Myyshop

Global short video e -commerce data service platform

Myyshop Privacy Policy

The latest effective date:2020/01/01

This Privacy Policy (hereinafter referred to as "This Policy") applies to Digital Trade Fuxuan Technology (Shenzhen) Co., Ltd. and its affiliates (hereinafter referred to as " Myyshop AI"). or "we") to the user through the official website (https://www.xianzhiai.com/). (hereinafter referred to as "you") to provide advertising marketing analysis tool services, we will introduce you to the principles of Myyshop AI for the protection of personal information, The collection and processing of your personal information, the general protection measures and mechanisms, and show you the basic standards and systematic construction of the Myyshop personal information protection.

We strive to present this Policy in a concise, clear, and easy-to-understand manner. Myyshop understands the importance of personal information to you and will do its best to protect your personal information safe and secure. We are committed to maintaining your trust in us and adhering to the following principles to protect your personal information: the principle of consistency of rights and responsibilities, the principle of clear purpose, the principle of choice and consent, the principle of minimum adequacy, the principle of ensuring security, the principle of subject participation, the principle of openness and transparency, etc. At the same time, Myyshop promises that we will take corresponding security measures to protect your personal information in accordance with the mature security standards in the industry.

Please read and understand this policy carefully before using our products so that you can better understand our products and the services they provide and make appropriate choices. Unless otherwise provided by laws and administrative regulations, you have the right to know and decide how we handle your personal information, the right to restrict or refuse our or other parties' processing of your personal information, and at the same time, you have the right to ask us to explain the personal information processing rules we provide to you. In order to enable you to fully understand and be aware of the rules on how we process your personal information, the scope of processing and the consequences of processing, and as the basis for your exercise of relevant rights, we have specially written the "Basic Rules for Our Handling of Your Personal Information" to implement the statutory notification obligations that we should fulfill to you. Based on this, we strongly recommend that you first carefully read the instructions and make the appropriate authorization and consent on the basis of fully understanding the content of this policy.

If you have any questions, comments or suggestions, please use this policy "9 How to contact us further in contact details.

This policy will help you understand the following:

1. Our basic rules governing the processing of your personal information

2. How We Collect and Use Your Personal Information

3. How we protect your personal information

4. Your Rights

5. How we process children's personal information

6. How your personal information is transferred globally

7. How we update our Privacy Policy and Guidelines and applicable laws

8. How to contact us

  1. Our basic rules govern the processing of your personal information

The important definitions in this policy are based on the relevant definitions in the Personal Information Protection Law and the Personal Information Security Specification (GB/T35273-2020), and are supplemented according to our actual situation, and if there is any inconsistency, the provisions of the Personal Information Protection Law and the Personal Information Security Specification shall prevail. It is also important to note that the core purpose of this note is to guide you to fully understand and be aware of the rules on how, what scope of processing and consequences of our processing of your personal information, so as to implement our statutory obligation to inform you. Based on this, we strongly recommend that you read this note carefully and give authorized or express consent on the basis of fully understanding the contents of the note.

    1. Personal information: refers to all kinds of information recorded electronically or otherwise related to identified or identifiable natural persons. Such as personal telephone number, personal information subject account number, IP address, unique device identification code, etc. Sensitive personal information: refers to personal information that, once leaked or illegally used, is likely to lead to infringement of the personal dignity of natural persons or endangering the safety of persons and property, including information such as biometrics, religious beliefs, specific identities, medical health, financial accounts, whereabouts, and personal information of minors under the age of 14. In this policy, if the personal information is sensitive personal information, we will remind you in the form of font bold and obtain your separate consent, and you should pay extra attention to the enumeration of such information. In terms of the services we provide to you, the scope of your personal information we process is as follows, and you can find out what scenarios and purposes we process personal information through the instructions in the form listed in "2.1 Collection and Use of Personal Information":

Types of Personal Information

Personal information fields

Basic personal information

Personal phone number

Network identity information

Account name/nickname, account number password, IP address

Personal Communications

Communication records and content

Personal Property Information

Order number, transaction amount

Personal Internet records

Internet browsing history, operation logs

Personal device information

Device identification number, device model, system version

    1. Personal information processors: organizations and individuals who independently decide on the purpose and method of processing in the processing of personal information.
    2. Processing: including the collection, storage, use, processing, transmission, provision, disclosure and deletion of personal information. For information about how we collect and use your personal information, you can see "2 How We Collect and Use Your Personal Information".
      1. Collection: Refers to the act of obtaining control of personal information and being able to independently decide on the purpose and method of processing personal information, including "automatic collection" methods such as providing to us by the personal data subject on our own initiative, interacting with the personal information subject or recording the personal information subject's behavior, and by us "Indirect access" methods such as receiving other personal information and/or collecting publicly available information.
      2. Use: We will explain in the form listed in "2.1 Collection and Use of Personal Information" what scenarios and purposes we will use your personal information for, and list the corresponding legitimate reasons for processing so that you understand the corresponding obligations that we need to comply with. When we want to use the information collected for a specific purpose for other purposes, we will ask for your consent in advance or inform you of other legitimate reasons for processing. "Use" as used in this policy refers specifically to the way we process data to achieve the storage, access and display of data, aggregation and fusion, statistical analysis, personalized display and automatic decision-making.
      3. You agree that we will aggregate, integrate, identify and analyze, profil or further process the personal information you provide actively or passively, directly or indirectly in the process of using the Myyshop service through our own or our fiduciary technology, And the formation of a variety of different granularity can reflect your behavior habits, interests and hobbies of the label information (hereinafter referred to as "label information"), we will use the label information for specific scenarios and purposes, in order to improve our services, or to show and recommend to you more in line with your potential needs of products, services or to promote commercial advertising to you, including:
        1. Automated decision-making: refers to the use of personal information to automatically analyze, evaluate and make decisions through computer systems and algorithm programs on personal behavior habits, hobbies or economic, health, credit status, etc. In general, we will use automated decision-making for the following scenarios:
          1. We will use automated decision-making mechanisms to assess the security of your device's login status, which may require you to register by additional verification methods. This decision may significantly affect your legitimate interests (i.e. the ability to use our services), you have the right to ask us to make an explanation through the contact details agreed in this policy, and you have the right to refuse us to make a decision only through automated decision-making, and we will provide appropriate remedies. For details, see the description of "4.6 Constraining Information System Automated Decision-Making".
          2. Automated decision-making mechanisms can be used to push personalized impressions and/or business marketing messages. Based on the uniformity of our account management system, it is possible that personal information collected through one product will be aggregated and used in other Group products and services for personalized display purposes.
        2. Operator's Business Guarantee: Operating and providing services to you is an important part of our business activities. We need to use your personal information internally for the purposes of our normal business operations, including conducting internal audits, data analysis, further practical or academic research, and using the information collected for big data analytics. For example, we use the information we collect to analyze statistical products that do not contain any personal information, to show the overall picture of Myyshop services, and to analyze the behavior patterns of different groups. We may disclose and share with our partners big data analytics information that has been statistically processed without identifying content. At the same time, we need to use the information collected to provide and improve Myyshop's products and services, to conduct necessary business operations and assessments, customer support, to improve the performance of products and services, etc. Based on the needs of ensuring the safe operation of the business and network security, we need to collect your IP address, device information, network information and operation logs, if you refuse to provide such information, we will not be able to ensure the normal operation of the service to you.
      4. Preservation: means recording in electronic or non-electronic form on a medium that we can access and retrieve. For the sake of normal business needs, we will store the personal information required for the product (see the privacy guidelines for specific products) for different legitimate processing reasons:
        1. Personal information that consents to processing based on your authorization will be saved from the date of collection until the purpose of processing is realized, the user cancels/deletes all information of the account or withdraws consent and the agreed period of remorse expires;
        2. Personal information necessary for the conclusion or performance of a contract to which you are a party will be retained from the date of collection until the performance of the contract has been completed and the statute of limitations has expired;
        3. Personal information based on the legal obligation necessary for the performance of the statutory obligation will be retained from the date of collection until the statutory obligation has been fulfilled and the limitation period for litigation has expired. Where laws, regulations, normative documents and regulatory provisions have different requirements for the above-mentioned retention periods, comply with the requirements of laws, regulations, normative documents and regulatory provisions.
        4. In addition, in principle, the personal information we collect based on products will be retained on servers in the People's Republic of China in accordance with the latest legal requirements. If the conditions and procedures stipulated by laws, regulations, normative documents and supervision are not met, we will not provide any of your personal information to overseas entities.
      5. External provision: refers to the personal information processor providing personal information to another personal information processor, and the receiving party handles personal information under the purpose and processing method of the processing that the personal data subject has been informed of. In this policy, we will disclose to you the types, purposes of processing, and processing methods of the corresponding personal information provided to you, and inform you of the name and contact information of the recipient of the personal information. See "2 How We Collect and Use Your Personal Information".
      6. Entrusted processing: refers to activities in which the personal information processor entrusts the trustee to handle personal information and supervises the trustee's personal information handling activities. The Trustee may only process personal information within the scope of the Entrustment, and the Trustee may not entrust others to handle personal information without the consent of the personal information processor. See "2 How We Collect and Use Your Personal Information".
      7. Anonymization: refers to the process by which personal information cannot be processed to identify a specific natural person and cannot be restored.
      8. Related Party: means an entity directly or indirectly controlled by Digital Trade Fuxuan (Shenzhen) Co., Ltd., or any company or legal entity under common control with Digital Trade Fuxuan (Shenzhen) Co., Ltd. "Entities" in this definition include, but are not limited to, individuals, partnerships, corporations, and other legal entities.
  1. How we collect and use your personal information

We will follow the principles of legality, legitimacy and necessity, collect and process your personal information from you for the purpose of providing you with relevant products and services and disclose it to you in a list form (see example below), we disclose the collection and use of your personal information to you as comprehensively, completely and in a timely manner as possible, and if you find that there are errors or omissions in our disclosure, please contact us through the contact information specified in this policy.

    1. Collection and Use of Personal Information

With the iteration, expansion and upgrading of products or services, the types of personal information we collect and use will change, if the above situation occurs, we will update this policy and the pop-up windows, pages and other ways to explain to you in detail, and seek your consent. In this service, the categories of personal information that we need to collect and process based on different processing purposes are as follows:

Purpose of Processing

Grounds for lawful processing

Types of Personal Information

Sensitive personal information fields

Sign up for an account

Performance is necessary

Basic personal information

Network identity information

not

Refine your account information

Authorization and consent

Basic personal information

Network identity information

not

Payment settlement

Performance is necessary

Basic personal information

Personal Property Information

not

Service message push

Performance is necessary

Personal device information

not

Customer service and after-sales

Performance is necessary

Basic personal information

Network identity information

Personal Communications

not

Secure transactions

Performance is necessary

Basic personal information

Personal Internet records

Personal device information

Network identity information

not

Identification analytics

Authorization and consent

Basic personal information

Personally Identifiable Information

Personal Property Information

Personal Internet records

Network identity information

Personal device information

not

Personalized recommendations and advertising information pushes

Authorization and consent

Network identity information

Personal device information

Basic personal information

not

    1. How we use cookies and similar technologies
      1. Use of cookies and similar technologies

Personalize your online experience and make your access experience easier. We send one or more small data files or similar technical files on your computer or mobile device called cookies, which are unique and can only be read by the web server in the domain where the cookies are published. We send you cookies to simplify the steps you need to repeat your login, to help determine your login status, and to secure your account or data.

We do not use cookies for any purpose other than those described in this Privacy Policy. You can manage or delete cookies according to your preferences. You can clear all cookies saved on your computer, most web browsers automatically accept cookies, but you can usually modify your browser's settings to reject cookies according to your needs, and you can also clear all cookies saved in the software 。 However, if you do so, you may need to personally change your user settings on each visit, and the corresponding information you have previously recorded will be deleted and may have an impact on the security of the services you use. For more information on how to change your browser settings, visit the relevant settings page for the browser you're using.

      1. Do Not Track

Many web browsers have the Do Not Track feature, which publishes Do Not Track requests to websites. At present, major Internet standards organizations have not established policies to prescribe how websites should respond to such requests. But if your browser has Do Not Track enabled, then we respect your choice.

    1. Use of your personal information within the Group
      1. We will aggregate and use all of your information in the form listed in "2.1 Collection and Use of Personal Information" of this Policy in accordance with the unified information security management requirements and operational control policies within the Group. If the scope of our provision or the recipient's purpose of use exceeds the description in this policy, the recipient who changes the purpose shall re-obtain your consent. You have the right to lodge a complaint with us or to any of the affiliates who have collected and processed your personal information through the contact details set forth in this Policy, or to request that we or any of the affiliates who have collected and processed your personal information be explained and responded to in connection with the group data sharing issues described in this section.
      2. Your personal information may be shared and shared across the Group for the following processing purposes:
        1. Create a unified login account, verify your identity within the group, unify identity authentication and enjoy the corresponding rights.
        2. Identify, analyze, and process label information within the Group and use it for automated decision-making, personalized display, operational assurance, academic research, notifications and pushes (including sending you commercial advertisements and information pushes) and to improve products and services for each affiliate within the Group.
        3. To prevent security risks, to make comprehensive judgments on your personal information, label information, etc. within the Group, to detect and prevent security risks (such as phishing websites, fraud, network vulnerabilities, computer viruses, network attacks, network intrusions, etc.), and to more accurately identify violations of laws and regulations or relevant agreements and rules of products and services, so as to protect the legitimate rights and interests of you, other users, us or affiliates.
        4. To jointly provide services to you with related parties or to jointly implement business functions for specific products.
        5. Other purposes authorized by you and permitted by laws, regulations, regulatory documents and regulatory provisions.
      3. We will accurately record the flow of data between related parties within the Group and control the security of data flow within the Group through systems, agreements and technical means. At the same time, in order to ensure the security of data flow within the Group, we will implement internal routine inspection measures and require all related parties within the Group to strictly implement the Group's information security management requirements and operational control strategies.
      4. Group: For the avoidance of ambiguity, for the purposes of this Policy alone, the Group comprises Digital Trade (Shenzhen) Co., Ltd. and its subsidiaries, and is under joint control with Digital Trade (Shenzhen) Limited Entity.
    2. To third parties
      1. We will not provide your personal information to third parties unless permitted by laws, regulations, normative documents and regulatory provisions or have other legitimate reasons for processing. We will only provide your personal information to third-party personal information processors for lawful, legitimate, necessary, specific and clear purposes. We will enter into a confidentiality agreement with the recipient in accordance with the law and require them to process personal information in accordance with the requirements of this policy and other necessary confidentiality and security measures. The main circumstances in which we provide your personal information to third parties include:
        1. Entrusted processing: In order to achieve the business function of a specific product, we will entrust external suppliers to assist us in providing relevant services to you, under the entrusted processing method, the third party receiving personal information is only entitled to provide services to you on our behalf in accordance with our instructions, and we are responsible to you for their fiduciary acts within the scope of the entrustment. For example, we entrust vendors, service providers, and other partners who support our business to provide us with technical infrastructure services (such as sms verification services), analyze how our services are used or potential risks, advertising services, payment facilities, customer service, data storage, or data analytics services.
        2. External provision: In order to fulfill the agreement concluded with you or for other reasonable purposes, we may provide some of your personal information to a third-party personal information processor, and the third-party personal information processor who receives personal information has the right to process personal information within the scope of the processing purpose, processing method, and type of personal information that has been informed to you, and if the receiving party changes the original processing purpose and processing method, it shall obtain your consent again. In particular, please note that if you authorize a third party to request us to provide all or part of your personal information in the Service, you agree that we have the right to verify your identity and the authenticity of your authorization to the third party based on our own experience, and have the right to agree or refuse to provide your aforementioned personal information at our sole discretion, unless you make a separate instruction through the contact information specified in this policy. We primarily share your personal information with the following recipients:

Receiver name

Purpose of Processing

How to handle it

The type of personal information to be provided

Rules for the Handling of Personal Information of the Recipient

      1. For the avoidance of ambiguity, you acknowledge and understand that the Products may contain links to other websites, applications, products and services operated by other independent third parties, and we make no warranties of any kind, express or implied, for such third-party websites, applications, products and services, and that such links are provided solely to facilitate users to navigate the relevant pages. When you access such third-party websites, applications, products and services links, we will provide your personal information to third parties based on your explicit authorization, you should pay attention to the privacy policy or personal information protection terms provided to you, and you should pay special attention to the SDKs independently accessed by such third-party websites and applications by such accessing parties and SDKs The Provider is jointly responsible for you. We and such third-party websites, applications, products and service providers each assume independent responsibility for the protection of personal information to you within the scope of legal provisions and mutual agreements.
    1. transfer

We will not transfer your personal information to any company, organization or individual, except in the following cases:

      1. Transfer with explicit consent: With your explicit consent, we will transfer your personal information to other parties;
      2. In the case of mergers, acquisitions or bankruptcy liquidations, if it involves the transfer of personal information, we will require the new company or organization holding your personal information to continue to be bound by this Privacy Policy, otherwise we will require the company or organization to seek your authorization and consent again.
    1. Public Disclosure

We will only publicly disclose your personal information in the following circumstances:

      1. After obtaining your separate consent;
      2. Disclosure Based on Law: We may publicly disclose your personal information in the event of a law, legal process, litigation or mandatory request by a government authority.
  1. How we protect your personal information
    1. We have used industry-standard security measures to protect the personal information you provide against unauthorized access, public disclosure, use, modification, damage or loss. We will take all reasonable and practicable measures to protect your personal information. For example, we use encryption to ensure the confidentiality of data; we use trusted protections to prevent malicious attacks on data; we deploy access control mechanisms to ensure that only authorized personnel have access to personal information; and we conduct security and privacy training courses to raise awareness among employees about the importance of protecting personal information.
    2. Our Data Security Capabilities: Myyshop has a strong information security department for Myyshop The product builds a complete and advanced data security protection system, including hierarchical classification, encryption and preservation, and data access rights division of user information; formulates an internal data management system and operating procedures, and has strict process requirements from data acquisition, use, and destruction to avoid illegal use of user privacy data; determines the security management responsibility of each department and its responsible person who contacts user personal information; establishes a workflow and security management system for the collection, use, and related activities of users; Implement authority management for staff and agents, review the batch export, copy, and destroy personal information, and adopt anti-leak measures; properly keep the paper media, optical media, electromagnetic media and other carriers that record users' personal information, and adopt corresponding security storage measures; implement access review of information systems that store users' personal information, and take anti-invasion, anti-virus and other measures; record information such as personnel, time, place, and matters that operate on users' personal information; and regularly hold security and privacy protection training. Raise employees' awareness of personal information protection.
    3. We will take all reasonable and practicable measures to ensure that irrelevant personal information is not collected. We will only retain your personal information for as long as necessary to achieve the purposes described in the specific Privacy Guidelines, unless an extension of the retention period is required or permitted by law.
    4. The Internet environment is not 100% secure and we will endeavour to ensure or warrant the security of any information you send to us. If our physical, technical, or administrative protection facilities are damaged, resulting in unauthorized access, public disclosure, alteration, or destruction of information, resulting in damage to your legitimate rights and interests, we will bear the corresponding legal responsibility.
    5. After the unfortunate occurrence of a personal information security incident, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, the suggestions that you can prevent and reduce risks independently, and the remedial measures for you. We will promptly inform you of the relevant circumstances of the incident by mail, letter, telephone, push notification, etc., and when it is difficult to inform the personal information subject one by one, we will take a reasonable and effective way to issue an announcement.

At the same time, we will also take the initiative to report the handling of personal information security incidents in accordance with the requirements of the regulatory authorities.

If you find that your personal information is leaked, please contact us immediately through the contact information specified in this policy, so that we can take corresponding measures in a timely manner.

  1. Your Rights

In accordance with the relevant laws, regulations and standards of the People's Republic of China, we will strive to protect your rights in our personal information processing activities, including but not limited to:

    1. Access, copy and transfer of your personal information
      1. You have the right to access, copy and transfer your relevant personal information by logging into the Myyshop website you registered through your account and password at The Myyshop, except for exceptions stipulated by laws and regulations. Where technically feasible, we will provide you with the ability to export relevant personal information by yourself, please note that due to current legal and regulatory requirements and/or our technical capabilities, some personal information cannot be exported by yourself, please refer to the instructions on the export interface for the specific export of personal information.
      2. If you are unable to access your personal information through the above channels, or if you need to copy or transfer such personal information, you can contact us at any time through the contact information specified in this policy, and we will reply to your request for access, reproduction and transfer within 15 working days And when the transfer conditions meet the conditions stipulated by the state network information department, the corresponding transfer channels are provided.
    2. Correct and supplement your personal information
      1. When you find that your personal information is inaccurate or incomplete, you have the right to correct and supplement it in accordance with the path indicated in Clause 4.1 of this Policy.
      2. If you are unable to correct and supplement these personal information through the above path, you can contact us at any time through the contact information specified in this policy, and we will reply to your access request within 15 working days.
    3. Delete your personal information
      1. You can delete the personal information you voluntarily submit after registration by the path indicated in Clause 4.1 of this Policy.
      2. In the following cases, if we do not actively delete your personal information, you can request the deletion of personal information to us through the contact information specified in this policy:
        1. the purpose of the processing has been achieved, cannot be achieved or is no longer necessary to achieve the purpose of the processing;
        2. we stop providing products or services, or the retention period has expired;
        3. you have withdrawn your consent;
        4. We process your personal information in violation of laws, administrative regulations or agreements;
        5. Other circumstances provided for by laws or administrative regulations.
      3. We will respond within 15 working days after receiving your request to delete your personal information. If we decide to respond to your deletion request, we will also notify the entities that have obtained your personal information from us and request that they delete it in a timely manner, unless otherwise provided by laws and regulations, or these entities have obtained your independent authorization.
      4. When you delete information from our Services, we may not immediately delete the corresponding information from the backup system, but we will delete the information when the backup is updated.
      5. If the retention period stipulated by laws and administrative regulations has not expired, or if the deletion of personal information is technically difficult to achieve, we will stop processing other than storing and taking necessary security protection measures.
    4. Change the scope of your authorized consent
      1. Each business function requires some basic personal information to be completed, and after the withdrawal of consent, the corresponding business function can no longer be used.
      2. In addition, you can give or withdraw your authorization and consent according to the path settings of the "4.1 Access, Copy and Transfer of Your Personal Information" prompt.
      3. If you have other requests for withdrawal of consent that cannot be fulfilled, you may change the scope of your consent by sending a notice to the contact details specified in this policy.
      4. Once you have withdrawn your consent, we will no longer process the corresponding personal information. However, your decision to withdraw your consent will not affect the processing of personal information previously carried out on the basis of your authorization.
      5. In particular, if you do not wish to receive commercial promotional communications from us, you may unsubscribe or contact us by replying to the unsubscribe method expressly stated in the promotional email or SMS.
    5. Personal data subjects cancel their accounts
      1. Myyshop users can submit an account cancellation application through the account cancellation page of the Myyshop official website, please refer to the specific guidelines on the relevant product page. If you have any questions about the cancellation of your account, you can contact us at any time through the contact information specified in this policy, and we will respond to your access request within 15 working days.
      2. After canceling the account, we will stop providing you with products or services, and according to your request, delete your personal information or anonymize it, unless otherwise provided by laws and regulations.
      3. Please note that we have the right to retain your personal information for a reasonable period of time after your cancellation as required by laws and regulations. In the event of a dispute, you agree to use our system data as a standard and we will guarantee the authenticity of that data. After you confirm the successful cancellation, the account information, personal identification information, membership rights, etc. may not be restored or provided, but you shall still be responsible for your actions before canceling the account and during the use of the service.
    6. Constrains information systems to automate decision-making
      1. In some business functions, such as the login environment detection function, we may only make decisions based on non-manual automatic decision-making mechanisms including information systems, algorithms, etc. The decision may significantly affect your legitimate rights and interests, you have the right to ask us to make an explanation through the contact information specified in this policy, and you have the right to refuse us to make a decision only through automated decision-making, we will provide appropriate remedies to protect your legal rights, such as explaining to you the automated decision-making logic and the relevant impact on you, or introducing manual review to review the correctness of the automated decision-making results.
    7. In response to your above request
      1. For security purposes, you may be required to provide a written request or otherwise prove your identity. We may ask you to verify your identity before processing your request.
      2. We will respond within fifteen working days. If you are not satisfied, you can also make a complaint through the contact information specified in this policy.
      3. For your reasonable request, we will not charge a fee in principle, but for multiple repetitions and requests that exceed reasonable limits, we will charge a certain cost fee as appropriate. We may reject requests that are unwarrantedly repetitive, require excessive technical means (e.g., need to develop new systems or fundamentally change existing practices), pose a risk to the legitimate rights and interests of others, or are very impractical (e.g., involving information stored on backup tapes).
      4. In the following cases, we will not be able to respond to your request in accordance with the requirements of laws and regulations:
        1. In connection with the fulfillment of obligations under laws and regulations by personal information processors;
        2. Directly related to national security and national defense security;
        3. Directly related to public safety, public health, or major public interests;
        4. Directly related to criminal investigation, prosecution, trial and enforcement of judgments;
        5. Where the personal information processor has sufficient evidence that the Personal Data Subject has subjective malice or abuses of rights;
        6. For the purpose of safeguarding the life, property, or other major lawful rights and interests of the subject of personal information or other individuals, but it is difficult to obtain the consent of the person;
        7. Responding to your request will cause serious harm to the lawful rights and interests of the personal data subject or other individuals or organizations;
        8. Involving trade secrets.
  1. How we process children's personal information
    1. According to the relevant laws and regulations, if you are a minor under the age of 18, you should obtain the written consent of your parent or legal guardian before using the Myyshop service. If you are the guardian of a minor, if you have questions about the personal information of the minor under your guardianship, please contact us through the contact information in this policy.
    2. When you browse our products in a non-login state, we will only collect information about your personal current device status and necessary personal common device information in the process of using a specific product, and subject to existing technology restrictions, we cannot determine whether you are a child under the age of 14, but we will use such information in strict accordance with your authorized consent and protect your personal information in accordance with the commitments of this policy.
    3. In particular, if you are under the age of 14 and have not consented to your parent or guardian, you should not create your own personal account or use our Services. In the case of personal information of minors under the age of 14 collected with the consent of a parent or guardian, we will only use or publicly disclose this information as permitted by relevant laws and regulations, with the explicit consent of the parent or guardian, or as necessary to protect the minor.
    4. If we find that we have collected personal information from a minor under the age of 14 without achieving the consent of a verifiable parent or guardian, we will seek to delete the relevant data as soon as possible.
  2. We protect the personal information of deceased users
    1. After the death of a user (natural person only), his or her close relatives may, for their own legitimate and legitimate interests, exercise the right to consult, copy, correct, delete, etc. on the personal information of the deceased user through the contact information agreed in this policy, unless otherwise arranged before the deceased user's death.
    2. You understand and confirm that in order to fully protect the personal information rights and interests of deceased users, the close relatives of deceased users who apply to exercise the rights in this article need to submit the identity documents of the deceased users, death certificate documents, identity documents of the applicant, and proof of the relationship between the applicant and the deceased user in accordance with the specified procedures or customer service tips of the Myyshop, and provide the types and purposes of the rights applied for exercise. You can further obtain more information about the personal information protection process and conditions of deceased users through the contact information specified in this policy.
  3. How your personal information is transferred globally
    1. In principle, the personal information we collect and generate in the territory of the People's Republic of China will be stored in China in accordance with the requirements of applicable law.
    2. If we provide your personal information abroad for purposes necessary for the performance of our contract with you or other legitimate processing grounds, we undertake to meet the conditions required by current laws and regulations. Such countries may have different data protection laws or even no applicable laws. In such cases, we will evaluate and do our best to ensure that your personal information is adequately and equally protected in China in accordance with the requirements of PRC law. For example, adopt encrypted transmissions, regularly assess the level of security capabilities of audit recipients, and enter into data processing agreements/terms.
  4. How we update our Privacy Policy and Guidelines and applicable laws
    1. Our Privacy Policy and product-specific privacy guidelines are subject to change. We will not reduce your rights under this Policy and product-specific privacy guidelines without your explicit consent. We will publish an updated version of this Policy and product-specific privacy guidelines.
    2. We may also provide more notable notice of material changes (including, for certain services, we will send a notice via intra-site mail explaining the specific changes to this policy).
    3. Significant changes to this Policy and product-specific privacy guidelines include, but are not limited to:
      1. Our service model has changed significantly. Such as the purpose of processing personal information, the type of personal information processed, the use of personal information, etc.;
      2. We have undergone significant changes in our ownership structure, organizational structure, etc. Such as business adjustments, bankruptcy mergers and acquisitions caused by changes in ownership, etc.;
      3. Changes in the main objects of external provision, transfer or public disclosure of personal information;
      4. significant changes in your rights to participate in the processing of your personal information and the manner in which they are exercised;
      5. When there is a change in the department responsible for handling the security of personal information, contact information and complaint channels;
      6. When the personal information security impact assessment report indicates that there is a high risk.
    4. The establishment, enforcement, interpretation and dispute resolution of this Policy and the privacy guidelines for specific products shall be governed by the laws of the People's Republic of China (excluding Hong Kong, Macao and Taiwan), excluding the application of conflict of laws.
  5. How to contact us
    1. We have a department dedicated to the protection of personal information, you can contact them in the following ways, in general, we will reply within fifteen working days.

Company Name: Digital Trade Fuxuan (Shenzhen) Co., Ltd

Registered address: 1702, Building 3, Excellence Meilin Central Plaza (North District), No. 128 Zhongkang Road, Meidu Community, Meilin Street, Futian District, Shenzhen

Common office address:

Customer service contact information: WeChat public account "Myyshop", add customer service WeChat

Contact information of the department responsible for personal information protection:

    1. If you are not satisfied with our reply, especially if our personal information processing has harmed your legitimate rights and interests, and the consultation cannot be reached, you can also file a lawsuit with the competent court where Digital Trade (Shenzhen) Co., Ltd. is located to seek a solution.