Privacy

Privacy

This policy applies only to the products or services of SHENZHEN CENTER POWER TECH CO.LTD

Last updated: 2022-3-31

This policy will help you understand the following.

I. How we collect and use your user information

II. How we use cookies and similar technologies

How we share, transfer and publicly disclose your User Information

IV. How we protect your user information

V. Your rights

How your user information is stored and transferred globally

How this policy is updated

How to contact us

We understand how important your information is to you and we make every effort to keep your user information safe and secure. We are committed to maintaining your trust in us and protecting your user information by adhering to the following principles: consistency of rights and responsibilities, clarity of purpose, choice of consent, minimum sufficiency, security, subject involvement and transparency. At the same time, we promise that we will take appropriate security measures to protect your user information in accordance with proven industry security standards.

Please read and understand this privacy policy carefully before using our products (or services).

I. How we collect and use your user information

(a) Information we collect and use in the course of your use of our products or services

We will only collect and use your user information for the purposes of the business functions described in this policy, for the purpose of providing you with products or services, and you have the right to choose whether or not to provide this information, but in most cases, if you do not provide it, we may not be able to provide you with the appropriate services or respond to problems you encounter.

When you use our services, we are permitted to collect information that you provide to us yourself or that is necessary to provide you with the service including: mobile phone number, email address, basic identification information (including name, nationality, gender, occupation, address, contact details), etc.

The information we collect from you will be used for the purposes of providing you with quotations, after sales, technical communication, identity verification and other functions.

We ensure that the collected user information will be de-identified or anonymised in accordance with the law, and that information that cannot be used to identify a natural person individually or in combination with other information is not considered personal information in the legal sense. If we combine non-personal information with other information to identify you personally, or use it in combination with your personal information, we will treat and protect such information as your personal information in accordance with this Privacy Policy for the duration of the combined use.

When we collect, use, or process more information about you than is necessary to operate and improve our technology and services, or in response to changes in business strategy, or to use the information collected for purposes other than those set out in this Privacy Policy, or when we use information collected for a specific purpose for other purposes, we will, within a reasonable period of time after we obtain the information or before we process the information. We will notify you and obtain your authorised consent within a reasonable period of time after we have obtained the user information or before we process the user information.

(ii) Exceptions to obtaining authorised consent

Please understand that, in accordance with laws and regulations and relevant national standards, we do not require your authorised consent to collect and use your User Information in the following circumstances.

1. directly related to national security or defence security

2. directly related to public safety, public health or significant public interest

3. directly related to crime investigation, prosecution, trial and execution of judgments, etc.

4. for the purpose of safeguarding your or other individuals' life, property and other significant legitimate rights and interests but where it is difficult to obtain your consent

5、The information collected about you as a user is disclosed by you to the public at your own discretion

6, your user information collected from legitimate public disclosures, such as legitimate news reports, government information disclosure and other channels.

7. necessary for the conclusion or performance of a contract at your request

8. necessary for the maintenance of the safe and stable operation of the software and related services, such as the discovery and disposal of faults in the software and related services.

9. necessary for the controller of personal information to be a news organization and for it to carry out legitimate news reporting.

10、 Where it is necessary for an academic research institution to carry out statistical or academic research in the public interest and where the results of the academic research or description are provided to the public, and where the personal information contained in the results is de-identified.

11、Other cases stipulated by laws and regulations.

II. How we use cookies and similar technologies

(i) Cookies

Cookies are small data files called cookies that are stored on your computer or mobile device to ensure that the website works properly. cookies usually contain an identifier, the name of the site and some numbers and characters. Cookies enable websites to store data about your access preferences.

We do not use cookies for any purpose other than those described in this policy. You can clear all cookies stored on your computer and most web browsers have the ability to block cookies. However, if you do so, you will need to change your user settings yourself each time you visit our website.

(ii) Web beacons and pixel tags

In addition to cookies, we use other similar technologies such as web beacons and pixel tags on our website. For example, the email we send you may contain a clickable URL that links to content on our website.

If you click on that link, we track that click to help us understand your product or service preferences and improve customer service. A web beacon is usually a transparent image that is embedded in a website or email. With the help of pixel tags in the email, we can tell if the email has been opened. If you do not want your activity to be tracked in this way, you can unsubscribe from our mailing list at any time.

(iii) Do Not Track

Many web browsers have a Do Not Track feature, which issues Do Not Track requests to websites. Currently, the major Internet standards organisations have not established policies that govern how websites should respond to such requests. However, if your browser has Do Not Track enabled, then all of our websites will respect your choice.

How we share, transfer and publicly disclose your user information

(i) Sharing

We will not share your user information with any other companies, organisations or individuals, except for the following.

1. Sharing with explicit consent: We will share your user information with other parties after obtaining your explicit consent.

2. We may share your user information with external parties in accordance with laws and regulations or in accordance with mandatory requirements of government authorities.

3. Sharing with our affiliated companies: Your User Information may be shared with our affiliated companies. We will only share as much User Information as is necessary and subject to the purposes stated in this Privacy Policy. If an affiliate wishes to change the purposes for which user information is processed, your authorised consent will be sought again.

4. Sharing with Authorised Partners: Some of our services will be provided by authorised partners for the sole purpose of achieving the stated purposes in this policy. We may share some of your User Information with our partners in order to provide better customer service and user experience. We will only share your User Information for purposes that are legal, legitimate, necessary, specific, and explicit, and only as much User Information as is necessary to provide the Services. In order to better operate and improve our technology and services, you agree that we and our authorised partners may use the information collected for other services and purposes, subject to applicable laws and regulations.

We will enter into strict confidentiality agreements with companies, organisations and individuals with whom we share user information, requiring them to handle user information in accordance with our instructions, this Privacy Policy and any other relevant confidentiality and security measures.

(ii) Transfers

We will not transfer your user information to any company, organisation or individual except.

1. transfer with express consent: we will transfer your user information to other parties after obtaining your express consent.

2. in the event of a merger, acquisition or bankruptcy and liquidation involving the transfer of user information, we will then require the new company or organisation holding your user information to continue to be bound by this privacy policy, or we will require that company or organisation to seek authorised consent from you again.

(iii) Public Disclosure

We will only disclose your user information publicly if

1. with your express consent.

2、Disclosure based on law: we may disclose your user information publicly if compelled to do so by law, legal process, litigation or government authorities.

(iv) Exceptions to prior authorised consent for sharing, transferring or publicly disclosing information

Please understand that, in accordance with laws and regulations and relevant national standards, we do not need to obtain your authorised consent to share, transfer or publicly disclose your user information in the following circumstances.

1. directly related to national security or defence security

2. directly related to public safety, public health, or significant public interest

3. directly related to crime investigation, prosecution, trial and execution of judgments, etc.

4. for the purpose of safeguarding your or other individuals' life, property and other significant legitimate rights and interests but where it is difficult to obtain your consent

5、Information that you disclose to the public on your own

6、Collected from legitimate public disclosure, such as legitimate news reports, government information disclosure and other channels.

IV. How we protect your user information

(a) We have used security measures in line with industry standards to protect the user information you provide against unauthorised access, public disclosure, use, modification, damage or loss of data. We will take all reasonably practicable steps to protect your User Information. For example, the exchange of data between your browser and the Service is protected by SSL encryption; we also provide https secure browsing of our website; we use encryption to ensure the confidentiality of data; we use trusted protection mechanisms to prevent malicious attacks on data; we deploy access control mechanisms to ensure that only authorised personnel have access to user information. We will deploy access control mechanisms to ensure that only authorised personnel have access to user information; and we will conduct security and privacy training courses to enhance staff awareness of the importance of protecting user information.

(b) We will take all reasonably practicable steps to ensure that no unrelated user information is collected. We will only retain your User Information for as long as is necessary to achieve the purposes described in this policy, unless an extended retention period is required or permitted by law.

(c) The Internet environment is not 100% secure and we will endeavour to ensure the security of any information you send us. Even if we make great efforts and take all reasonable and necessary measures, it may not be possible to prevent your User Information from being illegally accessed, illegally stolen, illegally altered or destroyed, resulting in damage to your legitimate rights and interests, please understand the above-mentioned risks of information networks and voluntarily assume them.

(d) After the unfortunate occurrence of a user information security incident, we will, in accordance with the requirements of laws and regulations, promptly inform you of: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, the suggestions you can independently prevent and reduce the risk, the remedial measures for you, etc. We will promptly inform you of the situation related to the incident by email, letter, telephone, push notification, etc. When it is difficult to inform the user information subject by subject, we will take reasonable and effective ways to publish the announcement. At the same time, we will also take the initiative to report the disposal of user information security incidents in accordance with the requirements of the regulatory authorities.

V. Your rights

In accordance with the relevant Chinese laws, regulations and standards, as well as the common practices of other countries and regions, we protect your right to exercise the following rights in relation to your user information.

(i) Access to your user information

You have the right to access your User Information, subject to any exceptions provided by law or regulation.

(ii) Correction of your User Information

You have the right to request that we correct any User Information we have processed about you if you find it to be incorrect.

(iii) Deletion of your user information

You may make a request to us to delete your user information in the following circumstances.

1. if our processing of user information violates laws and regulations

2、If we collect or use your User Information without your consent.

3. if our handling of user information violates our agreement with you.

4. if you no longer use our products or services, or if you cancel your account.

5. if we no longer provide products or services to you.

We will assess your request for deletion and will take the appropriate steps to process it if the appropriate regulations are met. When you make a deletion request to us, we may ask you to verify your identity in order to safeguard your account. When you delete information from our services, due to applicable laws and security technology, we may not immediately delete the corresponding information from our backup systems and we will store your information securely until the backup can be erased or anonymised.

(iv) Changing the scope of your authorised consent

Each business function requires some basic user information in order to be completed (see "Part I" of this policy). You may give or withdraw your consent to the collection and use of user information at any time. You can do this yourself by going to E-mail to sales@gwgosc.com.

Once you have withdrawn your consent, we will no longer process the relevant user information. Please also note that withdrawal of your consent may result in certain consequences, for example, we may not be able to continue to provide you with the relevant services or certain features, but your decision to withdraw your consent will not affect the processing of User Information previously carried out on the basis of your authorisation.

VI. How your user information is stored and how it is transferred worldwide

In principle, User Information that we collect and generate in the People's Republic of China will be stored in the People's Republic of China. We will only retain your User Information for as long as is necessary for the purposes and uses described in this policy and for the minimum period required by law and regulation, beyond which we will delete or anonymise your User Information as required by applicable law and regulation. Unless otherwise required by law or regulation, or for purposes of public interest, scientific-historical research, etc., or if you have given your separate authorised consent, we may need to retain the relevant data for a longer period of time.

Because we provide our products or services through resources and servers located around the world, this means that, with your authorised consent, your user information may be transferred to, or contacted from, jurisdictions outside the country in which you use the product or service.

Such jurisdictions may have different data protection laws or even no such laws. In such cases, we will ensure that your information is adequately protected to the same extent as it is in the People's Republic of China.

VII. How this policy is updated
Our privacy policy is subject to change. We will not reduce your rights under this Privacy Policy without your express consent. We will post any changes to this policy on this page.
We will also provide more prominent notice of material changes. Material changes within the meaning of this policy include, but are not limited to.
1. a material change to our service model. such as the purposes for which user information is processed, the types of user information processed, how user information is used, etc.
2. significant changes in our ownership structure, organisational structure, etc. such as change of ownership caused by business restructuring, bankruptcy and merger, etc.
3. changes in the main recipients of user information sharing, transfer or public disclosure.
4. significant changes in your rights to participate in the processing of user information and the manner in which they are exercised.
5、When there is a change in the department responsible for handling user information security, our contact method and complaint channels
6、When the user information security impact assessment report indicates that there is a high risk.
We will also keep an older version of this policy on file for your review.

VIII. How to contact us
If you have any questions, comments or suggestions about this privacy policy, contact us by
Email: sales@gwgosc.com
Telephone: +86-0755-66851118
Fax: +86-0755-66850678
In general, we will reply within thirty days.
If you are not satisfied with our response, especially if our user information processing behaviour has damaged your legitimate rights and interests, you can also seek a solution through the following external channels: jiangzelong@gwgosc.com