Privacy Policy
We always put the protection of users' privacy at the heart of everything we do and are committed to ensuring the security of your personal data through strict security measures. The purpose of this Privacy Policy is to clearly explain how we collect, use, protect, and disclose information that we receive through the Site and Services. By accessing or using the Platform, you will be deemed to have agreed to the terms of this Policy. If you have any questions about the terms, please contact us using the contact information at the bottom of this article.
Scope of data collection
We strictly adhere to the minimum needs principle and only collect personal data that is directly related to our business functions and that is necessary to comply with our legal obligations. This information includes identifiers such as name, username, password, contact and transaction data such as email address, phone number, shipping address, and device and network information such as device type, operating system, browser version, IP address, pages visited, and log data such as dwell time. It should be noted that personal data does not only include content that can be directly identified,but also anonymized information that is indirectly associated with a person by technical means. We have made a clear commitment not to collect information that is not related to our business and that data that has been fully anonymized by technical means will no longer be treated as personal data.
Purpose of Use of Information
Your personal data will only be used in the scenarios indicated when the data was voluntarily provided and serve the following key objectives, to the extent permitted by law:
To ensure the normal operation of the Services, we need to process orders, deliver products, maintain account security, and communicate with you via email or phone about the progress of transactions or changes to your account; We analyze user behavior patterns to optimize website performance, to improve the service experience, and identify potential system vulnerabilities or security risks by technical means; On the premise that you explicitly tick the box and agree,We may send you marketing information such as product updates and promotions based on your preferences, and you can unsubscribe or contact customer service at any time using the email unsubscribe feature. In order to comply with our legal obligations, such as tax reporting and dispute resolution, we may retain or disclose information if required to do so in accordance with the law.
Protection of users' rights
As the subject of the information, you have complete control over your privacy. You can request access, correction or completion of any inaccuracies in your personal data at any time by email, as well as request the deletion of unnecessary data or the closure of your account. If you believe that the processing of your data goes beyond what is reasonable, you may object or request the restriction of processing;Where technically feasible, you can also request that your data be migrated to another service in a structured format. It is important to note that some requests may not be immediately available due to legal compliance requirements, technical limitations, or public interest, and we will provide you with a detailed explanation of the reasons and an alternative solution. You may withdraw your consent to data processing based on the User's consent at any time, and this operation will not affect the lawfulness of the data processing prior to its withdrawal.
Information security measures
We have developed a multi-layered protection system that covers technical, administrative and physical levels to counter the risk of data breaches, tampering or misuse. On the technical level, encryption protocols are used to transmit sensitive information, firewalls and intrusion detection systems are used to intercept network attacks in real time, and potential vulnerabilities are discovered through regular penetration testing and code audits. At the management level, the system of authority classification is strictly implemented, and only authorized employees who have passed the background check can access the data according to the principle of minimum requirement, and all employees receive compliance training every year;At the physical level, the data center is equipped with access control, surveillance, and disaster control facilities to ensure the security of the hardware environment. At the same time, we have established a data lifecycle management system, regularly cleaned up redundant information, and formulated a complete security plan that includes incident monitoring, emergency response, and user notification. Although sufficient resources have been invested, the Internet environment is not completely secure. If you notice any signs of abnormal login or information leakage, please contact us immediately through official channels.
Cookies and Tracking Technologies
To improve the user experience, we use cookies and similar technologies for core functionality. For example, session cookies can temporarily store the contents of a shopping cart to prevent data loss due to page redirects; Persistent cookies track settings such as language settings, font size, etc. to reduce repetitive actions. At the same time, we collect anonymized traffic data through analytical cookies in order to make decisions about product optimization.You can disable or delete cookies through your browser settings, but this may result in limited functionality. We are committed not to use cookies for cross-site tracking or user profiling, or to share relevant data with third-party advertising platforms.
Information Disclosure Policy
We share personal information only to the extent required by law or for the Services. Specific scenarios include: providing a delivery address to a logistics service provider to complete the delivery of goods; Entrust the payment institution with handling the transaction flow to ensure the safety of funds; Or share the order number with the customer service outsourcing team to help with any post-purchase issues.All third parties are obliged to sign a confidentiality agreement and undertake to use the data only within the scope of the order. In addition, in accordance with the law, we may provide regulatory authorities with the necessary information to respond to legal requests, prevent fraud, or protect users' personal safety. In the event of a change of ownership, such as a merger or acquisition, transfer of assets, etc., we will notify the user by email or notice and ensure that the acquirer continues to comply with its obligations under this policy.
Information retention period
The retention period of your personal data follows the principle of purpose limitation. For example, transaction data is retained for at least seven years in accordance with tax laws; Account information is retained for six months after you voluntarily cancel to avoid disputes. Customer service communication records will be deleted within 30 days of the issue being resolved. After the expiry of the retention period or after the purpose of the processing has been achieved, we will completely delete or anonymise the data through technical means. If you request early deletion, we will check the feasibility within 15 working days and inform you by e-mail of the result and the basis.
Contact us
If you have any questions about the terms of this policy, or if you need to exercise your privacy rights or report data misuse, please send an email to the email address provided, and our Data Protection Officer will respond within five business days. For complex requests, the response time can be extended to 30 days, and we will inform you in advance of the progress. If you are not satisfied with the outcome, you can file a complaint with your local data protection supervisory authority, but we sincerely hope that we can resolve the disagreement primarily through negotiation.
Protecting privacy is a journey with no end in sight, and we will continue to iterate on security measures and transparent data processing processes to repay the trust of every user.