Privacy policy

Dear iChainfo users: the operator of the iChainfo website (or "we") attaches great importance to the protection of users' privacy and personal information. When you use all services provided by our platform, we will process (including collecting, storing, using, transmitting, providing, disclosing, etc.) your personal information in accordance with this privacy policy. This privacy policy contains our terms for processing and protecting your personal information. We hope that this privacy policy can clearly introduce to you how we handle your personal information. Therefore, we suggest you read this privacy policy completely. If you do not agree with any content of this privacy policy, you should immediately stop using any services of the iChainfo platform. When you actually use the services provided by the iChainfo platform, it means that you have agreed to legally process and protect your personal information in accordance with this Privacy Policy (including the updated version).

Definition

  1. iChainfo: refers to the single name or combined name of the operators of iChainfo.

  2. iChainfo platform: refers to the iChainfo website operated by iChainfo operators (including new forms of future technological development, such as official accounts and small programs).

  3. Personal information refers to all kinds of information related to identified or identifiable natural persons recorded electronically or otherwise, excluding information after anonymization.

  4. Sensitive personal information: refers to personal information that, once leaked or illegally used, is likely to cause the human dignity of natural persons to be infringed or the personal and property safety to be endangered, including biometrics, religious beliefs, specific identities, medical and health care, financial accounts, whereabouts and other information, as well as the personal information of minors under the age of 14.

  5. Unless otherwise agreed, the relevant definitions in this policy are consistent with those in the iChainfo user service terms.

Scope of application

This privacy policy is applicable to all services provided by the iChainfo platform. If products or services provided by iChainfo are used in the products or services of our affiliated companies but no independent privacy policy is set, this privacy policy is also applicable to these products or services. We will process your personal information in strict accordance with the scenarios described in this policy. If it goes beyond the scope of this policy, we will inform you again and obtain your express consent.

This privacy policy does not apply to services provided to you by other third parties. For example, when merchants on the iChainfo platform provide services to you based on the iChainfo platform, the personal information you provide to merchants is not applicable to this privacy policy. If our products and / or services contain or link to information and / or third-party services (including any third-party applications, websites, products, services, etc.), these information and / or services are operated by the third party, and your use of such information and / or services applies to the rules for collection and use of personal information separately explained to you by the third party.

How do we collect and use your personal information

Generally, we will collect and use your personal information in the following scenarios

We may collect, save and use the following information related to you to meet your corresponding needs. If you do not provide relevant information, you will not be able to enjoy the products and / or services provided by us.

  1. Registration and login account: when you create an iChainfo account and use it, you may be required to provide personal information, including but not limited to mobile phone number, email address, name, gender, age, ID number, occupation, address, etc. If you refuse to provide it, we may not be able to create an account and provide services for you.

  2. Authorized login: if technology allows, you can also use a third-party platform such as wechat / Weibo or other ways to obtain your personal information for account login. You authorize us to obtain the above information under the third-party account for binding with the iChainfo platform account, so that you can directly log in and use the services provided by us. We will use your personal information according to the agreement with a third party and on the premise of complying with relevant laws and regulations.This information is collected to help you create an account. If you refuse to provide this information, your registration will be affected.

  3. We use your personal information mainly for the following behaviors:

    1. Identity verification and customer service to ensure that the platform provides you with the best service;

    2. Provide you with security: In order to understand the adaptability of system operation functions, we may collect device information (including: device name, device model, operating system version, resolution, browser type, CPU information, storage size, available storage size, available memory size, total memory size, mobile phone power, mobile phone screen brightness) of your products and / or services, We will comprehensively judge your account and transaction risks according to your usage habits, including identity verification, prevention, detection and investigation of possible security risks such as fraud, network viruses and network attacks, as well as violations of agreements, policies or rules of us or our affiliated companies, so as to protect the legitimate rights and interests of you, other users, US or our affiliated companies, and record some links that we think are at risk.

Your personal information that we may indirectly collect

If we obtain the information you authorize to share from a third party, we promise that we will ask the third party to explain the source of personal information before collecting the information, and confirm the legality of its source of personal information; We will understand and carefully note that the third party has obtained the scope of authorization and consent for your personal information processing, including the purpose of use, whether you authorize and agree to transfer, sharing, public disclosure, etc. If the third party violates the law, we will explicitly require the other party to bear corresponding legal responsibilities. At the same time, we will protect the personal information obtained indirectly by using the same protection means and measures as our own users' personal information. If the personal information processing activities we need to carry out business exceed the scope of this authorization, we will obtain your express consent before processing your personal information.

  1. Necessary for entering into and performing the contract to which you are a party;

  2. Necessary to fulfill our legal obligations;

  3. Necessary to deal with public health emergencies or to protect the life, health and property safety of natural persons in emergencies;

  4. Carry out news reporting, public opinion supervision and other activities for the public interest, and process your personal information within a reasonable range;

  5. Handle your personal information disclosed by yourself or other legally disclosed personal information within a reasonable range in accordance with the law;

  6. Other circumstances stipulated by laws and administrative regulations.

How do we share, transfer, publicly disclose and entrust to process your personal information

Sharing personal information

We will abide by relevant laws and regulations and keep your personal information confidential. We will not share your personal information with others except for the following cases:

  1. Obtain your explicit consent or authorization in advance;

  2. Based on the legal situation without your consent: according to the provisions of laws and regulations, the need for litigation dispute resolution, or the requirements of administrative, judicial and other competent authorities according to law. On the premise of complying with laws and regulations, when we receive the above request for disclosure of information, we will require the relevant subject issuing the request to issue corresponding legal documents, such as subpoenas or investigation letters.

  3. We may share your personal information with suppliers of technical services and third-party merchants, which may include order information, contact information, payment information, address information, location information, device information (hardware serial number, MAC address, unique device identification code (IMEI, Android ID, IDFA, openudid, guid, SIM card IMSI information, oaid)) to ensure the smooth completion of the goods / services booked for you. However, we will only share your personal information for legitimate, legitimate, necessary, specific and explicit purposes, and only share the personal information necessary for providing services.

  4. In order to protect your legitimate rights and interests, we may provide your trading counterpart or interested third parties with information necessary for resolving trading disputes or disputes when assisting in handling trading disputes or disputes related to you.

  5. According to legal provisions and reasonable business practices, when we plan to merge with or be acquired by other companies or carry out other capital market activities (including but not limited to IPO and bond issuance), and when we need to accept due diligence from other subjects under other circumstances, if it involves providing your information, we will require these subjects to take reasonable confidentiality measures for your personal information by signing non disclosure agreements with them, and inform you of the name or name of the recipient, contact information, processing purpose, processing method and type of personal information before providing your personal information to relevant subjects, and obtain your consent.

  6. If we determine that you have violated laws and regulations or seriously violated relevant agreements and rules of the platform, or in order to protect the personal and property safety of platform users or the public from infringement, we may disclose personal information about you in accordance with laws and regulations or with your consent, including relevant violations and the measures the platform has taken against you.

  7. You can share your personal information with others and social networks based on the services of the iChainfo platform, and choose the object to share independently. When you share your personal information with others, social networks or third-party service providers, or use it in combination with the services of a third party, or use the service links of a third party, you may be disclosed or made available to a third party. We recommend that you check the privacy statements of such social networks or third-party service providers to understand how they process your information. You shall bear the consequences arising from sharing personal information with others when you use third-party services, and the corresponding responsible party shall be responsible within the scope of laws.

Transfer of personal information

With the development of our business, we and our affiliated companies may carry out merger, acquisition, asset transfer or similar transactions. If the transfer of personal information is involved, we will inform you of the name or contact information of the receiver. We will also require the receiver to continue to be bound by this privacy policy. Otherwise, we will require the receiver to seek your authorization again.

Public disclosure of personal information

We will only publicly disclose your personal information under the following circumstances:

  1. After obtaining your separate consent;

  2. Disclosure based on law: we may publicly disclose your personal information according to the type and disclosure method of personal information required by law, legal procedures, litigation or mandatory requirements of government authorities. On the premise of complying with laws and regulations, when we receive the above request for disclosure of information, we will require the relevant subject issuing the request to issue corresponding legal documents, such as subpoenas or investigation letters.

Entrusted processing

  1. In order to improve the efficiency of information processing, we may entrust a third party to process your personal information on our behalf. As for the third party entrusted by us to process personal information, we will sign an entrusted processing agreement with it, specifying the purpose, duration, processing method, type of personal information, protection measures, rights and obligations of both parties, and supervise it to process your personal information in accordance with the agreement, this policy and the requirements of applicable laws and regulations.

  2. Third party SDK service providers: In order to ensure the stable operation and function realization of the platform, so that you can use and enjoy more services and functions, we may embed SDKs of other service providers or other similar applications. We will conduct strict security monitoring on the software tool development kit (SDK) and application program interface (API) used by service providers to obtain information to protect data security.

How do we protect your personal information

  1. We will provide corresponding security measures according to the existing technology to protect your information and provide reasonable security guarantees. We will try our best to ensure that your information is not leaked, damaged or lost. We have used security protection measures in line with industry standards to protect the personal information provided by you from unauthorized access, public disclosure, use, modification, damage or loss. We will take the following measures to protect your personal information:

    1. We will use trusted protection mechanisms to prevent malicious attacks on data;

    2. We will deploy an access control mechanism to ensure that only authorized personnel can access personal information;

    3. We will hold security and privacy protection training courses to enhance employees' awareness of the importance of protecting personal information.

  2. Please help us to ensure the security of your account. We will try our best to ensure the security of the personal information you send us. If you find that your personal information is leaked, especially your account information, please contact us immediately according to the contact information provided at the end of this privacy policy, so that we can take corresponding measures to protect your information security.

  3. Once a security incident occurs, we will inform you of the basic situation and risk of the incident, the measures we have taken or will take, and your suggestions on how to reduce the risk by yourself. We will timely notify the affected users of security incidents by means of push notification, letter or telephone. When it is difficult to inform users one by one, we will issue warning information by issuing platform announcements.

How do we store your personal information

Storage location

The personal information we collect about you will be stored and used in Hong Kong. If it involves the transmission of personal information abroad, we will clearly inform you of the purpose of the export of personal information, the name and contact information of the recipient, the processing method, the type of personal information, and the method and procedure for you to exercise your rights to the overseas recipient, and obtain your separate consent.

Storage period

We will only retain your personal information for the shortest period necessary to achieve the purpose stated in this policy, unless we have special agreements with you or mandatory retention requirements under laws and regulations.

How do you manage your personal information

Information deletion

In the following cases, you can request us to delete your personal information:

  1. If our handling of personal information violates laws and regulations;

  2. If we collect and use your personal information without your consent;

  3. If our handling of personal information violates our agreement with you;

  4. If you no longer use our products or services, or you cancel your account;

  5. If we no longer provide you with products or services, or the storage period has expired;

  6. The purpose of personal information processing has been achieved, cannot be achieved or is no longer necessary to achieve the purpose of processing;

  7. You withdraw your consent.

If we decide to respond to your request for deletion, we will also notify the entities that have obtained your personal information from us and ask them to delete it on time, unless otherwise provided by laws and regulations, or these entities have obtained your independent authorization.

When you or we assist you to delete the information, we may not delete the corresponding information from the backup system immediately. We will securely store your personal information and restrict any further processing until it can be deleted or anonymous

We may refuse information that is not directly related to your identity, information that is repeatedly applied for without reasonable reasons, or requests that require too many technical means (such as the need to develop new systems or fundamentally change existing practices), pose risks to the legitimate rights and interests of others, or are unrealistic. In the following cases, we will not be able to respond to your request according to the requirements of laws and regulations:

  1. Directly related to national security and national defense security;

  2. Directly related to public safety, public health and major public interests;

  3. Directly related to criminal investigation, prosecution, trial and judgment execution;

  4. There is sufficient evidence to show that you have subjective malice or abuse of rights;

  5. Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals and organizations.

  6. Involving trade secrets.

Protection of minors' personal information

Our website and services are mainly for adults. If you are a minor, you should ask your parents or guardians to carefully read this privacy policy, and use our services or provide information to us with the consent of your parents or guardians.

In the case of collecting personal information of minors by using our products or services with the consent of parents or guardians, we will only use, share, transfer or disclose this information when laws and regulations allow, parents or guardians explicitly agree or it is necessary to protect minors. If we find that we have collected the personal information of minors without the prior consent of verifiable parents or legal guardians, we will try to delete the relevant data as soon as possible.

Update of this policy

In order to provide you with better services, we will update the terms of the privacy policy according to the business changes from time to time and the relevant requirements of laws and regulations. We will remind you of the update of relevant content by sending updated versions on our website and mobile terminal or by other means. Please also visit to learn the latest privacy policy on time. By continuing to use our services, you mean that you have fully read, understood and agreed to be bound by the revised privacy policy.

Last updated