Send Message
Privacy Policy

Home

>

Helith Technology (Guangzhou) Co., Ltd. Privacy Policy

Privacy Policy

Helith Technology (Guangzhou) Co., Ltd. Privacy Policy


Update Date: July 26, 2022

 

Effective Date: July 26, 2022

 

 

【Important Notice】

 

Helith Technology (Guangzhou) Co., Ltd. and its affiliated companies (hereinafter referred to as "Helith Technology" or "we") attach great importance to the protection of user privacy. We understand the significance of personal information to users (hereinafter referred to as "you"). In accordance with legal requirements, we will take corresponding security measures to protect your personal information as much as possible. To this end, we have formulated the "Helith Technology (Guangzhou) Co., Ltd. Privacy Policy" (hereinafter referred to as "this Policy") so that you can understand in detail how we will collect, use, transmit, store, and disclose your personal information, as well as the rights you enjoy. This Policy applies to all services provided by Helith Technology (Guangzhou) Co., Ltd. (hereinafter collectively referred to as "Helith Technology Services"), including but not limited to all Helith Technology websites, products, and services that display or link to this Policy. When you use any individual service of Helith Technology, you agree to accept this Policy and the specific privacy policy terms (hereinafter referred to as "Specific Terms," if any) we set in that individual service. In this case, the Specific Terms and this Policy will apply to you at the same time. If the Specific Terms are inconsistent with the provisions of this Policy, the Specific Terms shall prevail. In the event of any inconsistency between this Policy and similar provisions in Helith Technology's "Legal Statement," this Policy shall prevail. Furthermore, this Policy does not apply to services provided by other companies or individuals (hereinafter referred to as "Third-Party Services"). For the convenience of users, Helith Technology Services may contain third-party services or links to them. However, as third parties independently collect and process your personal information, which we cannot control, unless otherwise required by law, we are not responsible for third-party services. You are responsible for reading and referring to the privacy policies of these third parties and independently deciding whether to use their services.

 

Please carefully read (minors should read this with the accompaniment of a guardian) and understand this Policy before using Helith Technology Services, especially the clauses marked in bold. You should focus on these clauses. Once you have fully understood and agreed, you may begin using the services. When you choose to continue signing this Policy or start using Helith Technology Services, it will be deemed that you have accepted and recognized this Policy based on the necessity of providing products and services.

 

After reading this Policy, if you have any questions about this Policy or matters related to this Policy, you can contact us through the feedback channels listed in the "How to Contact Us" section of this Policy, and we will respond to you as soon as possible.

 

This policy will help you understand the following:

 

1. How we collect your personal information


2. How we use your personal information


3. How we use Cookies and similar technologies


4. How we protect and store your personal information


5. How we entrust, share, transfer, or publicly disclose your personal information


6. How you can access and manage your personal information


7. How we handle the personal information of minors


8. How this policy is updated


9. How to contact us


一、How We Collect Your Personal Information

 

(1) We will collect the following types of your personal information through the following methods:

 

When using Helith Technology Services, you may need to proactively submit to us or authorize us to collect and use your personal information, including the following two types:

 

1. Personal information necessary to achieve the basic business functions of providing Helith Technology services to you. If you refuse to provide the corresponding personal information, you will not be able to use Helith Technology services normally.

 

2. Personal information necessary to achieve additional business functions of providing Helith Technology services to you. If you refuse to provide this information, you may not be able to use the related additional business functions or achieve the intended functionality that we aim for. However, this will not affect your normal use of the basic business functions of Helith Technology services.

 

Please note:

 

1. As we offer a variety of products and services with diverse functionalities, and different users choose specific services that differ, there will be differences in the respective basic/additional functions, types of collected and used personal information, etc. Please refer to the specific service functionalities for accurate details.

 

2. If the information you submit to us or collected through our services contains personal information of others, you must ensure that you have legally obtained authorization from the relevant individuals. In particular, if the aforementioned personal information involves the personal information of children, you must first obtain the consent of the corresponding guardian of the child.

 

(2) We collect the following types of your personal information for the following purposes:

 

1. Registration and Login

 

To register and log in to Helith Technology services, you need to provide your basic registration or login information, such as your phone number, email address, verification code matching result, and create your account, username, and password. If you only need to use basic functions like searching or browsing, you do not need to register, log in, or provide the aforementioned information.

 

2. Recruitment Services

 

For managing and processing your job applications, advancing the recruitment process, and providing recruitment-related services, we collect and use the personal information you proactively provide or generated during the recruitment process. This includes basic information (such as real name, ID number, phone number, email address), educational background (such as school attended, degree, major, enrollment date, graduation date, completion date), work experience (such as previous employers, positions, start date, end date, reporting relationships, salary level, and other work-related information), other application materials (such as personal information voluntarily provided in job application forms or resumes), and other information collected or generated during the recruitment process (such as information provided by third-party recruitment websites or headhunters).

 

Please note that, to verify the authenticity of the aforementioned information, with your consent and within the scope permitted by laws and regulations, we may engage third-party companies to conduct background checks.

 

To fulfill legal obligations (e.g., tax, labor and social security, health, disease control, public security, market supervision, emergency management, immigration management, and other obligations as stipulated by laws and regulations), we may collect and use your basic information, contact details, and other necessary application materials.

 

To comply with the company's financial legal obligations, internal and external audit requirements, conduct cost/budget analysis and control, we may collect and use your basic information, contact details, the position you applied for, and other information collected or generated during the recruitment process.

 

For providing you with a convenient job application experience and complying with legal obligations related to fair employment and the protection of disabled individuals, with your consent, we may collect and use medical health-related information related to your physical or mental health to provide additional support. The aforementioned information falls under sensitive personal information, so please provide it cautiously.

 

3. Surveys or Follow-up Services

 

To improve our services, we conduct surveys or follow-ups with you. We may send questionnaires to you via email, phone, web-based surveys, etc., to gather your opinions or suggestions. For this purpose, you may need to provide your personal information such as name, phone number, company name.

 

4. Query Services

 

In some query services, we may collect your phone number and verification code matching results to provide you with the corresponding query results, which will be displayed on the relevant functional pages for you.

 

5. Customer Service or Other User Response Functions

 

We provide customer service for product and service consultation, usage support, pre-sales, and after-sales service through various means such as phone, email, online systems, etc. To better meet your needs, we may require your name, phone number, address, project name, company/organization name, verification code matching results, and project amount. For ease of contact, quick assistance in problem-solving, or recording related problem resolutions and outcomes, we may need necessary personal information to match and verify your user identity. Additionally, we may collect and store, in accordance with this Policy, communication/call records and related content between us (including account information, your contact information, feedback on issues, or suggestions).

 

6. Reporting Rights Abuse

 

Through our reporting channels, you can report counterfeit clues you've identified to us. To facilitate communication with you, verify the issues and content you report, we may require your name, contact information, and the details of the clues you report.

 

7. Security and Operations Services

 

To ensure your normal use of Helith Technology services, maintain the proper functioning of our services, improve and optimize our service experience, and safeguard your account security, we may collect relevant information generated during your use of Helith Technology services, including:

 

(1) When you use Helith Technology services, based on the specific permissions granted during your usage, we receive and record device information used to access Helith Technology services, such as your computer hardware model and operating system version. Please note, these are basic information necessary for us to provide services and ensure the normal operation of products.

 

(2) To better understand the operation of Helith Technology services, ensure their safe operation, we record network log information, frequency of service usage, crash data, error or abnormal service data, and the system operating status of devices experiencing anomalies.

 

8. Information Display and Push Notifications for Providing Services or Activities to You

 

Based on the information you provide to us, information we may collect, and information indirectly collected (such as browsing and search records, device information, location information), we may use a combination of the aforementioned to carry out recommendation algorithm modeling, programmatic advertising recommendation algorithm modeling, user behavior analysis, and user profiling. This is done to extract your browsing preferences, search habits, behavioral patterns, and location-related features, to provide you with more fitting page displays and personalized content recommendations. We may also send marketing information, event information, and user surveys to you via email, SMS, or other means based on characteristic tags, to aid us in improving services, as well as providing or promoting our services.

 

If you wish to manage our personalized services, you can follow the guidelines provided by the individual services you use for operation.

 

9. Participation in Activities

 

Periodically, we may organize short-term or long-term activities on this website (specific details will be provided on the actual activity pages). When you voluntarily choose to participate in these activities, you may need to provide us with your personal information. Specific personal information required will be displayed on the actual activity pages. The protection, retention, entrusted processing, sharing, transfer, and disclosure of this personal information will be handled in accordance with the provisions of this Privacy Policy.

 

10. Exceptions to Obtaining Authorized Consent

 

According to relevant laws and regulations, the collection of your information in the following situations does not require obtaining your authorized consent:

 

(1) Related directly to national security and national defense security.

 

(2) Directly related to public safety, public health, and significant public interests.

 

(3) Directly related to criminal investigation, prosecution, trial, and execution of judgments.

 

(4) Necessary to protect your or other individuals' vital legal interests such as life, property, etc., but it is difficult to obtain your consent.

 

(5) The collected personal information is voluntarily disclosed by you to the public.

 

(6) Necessary for signing and fulfilling contracts at your request.

 

(7) Collecting personal information from legally publicly disclosed information, such as legal news reports, government information disclosures, etc.

 

(8) Necessary for conducting legitimate news reporting.

 

(9) Other circumstances stipulated by laws and regulations.

 

11. Notification Regarding Sensitive Personal Information

 

Sensitive personal information refers to personal information that, once disclosed or illegally used, may lead to infringement of an individual's dignity, or pose risks to personal safety, property, etc. Among the information provided by you or collected by us, there may be your sensitive personal information, such as ID numbers, bank account numbers, communication records and content, property information, transaction information. Please be cautious and mindful of sensitive personal information. You agree that we may handle your sensitive personal information according to the purposes and methods outlined in this policy.

 

二、How We Use Your Personal Information

 

(1) We will use your personal information according to the following rules:

 

1. We will use your personal information in accordance with the provisions of this Policy to achieve the corresponding product and/or service functionalities.

 

2. We may integrate your personal information and/or "other information" obtained lawfully, related to your service or product usage behavior, to prevent, detect, investigate fraud, infringement, harm to security, or illegal actions that violate agreements between us or our affiliated companies.

 

3. We may process your personal information or combine it with other information for the purposes of maintaining, improving, and optimizing our products and/or services and enhancing user experience.

 

4. When you access third-party services through Helith Technology services, we will share your personal information within the scope of your authorization with the third-party service providers.

 

5. Other purposes permitted by your consent.

 

(2) Please note that all personal information provided by you or authorized by you for collection while using Helith Technology services will continue to be authorized for our use unless you delete, refuse collection through account settings, or system settings. When you deactivate your account, we will cease using, delete, or anonymize your personal information, except as otherwise stipulated by laws and regulations.

 

(3) When displaying your personal information or the information you provide, we will use methods such as content substitution or anonymization to desensitize your information to protect its security.

 

(4) Please understand that the features and services we provide are continually updated and developed. If new features or services require the collection and use of your personal information, we will inform you separately through page prompts, interactive processes, website notices, etc., regarding the types, scope, purposes, and usage rules of information collection, and obtain your explicit consent.

 

(5) We specifically remind you that if the information cannot identify your personal identity either individually or in combination with other information, it does not belong to your personal information in a legal sense. However, when your information, either independently or in conjunction with other information, can identify your personal identity, or when we combine data that cannot be linked to any specific personal information with other of your personal information, during the combined use, these information will be treated and protected as your personal information in accordance with this Policy.

 

三、How We Use Cookies and Similar Technologies

 

(1) Cookies

 

1. Cookies are a mechanism supporting the storage and retrieval of information by the server (or script) on a website or client-side. When you use Helith Technology services, we send one or more small data files called Cookies to your computer or mobile device. The specific Cookie assigned to you is unique and can only be read by the web server in the domain that issued the Cookie to you. Cookies usually contain identifiers, site names, numbers, and characters. We use Cookie technology to simplify your repetitive login steps, help determine your login status, and enhance account or data security.

 

2. We commit to using Cookie information solely for the purpose of enhancing service/product quality and optimizing user experience. We will not use Cookies for any purposes other than those described in this Policy. You can manage or delete Cookies according to your preferences. For more details, please refer to AboutCookies.org. You can clear all Cookies saved on your computer. Most web browsers automatically accept cookies, but you can usually modify your browser settings to refuse Cookies according to your needs. Additionally, you can clear all Cookies saved within the software. However, doing so might require you to manually change user settings each time you visit Helith Technology services, and the relevant information previously recorded might be deleted. It might also affect the security of the services you use.

 

(2) Website Beacons and Pixel Tags

 

Apart from Cookies, we might also use other similar technologies such as website beacons and pixel tags on the website. For instance, the emails we send you might contain URLs linking to our website content. If you click on these links, we track these clicks to help understand your preferences for products or services and improve customer service. Website beacons are usually transparent images embedded in websites or emails. By using pixel tags in emails, we can determine whether the email has been opened. If you do not wish to be tracked in this manner, you can unsubscribe from our mailing list at any time.

 

四、How We Protect and Retain Your Personal Information

 

(1) Storage and Protection of Your Personal Information

 

1. In accordance with legal requirements, we store user information collected within China. If we are involved in the transfer of your personal information outside China, we will inform you explicitly and obtain your consent.

 

2. During your use of Helith Technology services, we continuously retain your personal information. If you deactivate your account or voluntarily delete personal information, we will delete or anonymize your personal information, except as otherwise stipulated by laws and regulations.

 

3. To prevent unauthorized access, copying, modification, transmission, loss, destruction, processing, or use of your personal information, we have and will continue to take measures to protect your personal information, including but not limited to:

 

- Our network services use encryption technologies such as transport layer security protocols to provide secure transmission services like HTTPS, ensuring the security of user data during transmission.

 

- Encryption technology is applied to encrypt and isolate user information when deemed necessary.

 

- Various data desensitization techniques such as content replacement and encrypted desensitization are employed when using personal information, enhancing its security.

 

- Strict data access and control systems, along with multi-factor authentication, are established to protect user information. Only authorized personnel can access user information and are obliged to maintain confidentiality.

 

- When sharing your personal information with third parties, our network services use encryption technologies such as transport layer security protocols. HTTPS is utilized to provide secure transmission services to ensure the security of user data during transmission.

 

4. Please ensure the security of your account and password. Your account and password are used to identify your identity when using our services. If you disclose this information, you may suffer losses and disadvantages. If you suspect or have found that your account, password, or other identity elements have been compromised, please contact us immediately so that we can take appropriate measures to prevent or reduce related losses.

 

(2) Risks Faced

 

1. Despite implementing the aforementioned reasonable and effective measures, and adhering to the required standards of relevant laws, we cannot guarantee the security of your personal information when communicated through insecure channels. Therefore, you should take active measures to ensure the security of your personal information, such as setting complex passwords, regularly changing account passwords, and not disclosing personal information such as your account password to others.

 

2. Various risks of information leakage persist in the network environment. In case of unforeseen incidents or force majeure leading to information leakage, we will make efforts to control the situation, inform you promptly of the cause of the incident, the security measures taken by us, and the security measures you can take proactively. However, we are not liable for losses caused by unforeseen incidents or force majeure, and you understand and agree to this.

 

3. In the event of an information security incident, we will promptly notify you in accordance with legal requirements: the basic situation of the security incident and its potential impact, the measures taken or to be taken, suggestions for self-prevention and risk reduction, and remedial measures for you. We will inform you of the incident through email, letters, phone calls, push notifications, etc., and if it's difficult to inform each data subject individually, we will announce the incident in a reasonable and effective manner. Additionally, we will report to the competent authorities in accordance with legal requirements.

 

五、How We Entrust, Share, Transfer, and Publicly Disclose Your Personal Information

 

(1) Entrustment and Sharing

 

1. To improve information processing efficiency, reduce processing costs, or enhance processing accuracy, we might delegate competent affiliated companies or other professional institutions to process information on our behalf. We require the entrusted companies to comply with strict confidentiality obligations through written agreements, on-site audits, etc., and prohibit them from using this information for unauthorized purposes. Upon the termination of the entrusted relationship, we demand the immediate deletion of your personal information.

 

2. To enable you to use our services, our services might integrate SDKs or similar applications from authorized partners. We strictly monitor the security of application programming interfaces (APIs) and software development kits (SDKs) used by authorized partners to access relevant information. We have agreements with these partners to implement strict data protection measures and handle personal information in accordance with our entrusted purpose, service descriptions, and this privacy policy.

 

3. We do not share your personal information with third parties, except in the following cases:

 

- With your explicit authorization or consent, within the scope of your authorization.

 

- When required by laws and regulations, litigation, dispute resolution, or according to requests from administrative or judicial authorities.

 

- In cases of intellectual property infringement complaints, providing necessary information to complainants to handle the complaints.

 

- Sharing with authorized partners: We may commission authorized partners to provide services for you or act on our behalf, including providing infrastructure technical services and data processing services for our services. For instance, sharing necessary information with an identity verification service provider or an electronic signature provider. We only share your personal information for legitimate, necessary, specific, and explicit purposes stated in this policy. Authorized partners only access information necessary to fulfill their duties and cannot use this information for any other purpose. Companies, organizations, and individuals entrusted with handling personal information will sign strict confidentiality agreements with us and are required to handle personal information according to our requirements, this privacy policy, and any other related confidentiality and security measures.

 

4. Additionally, our products/services may access services provided by third parties. When using these third-party services, the third party may collect and use your personal information for providing the service. Therefore, we advise you to carefully read the terms and policies provided by the third party before using these services.

 

5. It's important to note that third-party service providers can offer products or services to you through terminals. You have the choice to use or terminate/cancel the use of third-party services. During usage, third-party service providers may collect, use, and store your relevant data or information. Before deciding whether to use such services, please fully understand the personal information and privacy protection policies of the third-party service provider or contact your enterprise/organizational user for more information.

 

(2) Transfer

 

We will not transfer your personal information to any company, organization, or individual unless under the following circumstances:

 

1. With your explicit consent.

 

2. In the event of a merger, acquisition, or bankruptcy liquidation where the transfer of personal information is involved, we will request the new entity holding your personal information to continue to be bound by this privacy policy. Otherwise, we will ask the company or organization to seek your authorization again.

 

(3) Public Disclosure

 

1. We will only disclose your personal information under the following circumstances:

 

- With your explicit consent or based on your active choices, we may disclose your personal information.

 

- Legal disclosure: In cases where legal procedures, litigation, or mandatory requirements from government authorities compel us to disclose your personal information.

 

- For the enforcement of relevant service agreements or this privacy policy, to safeguard social public interests, handle complaints/disputes, protect the personal and property safety or legitimate rights and interests of our customers, us, our affiliated companies, other users, or employees when reasonably necessary.

 

2. If we disclose your personal information for the above reasons, we will promptly inform you while complying with relevant laws, regulations, and this policy.

 

(4) Exceptions for Obtaining Prior Authorization for Sharing, Transfer, and Public Disclosure of Personal Information

According to relevant laws, regulations, and national standards, there are circumstances where we may share, transfer, or publicly disclose

personal information without obtaining prior authorization from the data subject:

 

1. Related to our fulfillment of legal obligations.

 

2. Directly related to national security or defense.

 

3. Directly related to public safety, public health, or major public interests.

 

4. Directly related to criminal investigations, prosecutions, trials, and execution of judgments.

 

5. For the protection of the vital interests of the data subject or other individuals where it is difficult to obtain the individual's consent.

 

6. Personal information voluntarily disclosed to the public by the data subject.

 

7. Collecting personal information from legally publicly disclosed information sources such as lawful news reports or government information disclosures.

 

Moreover, according to the aforementioned regulations, providing de-identified personal information to external parties where the data recipient cannot reconstruct or reidentify the data subjects will not require separate notification or obtainment of your consent.

 

六、How do you access and manage your personal information

 

In accordance with the relevant laws, regulations and standards of China, as well as the common practices of other countries and regions, we guarantee that you can exercise the following rights to the personal information you provide:

 

(1) Access to or correct the personal information you provide

 

1. You have the right to access and update some of your personal information. In general, you can view or update your registration information on the "Personal Center" or similar page, and view or update your device information on the Resource Center page. You agree that before you do so, we may ask you to verify your identity to ensure the security of your information.

 

2. In addition to the personal information listed above, we are unable to provide you with access to and correction of some of your personal information, which is mainly your device information collected to improve your user experience and ensure the security of transactions, and personal information necessary to ensure the normal operation of the business functions you choose. The above information will be used within the scope of your authorization, you cannot access and correct, but you can contact us to delete or anonymize.

 

(2) Delete your personal information

 

1. Some of your personal information can be directly deleted by you, depending on the actual display of the service page.

 

2, in the following circumstances, you can make a request to us to delete personal information:

 

- If we process personal information in violation of laws and regulations;

 

- If we collect and use your personal information without your consent;

 

- If our processing of personal information violates our agreement with you;

 

- If your account is cancelled or withdrawn;

 

 

- If we terminate our services and operations.

 

3. If we decide to comply with your deletion request, we will also notify the entities from which we obtained your personal information, requesting

them to promptly delete it unless otherwise provided by laws and regulations or these entities have obtained your independent authorization.

 

4. After you or we assist you in deleting relevant information, due to applicable laws and security technologies, we may not immediately delete corresponding personal information from the backup system. However, we will delete this information when the backup is updated or within a reasonable time.

 

(3) Changing the Scope of Your Authorized Consent or Withdrawing Your Authorization

 

1. You can change the scope of our authorization to continue collecting personal information by deleting personal information, disabling device or service features, or adjusting privacy settings on the Helith Technology Service website. You can also withdraw all authorizations for us to continue collecting your personal information by canceling your account.

 

2. Please understand that each business function requires some of your personal information to operate. When you withdraw consent or authorization, we cannot continue to provide the corresponding services or process the related personal information. However, the decision to withdraw consent or authorization will not affect the processing carried out based on your previous authorization.

 

3. While using Helith Technology services, you may receive system message notifications, etc. You can enable or disable permissions for receiving push notifications at any time.

 

(4) Account Cancellation

 

Helith Technology provides a channel for you to cancel your account. Specific cancellation paths and procedures are subject to announcements on relevant pages of single services or other separate requirements by Helith Technology. Once your account is canceled, it cannot be recovered, so please proceed with caution. After you voluntarily cancel your account, we will stop providing you with the product or service and, in accordance with applicable laws, delete the personal information you provided or anonymize it, except as otherwise provided by laws and regulations, etc.

 

(5) Obtaining a Copy of Personal Information

 

If you need a copy of your personal information, you can contact us through the feedback channels listed in the "How to Contact Us" section of this policy. After verifying your identity, we will provide you with a copy of your personal information in our service (including basic information and identity information), except as otherwise provided by laws and regulations or stipulated in this policy.

 

(6) Responding to Your Requests

 

1. If you are unable to access, correct, or delete your personal information through the above methods, or if you need to access, correct, or delete other information generated when using our products and/or services, or if you believe that we have violated any laws, regulations, or agreements with you regarding the collection or use of information, you can contact us through the feedback channels listed in the "How to Contact Us" section of this policy. For security reasons, we may require you to provide a written request or prove your identity in other ways.

 

2. For your reasonable requests, we generally do not charge fees. However, for repeated requests beyond a reasonable limit, we may charge a certain cost depending on the situation. Requests that are needlessly repetitive, require excessive technical means (for example, requiring the development of a new system or fundamentally changing current practices), pose risks to others' legal rights, or are highly impractical (for example, involving information stored on backup tapes) may be rejected.

 

3. According to legal requirements, we will be unable to respond to your requests in the following circumstances:

 

- Related to national security or national defense security.

 

- Related to public security, public health, or significant public interests.

 

- Related to criminal investigation, prosecution, trial, and execution of judgments.

 

- Substantial evidence indicates that you have subjective malice or abuse your rights.

 

- Responding to your request would cause serious damage to your or others' legitimate rights and interests.

 

- Involving trade secrets.

 

七、How we Handle Personal Information of Minors

 

1. Our services are primarily intended for adults. Minors should not create their own personal information subject accounts without the consent of parents or guardians. If you are a minor, we require you to have your parents or guardians read this policy and use our services or provide information to us with their consent.

 

2. For cases where personal information of minors is collected with the consent of parents or guardians, we will only use or disclose this information when permitted by law, explicitly agreed upon by parents or guardians, or when necessary to protect the interests of minors.

 

3. If we discover that we have collected personal information of minors without obtaining formal consent from parents or guardians beforehand, we will endeavor to delete the relevant information as soon as possible.

 

八、How This Policy is Updated

 

1. We will update this policy in a timely manner under the following significant circumstances:

 

- Significant changes in our situation, such as changes in ownership due to mergers, acquisitions, or restructuring.

 

- Changes in the scope, purpose, or rules for collecting, storing, and using personal information.

 

- Changes in the objects, scope, or purposes of providing personal information to external parties.

 

- Changes in the ways you access and manage personal information.

 

- Changes in data security capabilities or information security risks.

 

- Changes in channels and mechanisms for user inquiries, complaints, external dispute resolution organizations, and contact information.

 

- Other significant changes that may impact your rights to personal information.

 

2. If this policy is updated, we will notify you through push notifications, pop-up prompts, sending emails/text messages, or by posting announcements on our official website. To ensure you receive notifications promptly, we recommend that you inform us of any changes to your contact information. By continuing to use Helith Technology services after the effective date of the updated policy, it indicates that you have fully read, understood, and accepted the updated policy and are willing to be bound by it.

 

九、 How to Contact Us

 

If you have any questions, concerns, or suggestions regarding this Privacy Policy, you can contact us using the following information:

 

Helith Technology (Guangzhou) Co., Ltd.

 

Email: helith@greatpower.net

 

Normally, we will respond within fifteen working days after receiving your relevant information and verifying your identity.


【Appendix】

 

The concepts and terms referred to in this policy shall be interpreted as follows:

 

1. Personal Information: Personal information refers to various information recorded by electronic or other means that is related to identified or identifiable natural persons, excluding information processed anonymously.

 

2. Sensitive Personal Information: Sensitive personal information refers to personal information that, once leaked or illegally used, may easily lead to infringement of an individual's dignity, personal safety, or property security. This includes biometric data, religious beliefs, specific identities, medical and health data, financial accounts, location tracking, and personal information of individuals under the age of 14.

 

3. Children: Refers to individuals under the age of 14.

 

4. De-identification: De-identification is a technical process applied to personal information to render it unidentifiable to the individual without the use of additional information.

 

5. Anonymization: Anonymization is the process of rendering personal information unidentifiable to specific natural persons and irreversible after processing.

 

6. Deletion: Deletion refers to the action of removing personal information from systems involved in daily business functions to render it inaccessible and irretrievable.

 

7. SDK: Also known as Software Development Kit, it is a collection of specific software packages, software frameworks, hardware platforms, operating systems, etc., used as development tools for creating application software.

 

Send your inquiry directly to us

Privacy Policy China Good Quality LiFePO4 Solar Battery Supplier. Copyright © 2023-2024 lifepo4-solarbattery.com . All Rights Reserved.