Privacy Policy
--: Version 【2022】【05】
Important Notice:
Before using the company's various products or services, please be sure to read and thoroughly understand this policy. Use the company's related products or services only after confirming that you fully understand and agree to this policy. Once you start using the company's various products or services or actively provide personal information to the company, it indicates that you have fully understood and agreed to this policy.
Introduction
To protect your privacy rights, the company has formulated this "Privacy Policy" (hereinafter referred to as "this policy") based on the "Cybersecurity Law of the People's Republic of China," the "Personal Information Protection Law of the People's Republic of China," the "Data Security Law of the People's Republic of China," and other relevant laws and regulations, and with reference to the "Information Security Technology Personal Information Security Specification" (GB/T 35273-2020), as well as other relevant laws and regulations. This policy will explain in detail how the company collects, stores, protects, uses, and provides your personal information to third parties, and explain the rights you have. This policy applies to various products and/or services provided by the company through computer devices, mobile terminals, or other devices and programs, as well as scenarios where your personal information is collected through other channels based on business needs.
This policy applies to various products of 【SINGDATA CLOUD PTE. LTD.】. The aforementioned products and/or services are only applicable to adult users over the age of 18 representing enterprises or other organizations. We do not collect personal information from minors under the age of 18, nor do we provide products and/or services to them. If the company mistakenly collects information from children under the age of 14 due to special circumstances, we will immediately handle it in accordance with the "Children's Privacy Protection Statement."
The company understands the importance of personal information to you and will do its utmost to protect the security and reliability of your personal information. The company is committed to maintaining your trust in us, adhering to the following principles to protect your personal information: the principle of consistency of rights and responsibilities, the principle of clear purpose, the principle of choice and consent, the principle of minimum necessity, the principle of ensuring security, the principle of subject participation, the principle of openness and transparency, etc. At the same time, the company promises to take corresponding security protection measures to protect your personal information in accordance with mature security standards in the industry.
Chapter 1 Definitions
Company: Refers to 【SINGDATA CLOUD PTE. LTD.】 and any entities that may be newly established by the company in the future.
User or You: Refers to users who are authorized by enterprises or other organizations to apply for registration to become users of products and/or services. Enterprise/organization users include but are not limited to legal persons, government agencies, other organizations, partnerships, or individual businesses, etc.
Products and/or Services: Refers to the products of 【SINGDATA CLOUD PTE. LTD.】 and other products, as detailed on the official website product description.
Personal Information: Refers to various information recorded electronically or otherwise that can identify a specific natural person alone or in combination with other information, or reflect the activities of a specific natural person, such as name, date of birth, identification number, personal biometric information, address, contact information, communication records and content, account passwords, property information, credit information, travel trajectories, accommodation information, health physiological information, transaction information, etc. For the avoidance of doubt, personal information includes but is not limited to personal sensitive information, but does not include anonymized information.
Personal Sensitive Information: Refers to personal information that, if leaked, illegally provided, or misused, may endanger personal and property safety, and is highly likely to lead to damage to personal reputation, physical and mental health, or discriminatory treatment. Personal sensitive information includes personal property information, personal health physiological information, personal biometric information, personal identification information, network identification information, etc.
De-identification: Refers to the process of technical processing of personal information so that it cannot be identified without the aid of additional information.
Anonymization: Refers to the process of technical processing of personal information so that the individual cannot be identified, and the processed information cannot be restored.
China or Within China: Refers to the People's Republic of China (for the purposes of this policy, excluding the Hong Kong Special Administrative Region, the Macao Special Administrative Region, and Taiwan).
Chapter 2 Personal Information Protection Policy
This policy will help you understand the following:
-
How the company collects and uses your personal information;
-
How the company uses cookies and similar technologies;
-
How the company entrusts processing, shares, transfers, and publicly discloses your personal information;
-
How the company protects your personal information;
-
Your rights;
-
How the company handles the personal information of minors;
-
How your personal information is transferred globally;
-
How this policy is updated;
-
How to contact the company;
-
Supplementary provisions.
1. How the company collects and uses your personal information
(1) Purpose of collecting information
When you use the company's products and/or services, we need/may need to collect and use your personal information, including the following two types:
-
To achieve the basic functions of providing you with the company's products and/or services, you must authorize the company to collect and use the necessary information. If you refuse to provide the corresponding information, you will not be able to use the company's products and/or services normally;
-
To achieve the additional functions of providing you with the company's products and/or services, you can choose to authorize the company to collect and use the information. If you refuse to provide it, you will not be able to use the related additional functions or achieve the intended functional effects of the company, but it will not affect your normal use of the basic functions of the products and/or services.
You understand and agree:
To provide you with a better product and service experience, the company is continuously working to improve our technology, and as a result, the company may introduce new or optimized functions from time to time, which may require the collection and use of new personal information or changes in the purpose or method of using personal information. In this regard, we will separately explain the purpose, scope, and method of using the corresponding information through updates to this policy, pop-ups, page prompts, etc., and provide you with a way to choose to agree, and collect and use it after obtaining your explicit consent. During this process, if you have any questions, opinions, or suggestions, you can contact the company through various means, and the company will respond to you as soon as possible. In order to provide you and your enterprise/organization users with products and/or services, maintain the normal operation of the services, improve and optimize our service experience, and ensure the security of your account, the company will collect the information you actively provide, authorize to provide, or provide based on the requirements of your enterprise/organization users when you register and use the products and/or services, as well as the information generated based on your use of the company's services for the following purposes and methods under this policy:
(2)Help You Become a Registered User
2.1 Register as an Enterprise/Organization User
To register as an enterprise/organization user, you need to provide your enterprise/organization name, a copy of your business license, and contact information to create an enterprise/organization account. Otherwise, you will not be able to use the services based on enterprise/organization management activities. After registering as an enterprise/organization user, you can further provide the location of the enterprise/organization, industry type, business information (different information may be involved based on different product needs, which can be handled according to the contract signed by both parties). If you need to obtain more rights, the enterprise/organization administrator user needs to submit specific information and materials on behalf of the enterprise/organization to complete the enterprise/organization certification, including a copy of the business license, enterprise/organization name, business address, legal representative's name, legal representative's ID number, and other basic information.
2.2 Appointment Consultation
You can apply to experience the company's products by clicking the "Appointment Consultation" button on the company's official website. You need to fill in your name, phone number, email address, and company name. After obtaining the information you filled in, the company's staff will contact you.
(3)Information Collected During the Use of Company Products and/or Services
When you use the services, to provide you with services that better meet your needs, interactive displays, search results, identify abnormal account status, maintain the normal operation of the services, improve and optimize your service experience, and ensure the security of your account, it is necessary to collect information about your use of the services and how you use them, and associate this information:
3.1 Usage Information
We will collect the information you submit or generate when using the services as a user.
3.2 Device Information
Based on the specific permissions you grant during software installation and use, we will receive and record the relevant information of the device you use (such as device model, operating system version, device settings, and other software and hardware characteristic information), and the location-related information of the device (such as IP address, GPS/Beidou location information, and sensor information that can provide relevant information such as Wi-Fi access points and base stations).
3.3 Log Information
When you use the products or services provided by our client or website, we will automatically collect detailed usage information of our services as network log storage. For example, your search query content, IP address, browser type, telecom operator, language used, access date and time, web page records you visited, and other operation log information.
Please note that separate device information, log information, etc., cannot identify specific natural persons.
If we combine such non-personal information with other information to identify specific natural persons, or use it in combination with personal information, then during the combined use period, such non-personal information may be regarded as personal information. Unless we obtain your authorization (enterprise/organization users' data control rights under this policy are regarded as your authorization) or otherwise stipulated by laws and regulations, we will not process it without your authorization, unless we anonymize or de-identify such personal information.
3.4 Information You Submit Through Our Customer Service or When Participating in Our Activities
For example, the survey questionnaires you fill out when participating in our activities (online or offline) may contain your name, phone number, home address, and other information. We will only use the information you provide for subsequent follow-up visits, research, and product recommendations.
3.5 User Business Data
3.5.1 The data processed, stored, uploaded, downloaded, distributed, and otherwise handled by enterprise/organization users through the services provided by the company are all your user business data, and you fully own your user business data. As a service provider, the company will strictly follow your instructions to process your business data and will not use or disclose your business data without authorization, except as agreed with you or as required by explicit legal regulations.
3.5.2 Enterprise/organization users are responsible for the source and content of your user business data. The company reminds you to carefully judge the legality of the data source and content. All consequences and responsibilities caused by the content of your user business data violating laws, regulations, departmental rules, or national policies shall be borne by you.
3.5.3 Before uploading personal information of the enterprise/organization, enterprise/organization users should obtain the explicit consent of individual users in advance and only collect the personal user information necessary to achieve the operation and management purposes of the enterprise/organization users, and ensure that individual users are fully informed of the purpose, scope, and method of data collection.
3.5.4 If enterprise/organization users need to integrate our SDK into the application, it is recommended that enterprise/organization users carefully read our SDK privacy statement and handle it accordingly based on our compliance recommendations.
3.5.5 You understand and agree that you are the controller of the data controlled by the above-mentioned enterprises, and we only process personal information according to the instructions of the enterprise/organization user administrator. The data controller will bear the results of the processing. At the same time, we have the right to refuse unreasonable requests you make based on personal information protection and compliance requirements.
3.6 Information You Provide to Us
During the use of the services, you can provide feedback on the experience of products, functions, applications, and services to help the company better understand your experience and needs in using the products or services, and improve the company's products or services. For this purpose, the company will record your contact information, feedback questions, or suggestions to further contact you for feedback on the company's handling opinions. If you need to activate certain products and/or service functions that require your enterprise/organization users to complete real-name authentication, you may need to submit enterprise documents such as the enterprise/organization user name and business license/organization code certificate. You may also need the administrator and legal representative's name, identity information, and mobile phone number. You understand and agree that you have obtained full authorization and consent before providing us with the aforementioned personal information of the enterprise/organization users and actual relevant personnel .And you hereby authorize and consent to the company verifying the authenticity of the real-name information you provided on the platform through a third party.
3.7 Information Provided to Us by Third Parties
We will collect information about you when other users perform operations related to you, and we may also obtain your personal data from affiliated companies, cooperating third parties, or through other legal means. For example, to complete your account registration, you agree that the operator will send a text message verification code based on your personal mobile phone number, otherwise, you will not be able to register an account.
3.8 Customer Service and Dispute Resolution
When you contact the company or submit a request for pre-sales, after-sales, or dispute resolution, to ensure the security of your account and system, the company needs you to provide necessary personal information to verify your user identity.
To facilitate contact with you, help you solve problems as soon as possible, or record the solutions and results of related issues, we may save your communication/call records and related content with the company (including account information, other information you provide to prove relevant facts, or contact information you leave).
For the reasonable needs of providing services, the company may also use other information you provide, including information provided when you contact our staff, questionnaire responses sent to the company when you participate in surveys, etc. We will only use your information within the scope of specific matters communicated with you.
Please understand that the services provided by the company are continuously updated and developed. If you choose to use other services not covered in the aforementioned description, and the company needs to collect your information based on that service, the company will separately explain the scope and purpose of information collection through page prompts, interactive processes, or agreement terms, and obtain your consent. The company will use, store, provide externally, and protect your information in accordance with this policy and the corresponding user agreement; if you choose not to provide it, you may not be able to use certain services or parts of services, but it will not affect your use of other services provided by the company.
In addition, third-party entities may provide services to you through the company's official website or other channels. When you enter the service page operated by a third-party entity, please be sure to note that the relevant services are provided to you by the third-party entity. If it involves the third-party entity collecting information from you, it is recommended that you carefully review the third-party entity's privacy policy or user service agreement.
II. How to Use Cookies and Other Similar Technologies
When you use the company's products and/or services, the company may use cookies and similar technologies to collect some of your access information, including your browsing information, login information, authorization information, etc. The collection of such information by cookies and similar technologies is necessary for you to use our products and/or services, to simplify the steps of your repeated operations, to facilitate your viewing of usage history, to provide you with services that better meet your business needs, to protect the security of your information and account, and to improve our products and services.
III. How the Company Entrusts Processing, Shares, Transfers, and Publicly Discloses Your Personal Information
(1) Entrusted Processing
Certain specific modules or functions in the company's business functions may be provided by external suppliers. For example, we may hire affiliated companies or other professional service providers with the ability to assist us in processing information and providing customer support. For companies, organizations, and individuals entrusted by us to process personal information, we will sign strict confidentiality agreements with them, requiring them to process personal information in accordance with our requirements, personal information protection policies, and any other relevant confidentiality and security measures. If you refuse to allow us to provide your personal information to other third parties, you can contact us at any time through the contact information provided in this policy.
(2) Sharing
Please be aware that the company only collects and uses your personal information within the purposes and scope described in this policy or as required by laws and regulations, and keeps it strictly confidential. The company will not share your personal information with any other third parties unless we have obtained your explicit consent, except in the following situations:
- Sharing with your explicit authorization or consent in advance;
- The company may share your personal information externally in accordance with laws and regulations or mandatory requirements of government authorities;
- Sharing with the company's affiliated companies: Your personal information may be shared with the company's affiliated companies or subsidiaries. The company will only share necessary personal information and will be bound by the purposes stated in this policy. If affiliated companies or subsidiaries need to change the purposes and scope of personal information processing, they will seek your authorization and consent again.
For companies, organizations, and individuals with whom the company shares personal information, the company will strictly evaluate the legality, legitimacy, and necessity of the third party's collection of information. The company will sign strict confidentiality agreements or terms with them, requiring them to store and use the shared personal information in accordance with the agreed purposes and scope, and to take other relevant confidentiality and security measures to store and process the received shared personal information, and strictly comply with relevant laws, regulations, and regulatory requirements.
(3) Transfer
In principle, the company will not transfer your personal information to any company, organization, or individual, except in the following situations:
- Transfer with explicit consent: After informing you of the purpose of transferring personal information, the type of data recipient, the type of data transferred, and meeting other conditions required by law, and obtaining your explicit consent, the company will transfer your personal information to other parties;
- In the event of mergers, acquisitions, or reorganizations, bankruptcy liquidations, if personal information transfer is involved, the company will require the new company or organization holding your personal information to continue to be bound by this privacy policy, otherwise, the company will require the company or organization to seek your authorization and consent again; if the purpose of using personal information changes, your explicit consent will be obtained again. Please be informed: If the above-mentioned circumstances exist and it is necessary to transfer your personal information, the company will inform you of the purpose, type, and recipient of the personal information (if sensitive information is involved, the company will also inform you of the content of the sensitive information) before the transfer. The transfer will only proceed after obtaining your consent, except as otherwise provided by laws and regulations.
(4) Public Disclosure
The company will only publicly disclose your personal information, excluding personal biometric information, under the following circumstances:
-
After informing you of the purpose and type of the public disclosure of personal information (if public personal sensitive information is involved, the content of the involved personal sensitive information will also be informed) and obtaining your explicit consent;
-
Disclosure based on law: The company may publicly disclose your personal information under mandatory requirements of laws, legal procedures, judicial or government authorities.
Please be informed:
-
If the above-mentioned circumstances exist and it is necessary to publicly disclose, the company will inform you of the purpose and type of the public disclosure (if sensitive information is involved, the company will also inform you of the content of the involved sensitive information) before the disclosure and will only proceed after obtaining your consent, except as otherwise provided by laws and regulations.
-
Even with your consent, the company will only publicly disclose your personal information for legitimate, proper, necessary, specific, and clear purposes, and will try to de-identify the personal information in the public disclosure content.
(5) Exceptions to Prior Authorization and Consent for Sharing, Transferring, and Publicly Disclosing Personal Information
In the following circumstances, sharing, transferring, and publicly disclosing your personal information does not require your prior authorization and consent:
-
Directly related to national security and national defense security;
-
Directly related to public safety, public health, and significant public interests;
-
Directly related to criminal investigation, prosecution, trial, and judgment execution;
-
For the protection of your or other individuals' life, property, and other significant legitimate rights and interests, but it is difficult to obtain your consent;
-
The personal information collected is disclosed to the public by yourself;
-
Personal information collected from legally publicly disclosed information, such as legal news reports, government information disclosure, and other channels;
-
Necessary for signing and fulfilling contracts according to your request;
-
Necessary for maintaining the safe and stable operation of the services provided, such as discovering and handling service failures;
-
Other circumstances stipulated by laws and regulations.
According to legal provisions, sharing and transferring anonymized personal information, ensuring that the data recipient cannot re-identify the personal information subject, does not belong to the external sharing, transferring, and public disclosure of personal information. The storage and processing of such data will not require further notification and consent from you.
IV. How the Company Stores and Protects Your Personal Information
(1) How Your Personal Information is Stored
-
Personal information collected and generated within China will be stored within China. If some products or services involve cross-border business, the company will comply with laws, regulations, and relevant regulatory requirements, explain the relevant purposes and types of information involved to you, and obtain your authorization and consent.
-
The company promises that unless otherwise required by laws and regulations, the storage period of your personal information will be the shortest time necessary to achieve the purpose of your authorized use.
-
If the company ceases operations due to poor management or other reasons, unless otherwise required by laws and regulations, the company will inform you of such circumstances, stop collecting your personal information, and delete or anonymize the collected personal information.
(2) How Your Personal Information is Protected
-
To ensure the security of your information, the company will take various reasonable and necessary measures to protect your information after collecting it. For example, in the technical development environment, the company only uses de-identified and anonymized information for statistical analysis; when providing external research reports, the company will de-identify the information contained in the reports. The company will store de-identified information separately from information that can be used to re-identify personal information, ensuring that personal information is not re-identified in subsequent processing of de-identified information.
-
The company has adopted security protection measures that comply with industry standards to protect the personal information you provide, preventing unauthorized access, public disclosure, use, modification, damage, or loss of data. For example, the company provides HTTPS secure browsing on its official website; uses encryption technology to ensure data confidentiality; employs trusted protection mechanisms to prevent malicious attacks on data; deploys access control mechanisms to ensure that only authorized personnel can access personal information; and has obtained the third-level certification of the "Information System Security Level Protection Record Certificate." The company will only retain your personal information for the period necessary to achieve the purposes described in this policy, unless an extended retention period is required or permitted by law.
-
The company has established a personal information protection responsibility mechanism, strictly setting information access permissions based on the principle of minimum authorization for staff who may come into contact with your personal information, controlling the scope of knowledge, and continuously strengthening the promotion of relevant laws, regulations, privacy security guidelines, and security awareness among staff. Additionally, the company has signed confidentiality agreements with its employees or included confidentiality obligations in labor contracts with employees, and regularly conducts security and privacy protection training courses to enhance employees' awareness of the importance of protecting personal information.
-
Please be informed and understand that the internet is not an absolutely secure environment, and email, instant messaging, and communication with other company users are not encrypted. The company strongly recommends that you do not send personal information through such means. Additionally, the company strongly recommends that you use secure methods and complex passwords to help ensure the security of your account. If you discover that your personal information has been leaked, especially if your account or password is leaked, please contact the company immediately using the contact information provided in this privacy policy or other emergency contact methods, so that the company can take appropriate measures.
-
The internet environment is not 100% secure, and the company will do its best to enhance the security of any information you send to the company. If the company's physical, technical, or management protection facilities are damaged, leading to unauthorized access, public disclosure, tampering, or destruction of information, resulting in damage to your legitimate rights and interests, the company will bear the corresponding legal responsibility.
-
The company has formulated an emergency plan for personal information security incidents, regularly organizes emergency response training and drills, so that they can master job responsibilities and emergency handling strategies and procedures. In the unfortunate event of a personal information security incident, the company will promptly report to the relevant authorities in accordance with legal and regulatory requirements, and promptly inform you of the following: the basic situation and possible impact of the security incident, the measures the company has taken or will take, suggestions for you to independently prevent and reduce risks, and remedial measures for you. The company will promptly inform you of the relevant situation of the incident via email, letter, phone, push notification, etc. If it is difficult to inform each personal information subject individually, the company will take reasonable and effective ways to issue an announcement.
At the same time, the company will also proactively report the handling of personal information security incidents in accordance with the requirements of regulatory authorities.
V. Your Rights
In accordance with relevant laws, regulations, standards of China, and common practices of other countries and regions, the company guarantees that you can exercise the following rights regarding your personal information:
(a) Access Your Personal Information
You have the right to access your personal information at any time, except for exceptions stipulated by laws and regulations. If you want to exercise your data access rights, you can access it in the following ways:
You can send an email to [service@singdata.com] at any time, and the company will respond to your access request in the manner and within the time frame specified in this policy, except as otherwise provided by laws and regulations or otherwise agreed in this policy.
(b) Correct Your Personal Information
When you find that the personal information processed by the company about you is incorrect, you have the right to request the company to make corrections. You can submit a correction request through the methods listed in "(a) Access Your Personal Information".
(c) Delete Your Personal Information
In the following situations, you can request the company to delete your personal information:
- If the company's processing of personal information violates laws and regulations;
- If the company collects and uses your personal information without your consent;
- If the company's processing of personal information violates the agreement with you;
- If you no longer use the company's products or services, or you have canceled your account;
- If the company no longer provides products or services to you.
If the company decides to respond to your deletion request, the company will also notify the entities that have obtained your personal information from the company to delete it in a timely manner, unless otherwise provided by laws and regulations, or these entities have obtained your independent authorization directly (in this case, you should directly notify these entities to delete your personal information).
After you delete information from the company's services, the company may not immediately delete the corresponding information from the backup system, but will delete this information when the backup is updated.
(d) Change the Scope of Your Authorization and Consent
Each business function requires some basic personal information to be completed. For the collection and use of additional personal information, you can give or withdraw your authorization and consent at any time, and the company will explain it on the specific function page.
After you withdraw your consent, the company will no longer process the corresponding personal information. However, your decision to withdraw consent will not affect the personal information processing previously carried out based on your authorization.
(e) Restrict Automated Decision-Making by Information Systems
In certain business functions, the company may make decisions solely based on non-human automated decision-making mechanisms such as information systems and algorithms. If these decisions significantly affect your legitimate rights and interests, you have the right to request the company to provide an explanation, and the company will also provide appropriate remedies.
(f) Respond to Your Above Requests
To ensure security, the company may require you to provide a written request or otherwise prove your identity. The company has the right to ask you to verify your identity before processing your request.
The company will respond within fifteen days. If you are not satisfied, you can also send an email to [service@singdata.com] to file a complaint.
For your reasonable requests, the company does not charge a fee in principle, but for repeated requests that exceed reasonable limits, the company will charge a certain cost fee as appropriate. For those requests that are unreasonably repetitive, require excessive technical means (for example, requiring the development of new systems or fundamentally changing current practices), pose risks to the legitimate rights and interests of others, or are very impractical (for example, involving information stored on backup tapes), the company may refuse to respond.
Despite the above agreements, in the following situations, the company will not be able to respond to your request in accordance with relevant laws, regulations, and national standards:
- Related to the performance of obligations stipulated by laws and regulations by the personal information controller;
- Directly related to national security, national defense security;
- Directly related to public safety, public health, and major public interests;
- Directly related to criminal investigation, prosecution, trial, and execution of judgments;
- There is sufficient evidence to show that you have subjective malice or abuse of rights;
- For the purpose of safeguarding your or other individuals' life, property, and other major legitimate rights and interests, but it is difficult to obtain your consent;
- Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals and organizations;
- Involving trade secrets.
VI. How the Company Handles Personal Information of Minors
The company's products and/or services are fully aimed at adults. If you are a minor under the age of 18, it is recommended that you do not use the company's products and/or services. If the company discovers that it has inadvertently collected personal information of minors, it will try to delete the relevant data as soon as possible within a reasonable time after discovery. For children under the age of 14, we will handle it in accordance with the "Children's Privacy Protection Statement".
VII. How Your Personal Information is Transferred Globally
In principle, personal information collected and generated during the company's operations in China is stored within China, except in the following situations:
- There are clear provisions in laws and regulations;
- Obtaining your explicit authorization.
For the above situations, the company will ensure that your personal information is adequately protected as it is within the territory of the People's Republic of China. For example, the company will request your consent for cross-border transfer of personal information, or implement security measures such as data de-identification before cross-border data transfer.
VIII. How This Policy is Updated
The company's privacy policy may change. The Company will not reduce your rights under this Privacy Policy without your explicit consent. Any changes to this policy will be published through reasonable means (such as on this page).
For significant changes, the Company will provide more prominent notifications (including, for certain services, email notifications detailing specific changes to the Privacy Policy).
Significant changes under this policy include but are not limited to:
- Major changes in the Company's service model, such as changes in the purpose of personal information processing, types of personal information processed, and ways personal information is used;
- Substantial changes in the Company's ownership structure or organizational framework, such as changes in ownership due to business adjustments, bankruptcy, mergers and acquisitions;
- Changes in the main parties with whom personal information is shared, transferred, or publicly disclosed;
- Significant changes in your rights regarding personal information processing and how these rights can be exercised;
- Changes in the department responsible for personal information security, contact information, or complaint channels;
- When personal information security impact assessment reports indicate high risks;
- Other changes that may significantly affect your personal information rights and interests.
Your continued use of the Company's services after updates to this policy indicates that you have thoroughly read, understood, and accepted the updated policy and agree to be bound by it. We encourage you to review our Privacy Policy each time you use our services.
The Company will also archive previous versions of this policy for your reference.
IX. How to Contact the Company
If you have any questions, comments, or suggestions about this privacy policy, please contact the company through the following ways:
Email: service@singdata.com In general, the company will respond within fifteen days, and in special circumstances, the response will be made within no more than thirty days or within the time limit prescribed by laws and regulations.
If you are not satisfied with the company's response, especially if the company's personal information processing behavior has harmed your legitimate rights and interests, you can also file a complaint with the consumer rights protection department or other regulatory agencies or protect your rights in accordance with the relevant provisions of this policy.
X. Supplementary Provisions
The interpretation and dispute resolution of this policy shall be governed by Chinese law.
If any court with jurisdiction rules or determines that any provision of this policy is invalid, that provision will be removed from this policy, but the invalidity of that provision will not affect the validity of the remaining provisions of this policy. The remaining provisions of this policy will continue to be enforced.
The headings of this policy are designed for convenience of reading only and do not affect the meaning or interpretation of any provision of this policy.