《NicheBay Privacy Policy》
This Policy applies to the NicheBay mobile application product or service
(the “Application”).
The Application is also referred to as the “NicheBay App” as an
alternative name for the Application and the same applies to this Policy.
This Privacy Policy section will help you understand the following:
I. Definitions and scope of application
II. How we collect and use your information;
III. How we use cookies and similar technologies;
IV. How we share, transfer, and publicly disclose users' personal
information;
V. How we protect the security of our users' information;
VI. How you manage personal information;
VII. How we handle information from minors;
VIII. How your information is transferred globally;
IX. How this privacy policy is updated;
Winning Supply Chain Management Co.,Ltd (hereinafter referred to as “we”)
understands the importance of personal information to you, we will comply with the legal and
regulatory requirements and reference to industry best practices to provide adequate protection for
the security of your personal information, we are committed to maintaining your trust in us, and
adhere to the following principles to protect your personal information We are committed to
maintaining your trust in us and adhering to the following principles to protect your personal
information: the principle of consistency of authority and responsibility, the principle of clarity
of purpose, the principle of opt-in consent, the principle of minimum sufficiency, the principle of
ensuring security, the principle of participation of the subject, the principle of openness and
transparency. Accordingly, we have developed this Privacy Policy (“this Policy / this Privacy
Policy”) to help you fully understand how we collect, use, share, store and protect your personal
information in the course of your use of our products/services and how you can manage your personal
information.
Before using the products or services of this application, please be sure
to read and thoroughly understand this policy and use the relevant products or services after
confirming that you fully understand and agree to it. Once you start using the products or services
of the Application, it means that you have fully understood and agreed to this Policy. If you have
any questions, comments or suggestions regarding the content of this Policy, you may contact us
through the various contact methods provided in this application.
I. Definitions and scope of application
Personal information: Information recorded electronically or otherwise
that can identify a specific natural person or reflect the activities of a specific natural person,
either alone or in combination with other information. Personal information includes (name, date of
birth, identity document number, personal biometric information, address, means of communication,
communication records and content, account number and password, property information, credit
information, whereabouts, tracks, etc.), Accommodation information, health and physiological
information, transaction information, etc.).
Sensitive personal information: personal information that, if leaked,
illegally provided or misused, could jeopardize the safety of persons and property, and could easily
lead to damage to a person's reputation, physical or mental health, or discriminatory treatment,
etc. Sensitive personal information includes (identity card numbers, personal biometric information,
bank accounts, communication records and contents, property information, credit information,
whereabouts, accommodation information, health and physiological information, transaction
information, personal information of children under 14 years of age, etc.). Personal information of
children under the age of 14, etc.), etc.
Handling of personal information: This includes the collection, storage,
use, processing, transmission, provision, disclosure, and deletion of personal information.
Deletion of Personal Information: This refers to the act of removing
personal information from the systems involved in the realization of daily business functions, so
that it remains unavailable for retrieval or access.
Anonymization of personal information: A process in which the subject of
personal information is rendered unidentifiable or unrelated through the technical processing of
personal information, and the processed information cannot be recovered.
De-identification of personal information: The process of technically
processing personal information so that the subject of the personal information cannot be identified
or associated with the subject of the personal information without the aid of additional
information.
Subject of Personal Information: The natural person identified or
associated with the personal information.
Personal information controller: An organization or individual that has
the ability to determine the purpose, manner, etc. of handling personal information.
Device information: including device identifier (IMEI, IDFA, Android ID,
MAC, OAID, IMSI and other device-related information), application information (application crash
information, notification switch status, application installation list and other application-related
information), device parameters and system information (device type, device model, operating system
and hardware-related information), device network environment information (IP address, WiFi
information, base station information and other network related information), subject to the actual
collection of the product.
Child: means a minor under the age of fourteen years.
II. How we collect and use your information
When you use our products/services, we need to collect and use your
personal information including the following two kinds:
1, in order to achieve the basic function of providing you with our
products / or services, you must authorize us to collect, use the necessary information, if you
refuse to provide the appropriate information, you will not be able to normal use of our products
and / or services;
2. In order to realize the additional functions of our products and/or
services provided to you, you may choose to individually the same or not agree to the information we
collect and use, if you refuse to provide, you will not be able to use the relevant additional
functions or not be able to achieve the effect of the functions that we intend to achieve, and it
will not affect your use of our basic functions.
3、When providing you with the content of the same city channel or the
content or services related to the location of the device, after your authorization, we will use the
geographic location information related to this service (such as precise positioning information,
WLAN access points, Bluetooth and base stations, sensor information) to ensure the quality of the
content or services. Among them, the precise location information is personal sensitive information,
if you refuse to authorize the location authority will affect the accuracy of the positioning, but
will not affect the normal use of other functions and services, we will also only based on the
network information (e.g., IP) corresponding to the city and/or district to show you may be related
to the content or service.
4. When you use the App, you will get the information of direction sensor
and gyroscope device sensor, which is used to identify whether you are a real user. When you use the
video and photo related functions, it will get the acceleration device sensor information, which is
used to get the angle of the shooting cell phone.
We would like to remind you that this information is not necessary for
the operation of this business function, but it is very important for the improvement of service
quality and the development of new products or services, etc. We will not force you to provide this
information. We will not force you to provide this information, and your refusal to do so will not
adversely affect the use of this business function.
We offer you various specific functional scenarios including:
1、Help you become our users
In order to complete the creation of an account so that we can provide
you with services, you will need to provide the following information: your cell phone number and
other information. When you register to provide us with the cell phone number used for registration
(for receiving verification code), we will send SMS verification code to verify whether your
identity is valid. You can modify and supplement your nickname, gender, birthday, avatar, real-name
verification binding, as well as your Alipay account, WeChat account (for account withdrawals) and
other related information, which are all part of your “account information”. When you use a
third-party account (WeChat account, Apple account) to log in, if you decide to bind the account of
the third-party platform, after your third-party platform account binding authorization, the
third-party platform will synchronize a part of your information under the account of the
third-party platform to us, such as user name, cell phone number, avatar, nicknames, region, gender,
etc. (subject to your authorization) as well as identity verification Information. We collect the
above information for the purpose of providing you with account login services and safeguarding your
account against security risks. If you refuse to authorize the above information, you will not be
able to use the account of the third party platform to log in to the Application Platform, but it
will not affect the other products we provide for you and the normal use of other services.
In the course of use, if you provide the following additional information
to complete your profile, it will help us to provide you with better service and experience: your
birthday, occupation, interests, cell phone number. However, if you do not provide this information,
it will not affect the use of the basic functions of the application products or services.
The above information provided by you will be continuously licensed to us
for the duration of your use of the Service. In the event that you voluntarily request to cancel
your account, we will make it anonymous or delete your personal information as soon as possible in
accordance with applicable laws and regulations.
2. Provide you with services and needs
In order to display content or services to you, we may collect and use
device information (including device identifiers (IMEI, IDFA, Android ID, MAC, OAID, IMSI and other
device-related information), application information (application crash information, notification
on/off status, application installation lists and other application-related information), device
parameters and system information (device type, device model, operating system and hardware-related
information), device network environment information (IP address, WiFi information, base station
information and other network-related information)), service log information (browsing records,
click-to-view records, search and query records, favorites, attention and sharing information,
posting information, as well as IP address, browser type, telecommunication carrier, usage language,
date and time of access), and basic information submitted by you (such as nickname, gender, and cell
phone number), which are used to improve your personal information.
3. Providing goods or services to you
3.1 Information you provide to us
Relevant personal information you provide to us when you register for an
account or use our services, such as basic WeChat information (nickname, avatar, gender), phone
number, etc;
Shared information that you provide to other parties through our
Services, and information that is stored when you use our Services. Before providing the foregoing
personal information of such other parties to the Application, you need to ensure that you have
obtained their authorized consent.
3.2 Information we collect in the course of your use of the Services。
In order to provide you with search results, understand product
suitability, and identify account anomalies, we collect and correlate information about the services
you use and how you use them, including:
3.2.1 Equipment information:
In order to ensure the secure operation of applications and services, we
collect your device model number, application list (installation list), device name, device unique
identifier, login IP address, product version number, and mobile network information.
We will collect your (device identifier, app list, IMEI, IDFA, MAC, name,
phone number, location) and other information in a silent/background state for the purpose of
identifying user information.
3.2.2 Specific permissions granted by us based on your installation and
use of the software: The purpose, manner and scope of the collection of personal information by this
application during your installation and use are described below:
(1) Permission to read photos or take photos
When you change your profile avatar information, or need to upload
pictures or videos, we will ask you for album or camera permissions. On some models, the permission
to read photo albums is expressed as “read content from memory card”. If you refuse to authorize the
provision of album or camera permissions, you will not be able to use the corresponding functions,
but it will not affect your normal use of other functions of the application.
(2) Write Album Permissions
When you use the download photo function, we will ask you for album write
permission or memory card write permission. On some models, the album write permission is expressed
as “modify or delete the contents of the memory card”.
(3) Permission to make telephone calls
In order to provide you with dialing services, we will request you to
enable dialing privileges. If you do not agree to enable dialing privileges, you will not be able to
use this feature, but it will not affect the use of other features.
(4) Getting a list of applications
In order to provide you with push service support, we will apply to you
to open the access to the application list permissions, so that we can push the message to you,
authorize the push service providers to carry out link adjustment, and promote each other to
activate the SDK push process that has been closed, to ensure that you can receive the message that
we push to you in a timely manner, if you do not agree to open the access to the application list
permissions, it will affect the success of the message that you receive the push.
(5) Obtaining address book privileges
In order to facilitate you to add friends, we want to get your address
book permissions, used to read your address book list uploaded to the server to find your friends
information, such as you refuse to authorize the provision of address book permissions, you will not
be able to use the corresponding functions, but does not affect the normal use of the other features
of this application.
Our products are developed based on DCloud uni-app(5+ App/Wap2App).
During the running period of the application, we need to collect your device's unique identifier
(device ID, IMEI/android ID/DEVICE_ID/IDFA, device's MAC address, OAID, software list, and SIM card
IMSI information) in order to provide statistical analysis services, and improve performance and
user experience by analyzing application startup data and abnormal error logs to provide better
services to users. For more details, please visit DCloud User Terms of Service.
uni-app integrates the following three-party SDKs by default for
guaranteed operation:
(1) SDK name: uni-app (5+, web2app)
Usage: uni-app base module
Permissions: stored personal files, device information (IMEI, ANDROID_ID,
DEVICE_ID, IMSI, OAID), network information.
Official website link: https://ask.dcloud.net.cn/article/36937
(2) SDK Name: Ali weexSDK
Purpose: default integration of the uni-app base module for rendering the
nvue page engine of uniapp.
Permissions: stored personal files, read external memory, write external
memory.
Official website link: https://weexapp.com/zh
(3) SDK name: fresco photo gallery
Package Name: com.facebook.fresco
Usage: default integration of uni-app base module, used for loading
images on nvue pages.
Permissions: stored personal files, read external memory, write external
memory.
Official website link: https://www.fresco-cn.org/
(4) SDK name: glide gallery
Package Name: com.bumptech.glide
Purpose: default integration of uni-app base module for image preview
use.
Permissions: stored personal files, read external memory, write external
memory.
Official website link: http://bumptech.github.io/glide/
(5) SDK name: gif-drawable
Package Name: pl.droidsonroids.gif
Usage: default integration of uni-app base module for loading gifs.
Permissions: stored personal files, read external memory, write external
memory.
Official website link: https://github.com/koral--/android-gif-drawable
Package Name: com.alibaba.fastjson
Purpose: default integration of uni-app base module for JSON parsing.
Official website link: https://github.com/alibaba/fastjson
(7) SDK Name: Mobile Security Alliance OAID
Wrappers: com.bun.miitmdid, com.zui.opendeviceidlibrary, com.netease.nis,
com.samsung.android, com.huawei.hms
Purpose: default integration of uni-app base module, used to get oaid
Permission: device information (OAID).
SDK official website link: http://www.msa-alliance.cn/col.jsp?id=105
Supplementary note on OAID of Mobile Security Alliance: “Supplementary
Device Identification System and SDK for Mobile Intelligent Terminal” strictly abides by relevant
laws and regulations such as China's Network Security Law, Data Security Law and Provisions on the
Protection of Personal Information of Telecommunications and Internet Users, as well as the National
Standard Requirements for Personal Information Security of Information Security Technology, etc. The
SDK will not actively collect any data, and will only obtain the following data for local judgment:
it will not transmit any network. The SDK will not collect any data on its own initiative, and only
obtains the following data when the APP is called, which is used for local judgment and will not be
transmitted over any network:
● Device manufacturer, device model, and device brand, used to determine
the terminal calling interface.
● The name of the device network operator, used to determine the virtual
machine environment.
● APP package name for signature verification.
The purpose, manner, and scope of information collected by the
third-party SDKs integrated with this application are described below:
(1) SDK Name: AliCloud OSS Storage
Company: Alibaba Group Holding Ltd.
Purpose: for uploading files to AliCloud OSS server
Permissions: network information, device identification information
(IMEI/IMSI/Android_ID, SIM card serial number, Mac address)
Privacy Policy Link: Aliyun Legal Notice and Privacy Policy
(2) SDK name: AUO Statistics
Wrapping names: com.uc.crashsdk, com.efs, com.umeng
Company: AUO Tongxin (Beijing) Technology Co.
Purpose: For statistical purposes
Permissions: APP frontend runtime needs to get device information (IMEI,
ANDROID_ID, DEVICE_ID, IMSI), app installed list, network information, get device serial number.
Link to Privacy Policy: AUO Privacy Policy
3.2.3 Service log information: including browsing records, clicking and
viewing records, search query records, favorites, transactions, after-sales service, attention to
sharing information, release information, as well as IP address, browser type, telecommunication
carriers, use of language, date and time of access.
When you use the products or services offered by our website or clients,
we automatically collect details of your use of our services and keep them as relevant web logs. For
example, the content of your search query, the Idiv address, the type of browser, the
telecommunication operator, the language used, the date and time of access and a record of the web
pages you visit.
Please note that device information, log information, etc. alone is
information that cannot identify a specific natural person. If we combine such non-personal
information with other information for the purpose of identifying a specific natural person or use
it in combination with personal information, such non-personal information will be regarded as
personal information for the duration of such combination, and we will anonymize and de-identify
such personal information unless we have obtained your authorization or as otherwise provided for by
laws and regulations.
When you contact us, we may keep information such as records and contents
of your correspondence/calls or the contact information you have left in order to contact you or
help you to solve the problem, or to record the solutions and results of the related problems.
3.3 Your personal information collected by us through indirect means of
acquisition
You can use the products or services provided by our affiliates through
the linked portals provided by us through this application account. In order to facilitate the
provision of one-stop services to you based on our affiliated accounts and to facilitate your
unified management, we centrally display your information in this application. You can discover and
use the above services through the functions of basic information and authentication information in
your personal center.
When you use the above services through our products or services, you
authorize us to receive, aggregate, and analyze your personal information or activity information
from our affiliates that we confirm to be from legitimate sources or that you authorize to consent
to its provision to us based on actual business and cooperation needs.
If you refuse to provide the above information or refuse to authorize,
you may not be able to use the corresponding products or services of this application normally, or
display the relevant information, but it does not affect the use of this application to browse,
participate in some of the activities that do not require privacy authorization and other core
services.
4、Provide you with security
Please note that in order to ensure the authenticity of the user's
identity and provide you with better security, you can provide us with identity information such as
ID card to complete the real-name authentication. If you refuse to provide the above information,
you may not be able to use services such as account management, continue transactions that may be at
risk, but will not affect your use of services such as browsing and purchasing goods.
In order to improve the security of your use of the services provided by
us and our affiliates and partners, to protect your personal and property safety or that of other
users or the public from being infringed upon, to better prevent phishing websites, fraud, network
vulnerabilities, computer viruses, network attacks, network intrusion, and other security risks, and
to more accurately identify violations of laws and regulations or rules of agreements related to the
application, we may use or integrate your user We may use or integrate your user information,
transaction information, device information, relevant network logs, and information shared by our
affiliates and partners with your authorization or in accordance with the law, to comprehensively
determine the risk of your account and transactions, authentication, detection and prevention of
security incidents, and to take the necessary measures of recording, auditing, analyzing, and
disposing in accordance with the law.
5、Provide you with collection, attention and sharing function
As you browse our website or client, you may choose to bookmark products
and/or services, share information with other third parties through the functionality components we
provide. In the course of your use of these features, we may collect service log information,
including records of your favorites and access to coupon information, sharing history, etc. for the
purposes of these features and for other purposes we expressly advise.
6. Exceptions to authorized consent
According to relevant laws and regulations, the collection of your
personal information in the following cases does not require your authorized consent:
6.1 Relating to the fulfillment of obligations imposed by laws and
regulations by the controller of personal information;
6.2 Directly related to national security and national defense security;
6.3 Directly related to public safety, public health, and significant
public interest;
6.4 Directly related to criminal investigations, prosecutions, trials and
enforcement of sentences;
6.5 For the purpose of safeguarding the life, property and other
significant legitimate rights and interests of the subject of personal information or other
individuals but it is difficult to obtain the authorized consent of the person himself/herself;
6.6 The personal information in question is disclosed to the public by
the subject of the personal information himself/herself;
6.7 Necessary for the conclusion and performance of the contract at the
request of the subject of the personal information;
6.8 Where personal information is collected from lawful publicly
disclosed information, such as lawful news reports, open government information and other channels;
6.9 Necessary to maintain the safe and stable operation of the products
or services provided, such as detecting and disposing of malfunctions in the products or services;
6.10 The person in control of the personal information is a news
organization and it is necessary for it to carry out legitimate journalism;
6.11 If the controller of personal information is an academic research
institution, which is necessary to carry out statistical or academic research in the public
interest, and if it provides the results of academic research or descriptions to the public, it
de-identifies the personal information contained in the results.
If we cease to operate the Application products or services, we will
promptly cease activities that continue to collect your personal information, notify you of the
cessation of operation by individual delivery or announcement, and delete or anonymize personal
information in our possession.
7、Customer service and after-sales function
When you contact us or submit an application for the handling of in-sale,
after-sale or dispute handling, in order to protect your account and system security, we need you to
provide the necessary personal information to verify your membership status. At this time, our
customer service and after-sales function may use your account information and order information.
In order to facilitate contact with you, help you solve the problem as
soon as possible or record the handling plan and results of the relevant issues, we may keep records
of your correspondence/calls with us and the related content (including account information, order
information, other information you provide to prove the relevant facts, or contact information you
left), if you make inquiries, complaints or provide suggestions for specific orders, we will use
your We will use your account information and order information if you make inquiries, complaints or
suggestions regarding a specific order.
We may also use other information about you that is reasonably necessary
to provide and improve the quality of our services, including information you provide when you
contact our customer service, and information you send us in response to questionnaires you
participate in.
III, How we use cookies and similar technologies
Cookies and similar device information identification technologies are
commonly used on the Internet. When you use our services, we may use the relevant technologies to
send one or more cookies or anonymous identifiers (“cookies”) to your device to collect, identify
and store information about your access to, use of, and use of the Products. We promise that we will
not use cookies for any purpose other than those stated in this Privacy Policy. We use cookies
mainly to ensure the safe and efficient operation of our products and services, which enables us to
confirm the security status of your accounts and transactions, troubleshoot abnormalities related to
crashes and delays, and help you save the need to repeat the steps and processes of filling out
forms and entering search content. process.
2. Web beacons and pixel tags
In addition to cookies, we use other similar technologies such as web
beacons and pixel tags on our websites. Web beacons are typically a transparent image embedded in a
website or email. Pixel tags in emails allow us to know if an email has been opened. If you do not
want your activity to be tracked in this way, you can unsubscribe from our mailing list at any time.
IV. How we share, transfer, and publicly disclose your information
We do not share your personal information with companies, organizations,
and individuals outside of the service providers of this application, with the following exceptions:
1.1 Sharing with Explicit Consent: We may share your personal information
with other parties with your explicit consent.
1.2 Sharing under legal circumstances: We may share your personal
information in accordance with the provisions of laws and regulations, the need to resolve
litigation disputes, or at the request of administrative or judicial authorities in accordance with
the law.
1.3 Sharing with Affiliates: Your Personal Information may be shared with
our Affiliates in order for us to jointly provide services to you based on your Affiliate account.
We will only share personal information that is necessary (e.g., we will share your account
information with our Affiliated Companies that is necessary to enable you to use your account on the
Application to access our Affiliated Companies' products or services), and we will ask for your
authorization if we share your sensitive personal information or if our Affiliated Companies change
the purposes for which the personal information is used and processed.
1.4 Sharing with Authorized Partners: For the sole purpose of fulfilling
the purposes stated in this Privacy Policy, certain of our services will be provided by both us and
authorized partners. We may share some of your personal information with our partners to provide
better customer service and user experience. For example, to arrange for a partner to provide a
service. We will only share your personal information for purposes that are lawful, legitimate,
necessary, specific, and unambiguous, and will only share personal information that is necessary to
provide the service. Our partners are not authorized to use the personal information they share for
purposes unrelated to their products or services.
Please note that the information you voluntarily share or even publicly
share when you use our services may involve your personal information or others' personal
information or even sensitive personal information, so please consider and make your decision more
carefully.
Currently, our authorized partners include the following types:
1.4.1 Authorized partners in the advertising and analytics services
category. Unless we have your permission, we will not share your personally identifiable information
(meaning information that identifies you, such as your name or e-mail address, cell phone number,
through which you can be contacted or identified) with partners that provide advertising, analytics
services. We may provide these partners with information about the reach and effectiveness of their
advertisements without providing personally identifiable information about you, or we may aggregate
this information so that it does not identify you personally. For example, only after an advertiser
agrees to abide by our ad delivery guidelines may we tell the advertiser how effective their ad was
or how many people viewed their ad or installed the app after seeing the ad, or provide these
partners with statistical information that does not personally identify you (e.g., “Male, 25-29
years old, located in Beijing “) to help them understand their audience or customers.
1.4.2 Vendors, Service Providers and Other Partners. We send information
to vendors, service providers and other partners who support our business by providing technical
infrastructure services, analyzing how our services are used, measuring the effectiveness of
advertisements and services, providing customer service, payment facilitation or conducting academic
research and surveys.
Companies, organizations and individuals with whom we share personal
information are subject to strict data protection agreements requiring them to handle personal
information in accordance with our instructions, this Privacy Policy and any other relevant
confidentiality and security measures.
We will not transfer your personal information to any company,
organization or individual except in the following cases:
2.1 Transfer with Explicit Consent: We may transfer your personal
information to other parties with your explicit consent;
2.2 In the event of a merger, acquisition or liquidation involving the
transfer of personal information, we will require the new company or organization holding your
personal information to continue to be bound by this Personal Information Protection Policy, or else
we will require that company or organization to re-solicit authorized consent from you.
We may publicly disclose your personal information in the following
circumstances:
3.1 With your express consent;
3.2 Disclosure Based on Law: We may publicly disclose your personal
information when required to do so by law, legal process, litigation, or mandatory requirements of
governmental authorities.
4. Exceptions to obtaining prior authorized consent for sharing,
transferring, or publicly disclosing personal information
In the following cases, sharing, transferring, or publicly disclosing
your personal information does not require your prior authorized consent:
4.1 Related to the fulfillment of the obligations of the controller of
personal information under laws and regulations;
4.2 Directly related to national security and national defense security;
4.3 Directly related to public safety, public health, and significant
public interest;
4.4 Directly related to criminal investigations, prosecutions, trials and
enforcement of sentences;
4.5 For the purpose of safeguarding the life, property and other
significant legitimate rights and interests of the subject of personal information or other
individuals, but it is difficult to obtain the authorized consent of the person himself/herself;
4.6 Personal information that the subject of the personal information
discloses to the public on his or her own initiative;
4.7 Collecting personal information from legitimate publicly disclosed
information centers, such as legitimate news reports, government information disclosure and other
channels.
In accordance with the law, the sharing or transfer of personal
information that has been de-identified and processed in such a way as to ensure that the recipient
of the data is unable to recover and re-identify the subject of the personal information is not
considered to be an act of sharing, transferring, or disclosing personal information externally, and
such data shall be stored and processed without any further notification to you and without
obtaining your consent.
V. How we protect your information
1. We have used industry-standard security measures to protect the
personal information you provide against unauthorized access, public disclosure, use, modification,
damage or loss of data. We take all reasonably practicable steps to protect your personal
information. For example, data exchanged between your browser and the server (e.g., credit card
information) is encrypted by the Secure Socket Layer (SSL) protocol (i.e., HTTPS); we use encryption
technology to enhance the security of personal information; we use trusted protection mechanisms to
prevent malicious attacks on personal information; we deploy access controls to make every effort to
ensure that We deploy access control mechanisms to make every effort to ensure that only authorized
personnel have access to personal information; and we conduct security and privacy protection
training courses to enhance employee awareness of the importance of protecting personal information.
2、We have an industry-advanced data security management system that
focuses on data and revolves around the data lifecycle, which enhances the security of the entire
system in multiple dimensions from organizational construction, system design, personnel management,
and product technology.
3. We will take reasonably practicable steps to ensure that we do not
collect irrelevant personal information. We will only retain your personal information for as long
as is necessary to fulfill the purposes set out in this policy, unless an extension of the retention
period is required or permitted by law.
4. The Internet is not an absolutely safe environment, and we strongly
recommend that you do not send personal information using methods of communication other than those
suggested by this application. You can establish contact and share with each other through our
services. When you create communication, transaction or sharing through our services, you can
independently choose the object of communication, transaction or sharing as a third party who can
see your transaction content, contact, communication information or sharing content and other
related information.
If you find that your personal information, in particular your account or
password, has been compromised, please contact the customer service of this application immediately
so that we can take appropriate measures in accordance with your request.
Please note that the information you voluntarily share or even publicly
share when using our services may involve your or others' personal information or even personal
sensitive information, such as when you choose to upload pictures containing personal information
when posting your news or in public places such as group chats or circles. Please consider more
carefully whether to share or even publicly share relevant information when using our services.
Please help us keep your account secure by using complex passwords. We
will do our best to safeguard the security of any information you send us. We will also report the
disposition of personal information security incidents as required by regulatory authorities.
VI. How you manage your information
You can access and manage your information in the following ways, and we
will respond to your request in accordance with legal and regulatory requirements:
1. Access to your personal information
You have the right to access your personal information, subject to the
exceptions provided by law and regulation. You can access your personal information by yourself in
the following ways:
Personal Information - If you wish to access or edit your personal
information such as date of birth, occupation, hobbies, interests and other information about your
cell phone number, you can do so by logging in to your account under “My” - “Settings”. You can do
this by logging into your account under “My” - “Settings”.
Authorization - You can log in to your account by clicking on the
“Settings” icon in the upper right corner, click on “Avatar” - “Settings” and turn off or enable
authorization in the authorization options. Click on “Settings” and disable or enable authorization
in the authorization options.
2. Correcting or supplementing your personal information
You have the right to request that we correct or supplement the personal
information we process about you if you discover that it is incorrect. You may make a request for
correction or supplementation in the manner set out in this section “(i) Access to your personal
information”.
3、Delete your personal information
You may delete some of your personal information in the manner set forth
in “(1) Access to your personal information” in this section.
In the following cases, you may make a request for deletion of personal
information to us through customer service:
3.1 If our handling of personal information violates laws and
regulations;
3.2 If we collect or use your personal information without your express
consent;
3.3 If our processing of personal information is in serious breach of our
agreement with you;
3.4 If you no longer use our products or services, or if you cancel your
account;
3.5 If we are not providing products or services to you.
If we decide to respond to your request for deletion, we will also
simultaneously notify the subjects who have obtained your personal information from us, if possible,
and ask them to delete it in a timely manner (unless otherwise required by law or regulation, or if
these subjects have independently obtained your authorization).
After you or we have assisted you in deleting the information, we may not
be able to immediately back up the information deleted from the backup system because of legal and
security technical limitations on the use of such information, and we will securely store your
personal information and restrict any further processing of it until the backup can be cleared or
anonymized.
4. Change the scope of your authorized consent
Every business can require some basic personal information to complete
(see Article 1 of this Privacy Policy). In addition, you may request to give or withdraw your
consent for the collection and use of additional personal information by contacting the
Application's customer service.
Please note that we may not be able to respond to your request to change
the scope of your authorization for some types of personal information, such as information that is
necessary for the implementation of the basic functions of this application or information that is
necessary for us to fulfill our obligations under laws and regulations. When you withdraw your
authorization, we will no longer process the corresponding personal information, but your decision
to withdraw your authorization will not affect our previous processing of personal information based
on your authorization.
5. Automated decision-making in constraint information systems
In some business functions, we may make decisions based solely on
non-human, automated decision-making mechanisms, including information systems, algorithms, and the
like. If these decisions significantly affect your legal rights, you can contact us through customer
service.
6. Responding to your request above
For security purposes, you may be required to provide a written request
or otherwise prove your identity. We may ask you to verify your identity before processing your
request.
We will respond within 30 days. If you are not satisfied, you can also
initiate a complaint through this app's customer service.
In principle, we do not charge fees for reasonable requests, but we will
charge a fee for costs incurred for requests that are repeated more than reasonably possible. We may
refuse requests that are unnecessarily repetitive, require excessive technical means (e.g.,
requiring the development of a new system or a fundamental change in existing practices), pose a
risk to the legal rights of others, or are highly impractical (e.g., involving the backing up of
information stored on magnetic tapes).
In the following cases, as required by law or regulation, we will not be
able to respond to your request:
6.1 Relating to the fulfillment of obligations imposed by laws and
regulations by the controller of personal information;
6.2 Directly related to national security and national defense security;
6.3 Directly related to public safety, public health, and significant
public interest;
6.4 Directly related to criminal investigations, prosecutions, trials and
enforcement of sentences;
6.5 Where the controller of personal information has sufficient evidence to indicate that the
subject of the personal information has competent malice or has abused his or her rights;
6.6 For the purpose of safeguarding the life, property and other
significant legitimate rights and interests of the subject of personal information or other
individuals but it is difficult to obtain the authorized consent of the person himself/herself.
6.7 If the request of the subject of the corresponding personal
information will result in serious damage to the legitimate rights and interests of the subject of
the personal information or other individuals or organizations;
6.8 Where trade secrets are involved.
We will retain the data on your account (180 days), if you do not wish to
continue to use our products, you can submit a request to cancel your account to us through: My -
System Settings - Delete Account.
After you voluntarily cancel your account, we will stop providing you
with products or services and delete or anonymize your personal information in accordance with the
requirements of applicable law, except where retention is required by law or regulation.
If you are unable to access such personal information through the above
path, you may contact us at any time through our application customer service. We will respond to
your request for access within 15 days.
For other personal information generated by you in the course of using
our products or services, we will provide it to you in accordance with the arrangements set out in
“(7) Responding to Your Requests” of this Article.
VII. How we handle information from minors
In digital office/learning, communication and collaborative activities we
presume that you have the appropriate civil capacity, if you are a minor, we ask you to ask your
parents or other guardians to read this policy carefully and to use our services or provide
information to us with the consent of your parents or other guardians.
If you are a child under the age of 14, you and your guardian should read
this Privacy Policy carefully before you use our services, and make sure that you obtain the consent
of your guardian before you use our services under the guidance of your guardian, to ensure your
safety when using our services and conducting transactions.
If you are a parent or other guardian of a child, please be concerned
that the child is using our services with your authorized consent, and if you have questions about
the child's personal information, please contact our dedicated personal information protection
department.
In cases where personal information of minors is collected through the
use of our products or services with the consent of a parent or guardian, we will only use, share,
transfer, or disclose this information as permitted by law or regulation, with the express consent
of the parent or guardian, or as necessary for the protection of the minor.
VIII. How your information is transferred globally
Personal information collected and generated by us in the course of our
operations within Australia is stored within Australia, except in the following circumstances:
8.1 There are clear provisions in laws and regulations;
8.2 Obtain your express authorization;
8.3 Your personal initiative such as cross-border live streaming/posting
of developments via the Internet.
In such cases, we will ensure that your personal information is
adequately protected in accordance with this Privacy Policy.
ix. how this privacy policy will be updated
In an effort to provide you with a better product and service experience,
we are continually working to improve our products, services and technology, and we may update our
Privacy Policy to inform you of your rights under this policy as new services and business processes
change.
For major changes, we will also provide more prominent notifications
(including we will notify you via a small red dot or provide you with a pop-up alert)
We will not reduce your rights under this Personal Information Protection
Policy without your express consent. We will post any changes to this policy on this page.
For major changes, we will also provide more prominent notice (including,
for certain services, email notification of specific changes to our Personal Information Protection
Policy).
Significant changes referred to in this policy include, but are not
limited to:
1. Significant changes in our service model. For example, the purpose of
processing personal information, the type of personal information processed, and how personal
information is used;
2. Significant changes in our ownership structure, organizational
structure, etc. Such as changes in ownership caused by business restructuring, bankruptcy and
mergers and acquisitions;
3. Changes in the primary recipients of personal information sharing,
transfer or public disclosure;
4. There is a significant change in your right to participate in the
processing of personal information and the manner in which you exercise it;
5. In the event of a change in the department responsible for handling
the security of personal information, our contact information and complaint channels;
6. When the security impact assessment of personal information indicates
a high risk;
We will also archive an older version of this policy on a page dedicated
to this application for your review.
You can contact us in the following ways and we will respond to your
request within 15 days:
If you have any questions, comments or suggestions about the content of
this policy, you can contact us through the APP “My” - “Contact Customer Service”;
Company name: Winning Supply Chain Management Co.,Ltd
Office Address:655 NATHAN ROAD,KOWLOON,HONG KONG
EMAIL: support@NicheBay.com