Privacy Policy of Guangzhou Ranch Treasure E-Commerce Co., Ltd.
New Version — Updated on November 30, 2024, effective from November 20, 2024
Please read this Privacy Policy carefully!
This Privacy Policy aims to inform you about how Guangzhou Ranch Treasure E-Commerce Co., Ltd. (hereinafter referred to as "we", "us" or "our") collects, uses, stores, discloses and protects your personal information. Please read and understand this Policy before using our services. By using or continuing to use our services, you agree that we will process your personal information in accordance with this Policy.
1. Introduction
Guangzhou Ranch Treasure E-Commerce attaches great importance to personal information privacy. This policy applies to relevant individuals and organizations. As a controller, the company legally ensures the secure processing of information. Users with questions may contact us.
2. Details of Data Processing
2.1 Collection Purposes: Including account management, service provision and delivery, communication, personalized service recommendations, marketing and advertising, research and development, security risk prevention, legal compliance, etc.
2.2 Data Categories: There are user-provided information (such as contact, account, business, transaction, payment information and other content), automatically collected information (device, online activity, location, communication information, etc.), and information received from third parties (social accounts, communications, verification services, etc.).
3. Disclosure or Sharing of Personal Information
We may disclose or share personal information to other users, our company group and affiliates, designated service providers, third-party business partners (such as providers of supplementary services, marketing and advertising, due diligence, etc.), external professional consultants, law enforcement agencies, etc. We may also disclose information to business acquirers and provide anonymized data. When cooperating with third parties, the relevant privacy policies do not apply to third-party websites, and we cannot control the information submitted. The platform's instant messaging service is provided by specific partners with corresponding information processing rules.
4. Data Retention
We retain personal information when there is an ongoing legitimate business need. When no such need exists, we will delete or anonymize the information.
5. Cookies and Similar Technologies
We use relevant technologies. For details, please refer to our Cookies Policy.
6. User Rights
Users have various rights including access, correction, objection to processing, restriction of processing, portability requests, withdrawal from marketing communications, withdrawal of consent, and complaint. The company will respond to requests in accordance with the law. Users should inform us if they find information changes or inaccuracies.
7. Provisions for Users in Specific Regions
7.1 Users in the European Union or the United Kingdom: Processing purposes and categories are similar. Legal bases depend on different business scenarios. For questions, please contact us. We have conducted assessments when processing based on legitimate interests.
7.2 Users in the United States: Information is stored in the United States and processed in accordance with this policy. Buyers should refer to sellers' privacy policies.
7.3 Users in Brazil: Information is stored in specific locations. Legal bases include contract performance, consent, compliance with laws, etc. Users have additional rights. For questions, please contact us.
8. International Data Transfers
Information is stored according to the user's country of residence. International transfers have legitimate purposes and bases. Measures are taken to ensure recipients' confidentiality and information protection. Copies of standard contractual clauses can be obtained. Buyers accessing information of Chinese users must comply with specific terms.
9. Data Security Measures
Our company attaches great importance to data security and has adopted a series of technical and organizational measures to protect users' personal information from unauthorized access, use, disclosure, modification or destruction.
At the technical level, we use encryption technology to encrypt and store sensitive user data during transmission, such as during user login and payment processes, to ensure the confidentiality of data during network transmission. Meanwhile, we deploy network security equipment such as firewalls and intrusion detection systems to monitor network traffic in real-time, prevent external network attacks, and promptly detect and block potential security threats.
In terms of organizational management, we have established strict internal management systems and processes. We divide permissions for positions involving user personal information, so that only authorized personnel can access specific information. We also conduct regular data security training for employees to improve their data security awareness and operational standards, preventing data leakage caused by internal personnel errors or irregular behaviors. In addition, we regularly evaluate and update data security measures to adapt to the evolving security environment and technological developments.
10. Data Breach Emergency Response
Although we have taken various measures to ensure data security, we may still face security incidents such as data breaches. In the event of a data breach, our company will immediately activate the emergency response plan.
First, we will quickly determine the scope and impact of the breach, including which user information is involved and which systems or services are affected. Then, we will promptly notify relevant users, informing them of the situation of the data breach, potential risks, and the response measures we are taking, so that users can take corresponding preventive measures, such as changing passwords and paying attention to account abnormalities.
At the same time, we will organize a professional team to investigate and identify the cause of the data breach, whether it is due to technical vulnerabilities, internal personnel errors, or external attacks. We will take corresponding remedial measures based on the cause, such as fixing vulnerabilities, strengthening internal management, or holding relevant responsible parties accountable. Moreover, in accordance with the requirements of relevant laws and regulations, we will report the details of the data breach incident to regulatory authorities and cooperate with their investigation and handling.
11. Protection of Children's Personal Information
Our services are mainly for adults, and we generally do not actively collect children's personal information. If we accidentally obtain children's personal information under certain special circumstances, we will immediately take measures to delete such information and ensure that no further processing or use of it will occur.
If we discover that a user intentionally provides children's personal information, we will communicate with that user, requiring them to immediately stop such behavior and delete relevant information. Meanwhile, we will strengthen the review of user registration information to minimize the occurrence of such situations. When dealing with issues involving children's personal information, we will strictly follow the special provisions of relevant laws and regulations on the protection of children's personal information to effectively protect children's privacy rights and interests.
12. User Education and Awareness Enhancement
To help users better protect their personal information, our company actively carries out user education and awareness enhancement work.
We publish knowledge and guidelines on data privacy protection on our website, applications and other platforms, introducing users to common personal information leakage risks and prevention measures, such as how to set strong passwords and how to identify phishing links. Through regular notifications, articles and other forms, we remind users to pay attention to personal information security, encourage them to regularly check their account information, and promptly report abnormalities to us.
In addition, we will hold online or offline training activities or lectures, inviting data security experts to give professional explanations to users, answer their questions on personal information protection, improve users' attention to personal information protection and practical operation capabilities, and promote good interaction and cooperation between users and the company in data privacy protection.
13. Policy Updates and Notifications
This Privacy Policy may be updated in accordance with changes in laws and regulations, the development of the company's business, or other actual circumstances. When the policy is updated, we will notify users through multiple channels.
We will post a notice of policy update in a prominent position on our website and applications, informing users that the policy has been updated and briefly explaining the main content and impact of the update. Meanwhile, we may send a notification email to the user's registered email address, elaborating on the details of the policy update and the key points that users need to pay attention to. In some cases, we may also pop up a prompt box when users log in or use relevant services, requiring users to confirm that they have read and understood the updated policy content.
We will give users a certain period of time to understand and adapt to the policy update, ensuring that users have sufficient opportunities to raise questions or provide feedback before the updated policy takes effect. If users continue to use our company's services after the policy update, it will be deemed that they have agreed to and accepted the updated Privacy Policy.
14. How to Contact Us
If users have any questions, suggestions or complaints about this Privacy Policy, they can contact us through the following methods:
Email: zp332455590@gmail.com
Email: 332455590@qq.com
When contacting us, please provide detailed personal information and a description of the relevant issue, so that we can handle your feedback more efficiently, provide you with accurate answers and solutions in a timely manner, and effectively protect your rights and privacy.