of personal information is an academic research institution, which is necessary to carry out statistical or academic research in the public interest, and if it provides the results of academic research or descriptions to the public, it de-identifies the personal information contained in the results.

If we cease to operate the Application products or services, we will promptly cease activities that continue to collect your personal information, notify you of the cessation of operation by individual delivery or announcement, and delete or anonymize personal information in our possession.

7、Customer service and after-sales function

When you contact us or submit an application for the handling of in-sale, after-sale or dispute handling, in order to protect your account and system security, we need you to provide the necessary personal information to verify your membership status. At this time, our customer service and after-sales function may use your account information and order information.

In order to facilitate contact with you, help you solve the problem as soon as possible or record the handling plan and results of the relevant issues, we may keep records of your correspondence/calls with us and the related content (including account information, order information, other information you provide to prove the relevant facts, or contact information you left), if you make inquiries, complaints or provide suggestions for specific orders, we will use your We will use your account information and order information if you make inquiries, complaints or suggestions regarding a specific order.

We may also use other information about you that is reasonably necessary to provide and improve the quality of our services, including information you provide when you contact our customer service, and information you send us in response to questionnaires you participate in.

III, How we use cookies and similar technologies

1. Cookies

Cookies and similar device information identification technologies are commonly used on the Internet. When you use our services, we may use the relevant technologies to send one or more cookies or anonymous identifiers (“cookies”) to your device to collect, identify and store information about your access to, use of, and use of the Products. We promise that we will not use cookies for any purpose other than those stated in this Privacy Policy. We use cookies mainly to ensure the safe and efficient operation of our products and services, which enables us to confirm the security status of your accounts and transactions, troubleshoot abnormalities related to crashes and delays, and help you save the need to repeat the steps and processes of filling out forms and entering search content. process.

2. Web beacons and pixel tags

In addition to cookies, we use other similar technologies such as web beacons and pixel tags on our websites. Web beacons are typically a transparent image embedded in a website or email. Pixel tags in emails allow us to know if an email has been opened. If you do not want your activity to be tracked in this way, you can unsubscribe from our mailing list at any time.

IV. How we share, transfer, and publicly disclose your information

1. Sharing

We do not share your personal information with companies, organizations, and individuals outside of the service providers of this application, with the following exceptions:

1.1 Sharing with Explicit Consent: We may share your personal information with other parties with your explicit consent.

1.2 Sharing under legal circumstances: We may share your personal information in accordance with the provisions of laws and regulations, the need to resolve litigation disputes, or at the request of administrative or judicial authorities in accordance with the law.

1.3 Sharing with Affiliates: Your Personal Information may be shared with our Affiliates in order for us to jointly provide services to you based on your Affiliate account. We will only share personal information that is necessary (e.g., we will share your account information with our Affiliated Companies that is necessary to enable you to use your account on the Application to access our Affiliated Companies' products or services), and we will ask for your authorization if we share your sensitive personal information or if our Affiliated Companies change the purposes for which the personal information is used and processed.

1.4 Sharing with Authorized Partners: For the sole purpose of fulfilling the purposes stated in this Privacy Policy, certain of our services will be provided by both us and authorized partners. We may share some of your personal information with our partners to provide better customer service and user experience. For example, to arrange for a partner to provide a service. We will only share your personal information for purposes that are lawful, legitimate, necessary, specific, and unambiguous, and will only share personal information that is necessary to provide the service. Our partners are not authorized to use the personal information they share for purposes unrelated to their products or services.

Please note that the information you voluntarily share or even publicly share when you use our services may involve your personal information or others' personal information or even sensitive personal information, so please consider and make your decision more carefully.

Currently, our authorized partners include the following types:

1.4.1 Authorized partners in the advertising and analytics services category. Unless we have your permission, we will not share your personally identifiable information (meaning information that identifies you, such as your name or e-mail address, cell phone number, through which you can be contacted or identified) with partners that provide advertising, analytics services. We may provide these partners with information about the reach and effectiveness of their advertisements without providing personally identifiable information about you, or we may aggregate this information so that it does not identify you personally. For example, only after an advertiser agrees to abide by our ad delivery guidelines may we tell the advertiser how effective their ad was or how many people viewed their ad or installed the app after seeing the ad, or provide these partners with statistical information that does not personally identify you (e.g., “Male, 25-29 years old, located in Beijing “) to help them understand their audience or customers.

1.4.2 Vendors, Service Providers and Other Partners. We send information to vendors, service providers and other partners who support our business by providing technical infrastructure services, analyzing how our services are used, measuring the effectiveness of advertisements and services, providing customer service, payment facilitation or conducting academic research and surveys.

Companies, organizations and individuals with whom we share personal information are subject to strict data protection agreements requiring them to handle personal information in accordance with our instructions, this Privacy Policy and any other relevant confidentiality and security measures.

2. Transfers

We will not transfer your personal information to any company, organization or individual except in the following cases:

2.1 Transfer with Explicit Consent: We may transfer your personal information to other parties with your explicit consent;

2.2 In the event of a merger, acquisition or liquidation involving the transfer of personal information, we will require the new company or organization holding your personal information to continue to be bound by this Personal Information Protection Policy, or else we will require that company or organization to re-solicit authorized consent from you.

3. Public disclosure

We may publicly disclose your personal information in the following circumstances:

3.1 With your express consent;

3.2 Disclosure Based on Law: We may publicly disclose your personal information when required to do so by law, legal process, litigation, or mandatory requirements of governmental authorities.

4. Exceptions to obtaining prior authorized consent for sharing, transferring, or publicly disclosing personal information

In the following cases, sharing, transferring, or publicly disclosing your personal information does not require your prior authorized consent:

4.1 Related to the fulfillment of the obligations of the controller of personal information under laws and regulations;

4.2 Directly related to national security and national defense security;

4.3 Directly related to public safety, public health, and significant public interest;

4.4 Directly related to criminal investigations, prosecutions, trials and enforcement of sentences;

4.5 For the purpose of safeguarding the life, property and other significant legitimate rights and interests of the subject of personal information or other individuals, but it is difficult to obtain the authorized consent of the person himself/herself;

4.6 Personal information that the subject of the personal information discloses to the public on his or her own initiative;

4.7 Collecting personal information from legitimate publicly disclosed information centers, such as legitimate news reports, government information disclosure and other channels.

In accordance with the law, the sharing or transfer of personal information that has been de-identified and processed in such a way as to ensure that the recipient of the data is unable to recover and re-identify the subject of the personal information is not considered to be an act of sharing, transferring, or disclosing personal information externally, and such data shall be stored and processed without any further notification to you and without obtaining your consent.

V. How we protect your information

1. We have used industry-standard security measures to protect the personal information you provide against unauthorized access, public disclosure, use, modification, damage or loss of data. We take all reasonably practicable steps to protect your personal information. For example, data exchanged between your browser and the server (e.g., credit card information) is encrypted by the Secure Socket Layer (SSL) protocol (i.e., HTTPS); we use encryption technology to enhance the security of personal information; we use trusted protection mechanisms to prevent malicious attacks on personal information; we deploy access controls to make every effort to ensure that We deploy access control mechanisms to make every effort to ensure that only authorized personnel have access to personal information; and we conduct security and privacy protection training courses to enhance employee awareness of the importance of protecting personal information.

2、We have an industry-advanced data security management system that focuses on data and revolves around the data lifecycle, which enhances the security of the entire system in multiple dimensions from organizational construction, system design, personnel management, and product technology.

3. We will take reasonably practicable steps to ensure that we do not collect irrelevant personal information. We will only retain your personal information for as long as is necessary to fulfill the purposes set out in this policy, unless an extension of the retention period is required or permitted by law.

4. The Internet is not an absolutely safe environment, and we strongly recommend that you do not send personal information using methods of communication other than those suggested by this application. You can establish contact and share with each other through our services. When you create communication, transaction or sharing through our services, you can independently choose the object of communication, transaction or sharing as a third party who can see your transaction content, contact, communication information or sharing content and other related information.

If you find that your personal information, in particular your account or password, has been compromised, please contact the customer service of this application immediately so that we can take appropriate measures in accordance with your request.

Please note that the information you voluntarily share or even publicly share when using our services may involve your or others' personal information or even personal sensitive information, such as when you choose to upload pictures containing personal information when posting your news or in public places such as group chats or circles. Please consider more carefully whether to share or even publicly share relevant information when using our services.

Please help us keep your account secure by using complex passwords. We will do our best to safeguard the security of any information you send us. We will also report the disposition of personal information security incidents as required by regulatory authorities.

VI. How you manage your information

You can access and manage your information in the following ways, and we will respond to your request in accordance with legal and regulatory requirements:

1. Access to your personal information

You have the right to access your personal information, subject to the exceptions provided by law and regulation. You can access your personal information by yourself in the following ways:

Personal Information - If you wish to access or edit your personal information such as date of birth, occupation, hobbies, interests and other information about your cell phone number, you can do so by logging in to your account under “My” - “Settings”. You can do this by logging into your account under “My” - “Settings”.

Authorization - You can log in to your account by clicking on the “Settings” icon in the upper right corner, click on “Avatar” - “Settings” and turn off or enable authorization in the authorization options. Click on “Settings” and disable or enable authorization in the authorization options.

2. Correcting or supplementing your personal information

You have the right to request that we correct or supplement the personal information we process about you if you discover that it is incorrect. You may make a request for correction or supplementation in the manner set out in this section “(i) Access to your personal information”.

3、Delete your personal information

You may delete some of your personal information in the manner set forth in “(1) Access to your personal information” in this section.

In the following cases, you may make a request for deletion of personal information to us through customer service:

3.1 If our handling of personal information violates laws and regulations;

3.2 If we collect or use your personal information without your express consent;

3.3 If our processing of personal information is in serious breach of our agreement with you;

3.4 If you no longer use our products or services, or if you cancel your account;

3.5 If we are not providing products or services to you.

If we decide to respond to your request for deletion, we will also simultaneously notify the subjects who have obtained your personal information from us, if possible, and ask them to delete it in a timely manner (unless otherwise required by law or regulation, or if these subjects have independently obtained your authorization).

After you or we have assisted you in deleting the information, we may not be able to immediately back up the information deleted from the backup system because of legal and security technical limitations on the use of such information, and we will securely store your personal information and restrict any further processing of it until the backup can be cleared or anonymized.

4. Change the scope of your authorized consent

Every business can require some basic personal information to complete (see Article 1 of this Privacy Policy). In addition, you may request to give or withdraw your consent for the collection and use of additional personal information by contacting the Application's customer service.

Please note that we may not be able to respond to your request to change the scope of your authorization for some types of personal information, such as information that is necessary for the implementation of the basic functions of this application or information that is necessary for us to fulfill our obligations under laws and regulations. When you withdraw your authorization, we will no longer process the corresponding personal information, but your decision to withdraw your authorization will not affect our previous processing of personal information based on your authorization.

5. Automated decision-making in constraint information systems

In some business functions, we may make decisions based solely on non-human, automated decision-making mechanisms, including information systems, algorithms, and the like. If these decisions significantly affect your legal rights, you can contact us through customer service.

6. Responding to your request above

For security purposes, you may be required to provide a written request or otherwise prove your identity. We may ask you to verify your identity before processing your request.

We will respond within 30 days. If you are not satisfied, you can also initiate a complaint through this app's customer service.

In principle, we do not charge fees for reasonable requests, but we will charge a fee for costs incurred for requests that are repeated more than reasonably possible. We may refuse requests that are unnecessarily repetitive, require excessive technical means (e.g., requiring the development of a new system or a fundamental change in existing practices), pose a risk to the legal rights of others, or are highly impractical (e.g., involving the backing up of information stored on magnetic tapes).

In the following cases, as required by law or regulation, we will not be able to respond to your request:

6.1 Relating to the fulfillment of obligations imposed by laws and regulations by the controller of personal information;

6.2 Directly related to national security and national defense security;

6.3 Directly related to public safety, public health, and significant public interest;

6.4 Directly related to criminal investigations, prosecutions, trials and enforcement of sentences;

6.5 Where the controller of personal information has sufficient evidence to indicate that the subject of the personal information has competent malice or has abused his or her rights;

6.6 For the purpose of safeguarding the life, property and other significant legitimate rights and interests of the subject of personal information or other individuals but it is difficult to obtain the authorized consent of the person himself/herself.

6.7 If the request of the subject of the corresponding personal information will result in serious damage to the legitimate rights and interests of the subject of the personal information or other individuals or organizations;

6.8 Where trade secrets are involved.

7. Account Cancellation

We will retain the data on your account (180 days), if you do not wish to continue to use our products, you can submit a request to cancel your account to us through: My - System Settings - Delete Account.

After you voluntarily cancel your account, we will stop providing you with products or services and delete or anonymize your personal information in accordance with the requirements of applicable law, except where retention is required by law or regulation.

If you are unable to access such personal information through the above path, you may contact us at any time through our application customer service. We will respond to your request for access within 15 days.

For other personal information generated by you in the course of using our products or services, we will provide it to you in accordance with the arrangements set out in “(7) Responding to Your Requests” of this Article.

VII. How we handle information from minors

In digital office/learning, communication and collaborative activities we presume that you have the appropriate civil capacity, if you are a minor, we ask you to ask your parents or other guardians to read this policy carefully and to use our services or provide information to us with the consent of your parents or other guardians.

If you are a child under the age of 14, you and your guardian should read this Privacy Policy carefully before you use our services, and make sure that you obtain the consent of your guardian before you use our services under the guidance of your guardian, to ensure your safety when using our services and conducting transactions.

If you are a parent or other guardian of a child, please be concerned that the child is using our services with your authorized consent, and if you have questions about the child's personal information, please contact our dedicated personal information protection department.

In cases where personal information of minors is collected through the use of our products or services with the consent of a parent or guardian, we will only use, share, transfer, or disclose this information as permitted by law or regulation, with the express consent of the parent or guardian, or as necessary for the protection of the minor.

VIII. How your information is transferred globally

Personal information collected and generated by us in the course of our operations within Australia is stored within Australia, except in the following circumstances:

8.1 There are clear provisions in laws and regulations;

8.2 Obtain your express authorization;

8.3 Your personal initiative such as cross-border live streaming/posting of developments via the Internet.

In such cases, we will ensure that your personal information is adequately protected in accordance with this Privacy Policy.

ix. how this privacy policy will be updated

In an effort to provide you with a better product and service experience, we are continually working to improve our products, services and technology, and we may update our Privacy Policy to inform you of your rights under this policy as new services and business processes change.

For major changes, we will also provide more prominent notifications (including we will notify you via a small red dot or provide you with a pop-up alert)

We will not reduce your rights under this Personal Information Protection Policy without your express consent. We will post any changes to this policy on this page.

For major changes, we will also provide more prominent notice (including, for certain services, email notification of specific changes to our Personal Information Protection Policy).

Significant changes referred to in this policy include, but are not limited to:

1. Significant changes in our service model. For example, the purpose of processing personal information, the type of personal information processed, and how personal information is used;

2. Significant changes in our ownership structure, organizational structure, etc. Such as changes in ownership caused by business restructuring, bankruptcy and mergers and acquisitions;

3. Changes in the primary recipients of personal information sharing, transfer or public disclosure;

4. There is a significant change in your right to participate in the processing of personal information and the manner in which you exercise it;

5. In the event of a change in the department responsible for handling the security of personal information, our contact information and complaint channels;

6. When the security impact assessment of personal information indicates a high risk;

We will also archive an older version of this policy on a page dedicated to this application for your review.

X. How to contact us

You can contact us in the following ways and we will respond to your request within 15 days:

If you have any questions, comments or suggestions about the content of this policy, you can contact us through the APP “My” - “Contact Customer Service”;

Company name: Winning Supply Chain Management Co.,Ltd

Office Address:655 NATHAN ROAD,KOWLOON,HONG KONG

EMAIL: support@NicheBay.com