Cookie Protocol
Your trust is very important to us and we are aware of the importance of your personal information to us. In light of this, Wannalooks Service Provider (or "we") have established this Privacy Policy (hereinafter referred to as "this Policy / this Privacy Policy").
This Policy relates to the Wannalooks service that you use and the various business functions included in that service (collectively, "our products and/or services"). Before using our products and/or services, please read this Policy carefully and thoroughly understand it, especially the terms highlighted in bold/underlined, which you should read it carefully and use the products or services after you have confirmed that you fully understand and agree to it. By using our products and/or services, you acknowledge that you have fully understood and agreed to this policy.
In order to bring you a better experience with our products and services, we are continuously working to improve our technology, and we may introduce new or optimized features from time to time, which may require the collection and use of new personal information or change the purpose or manner of use of personal information. In this regard, we will separately explain to you the purpose, scope and use of the corresponding information by updating this policy, pop-up windows, page prompts, etc., and provide you with the means to choose your own consent, and collect and use it after obtaining your express consent. If you have any questions, comments or suggestions about the content of this policy, you can contact us through Wannalooks online customer service.
Part I Privacy Policy
This Privacy Policy section will help you understand the following.
- 1. How we collect and use your personal information
- 2. How we use cookies and similar technologies
- 3. How we share, transfer and publicly disclose your personal information
- 4. How we protect your personal information
- 5. How we store your personal information
- 6. How you manage your personal information
- 7. How we handle personal information of minors
- 8. How to update this privacy policy
- 9. How to contact us
1. How we collect and use your personal information
When you use our products and/or services, we collect and use your personal information based on the following scenarios.
1) To achieve the functions necessary for the promotion
2) User registration
In order to register as a user and use our services, you will need to provide your cell phone number, your intended account name and password, and we will send you a verification code to verify your identity. After you have registered, you can continue to improve your real name, ID number, cell phone number, contact email and other personal information in your Wannalooks account.
3) Real name authentication
To ensure that we are serving you personally, we may verify your identity against your Wannalooks account information. You may provide us with the appropriate identification information (ID card, passport, family register and other identification information) to complete the verification process.
4) To show you information about our products/services
In the course of your use of our services, we may automatically collect and store web log information about your usage in order to identify abnormal account status, understand product suitability, and provide you with more relevant page displays and search results, including.
Device Information: We receive and record information about the device you are using, including device model, operating system version, unique device identifier (IMEI/Mac/android ID/IDFA/OPENUDID/GUID, SIM card IMSI information) and other hardware and software characteristics, and the location of the device, based on your specific actions during access and/or use. Related information (including your authorized GPS location and sensor information such as WLAN access points, Bluetooth and base stations).
Service log information: When you use the products or services provided by our website or client, we automatically collect details of your use of our services, which are kept as relevant web logs. For example, the content of your search queries, IP address, type of browser, telecommunication carrier, language used, date and time of access and records of the web pages you visit.
Please note that information such as equipment information and equipment operation information alone is information that cannot identify a specific natural person. If we combine such non-personal information with other information for the purpose of identifying a specific natural person or use it in combination with personal information, such non-personal information will be treated as personal information during the period of combined use, and we will anonymize and DE-identify such information unless we obtain your authorization or unless otherwise required by law or regulation.
If you have questions or objections about the personalized product or service information (if any) you have received, you may contact us at the contact information listed at the beginning of this Agreement.
5) Help you complete order placement and order management
When you order specific goods and/or services from our products and/or services, we will generate an order for you to purchase those goods and/or services through our system. In the process of placing an order, you are required to provide at least your consignee's name, delivery address, and consignee's contact telephone number, and the order will contain information about the goods and/or services you have purchased, the specific order number, the time the order was created, the amount you should pay, and we collect this information to help you complete the transaction smoothly, to protect your transaction security, to check the order information, to provide customer service and after-sales service, and for other purposes we expressly informed purposes.
You may order goods and/or services for another person through the Wannalooks Platform, and you will be required to provide the aforementioned personal information of the actual person ordering.
In order for you to understand the order information and to manage the order information, we will collect the order information generated by you in the process of using our services for display to you and to facilitate your management of the order.
6) Help to show you the delivery status of goods or services
In order for us to keep you informed of and confirm the progress and status of deliveries and to provide you with after-sales and dispute resolution services, you agree that we may collect information about the progress of deliveries from logistics-related service providers.
7) Help you to withdraw your balance
When the balance in your account reaches the withdraw-able amount, you can withdraw your balance by providing your name, ID card number, bank card number, issuing bank, and bank card region.
8) the functions necessary to safeguard the security of transactions
To improve the security of our systems when you use our products and/or services, to more accurately prevent phishing scams and to protect account security, we may determine the risk of your account by knowing your browsing information, order information, device information (including MAC address), and may record links that we consider risky ("URL "); we may also collect information about your device to analyze Wannalooks system problems, count traffic and identify possible risks, and check for abnormal messages if you choose to send them to us.
9) To provide you with other additional services
In order to provide you with more convenient and better services and to strive to enhance your experience, we may collect and use your personal information in the following additional services that we provide to you. If you do not provide this information, it will not affect your use of the basic services, but you may not be able to get the user experience that these additional services bring to you. You can check the status of these permissions on an item-by-item basis in your device settings and can decide for yourself whether to turn them on or off at any time.
Please note that by turning on any of the permissions, you authorize us to collect and use the relevant personal information to provide you with the corresponding services, and by turning off any of the permissions, you cancel your authorization, and we will no longer collect and use the relevant personal information based on the corresponding permissions, nor will we be able to provide you with the services corresponding to the permissions. However, your decision to turn off the permission will not affect the collection and use of information based on your authorization.
In order to protect your rights, we display the relevant operating system permissions that may be applied and used by the product through the following list, and you can manage the relevant permissions according to your actual needs.
In the case that you share or receive shared content, short links, etc., we may need to access your clipboard and read the password, share code, links contained therein to implement features or services such as automatic jumping, password jumping, sharing, etc.
10) Other rules for the collection and use of personal information
10.1 If the information that you provide contains personal information of other users, you need to ensure that you have obtained legal authorization before providing us with such personal information.
10.2 If we use your personal information for purposes other than those stated in this policy, or if we use information collected for a specific purpose for other purposes, or if we obtain your personal information from a third party on our own initiative, we will obtain your prior consent.
If we obtain your information indirectly from a third party, we will explicitly request the third party in writing to collect personal information after obtaining your consent in accordance with the law and inform you of the content of the information shared, and those involving sensitive information need to be explicitly confirmed by you before they are provided to us for use, and require the third party to make a commitment to the legality and compliance of the source of personal information, and if the third party has violated the act If the third party has violated the law, we will explicitly ask the other party to bear the corresponding legal responsibility; at the same time, our professional security team will carry out security reinforcement of personal information (including sensitive information reporting, encrypted storage of sensitive information, access rights control, etc.). We will use no less than the same protection means and measures as we do for our own users' personal information to protect the personal information indirectly obtained.
10.3 Exceptions for obtaining authorized consent
You fully understand and agree that your authorized consent is not required for us to collect and use your personal information and that we may not respond to your requests for correction/correction, deletion, cancellation, withdrawal of consent, or request for information when.
(1) related to national security and national defense security.
(2) related to public safety, public health, and significant public interest.
(3) related to crime investigation, prosecution, trial and sentence enforcement and other judicial or administrative law enforcement.
(4) For the purpose of safeguarding your or other individuals' life, property, and other significant legal rights and interests but where it is difficult to obtain your consent.
(5) Personal information that you disclose to the public at your own discretion.
(6) Those that collect personal information from legitimate public disclosures, such as legitimate news reports, government information disclosure and other channels.
(7) As necessary to enter into and perform the relevant agreement or other written document with you.
(8) Necessary for maintaining the safe and stable operation of the products and/or services provided, such as the detection and disposal of product and/or service failures.
(9) Necessary for legitimate journalism.
(10) When an academic research institution conducts statistical or academic research necessary in the public interest and provides the results of academic research or descriptions to the public, the personal information contained in the results is DE-identified.
(11) Other circumstances specified in laws and regulations.
Please be aware that, in accordance with applicable law, if we take technical and other necessary measures to process personal information in such a way that the recipient of the data cannot re-identify a specific individual and cannot recover it, or if we may DE-identify the information collected for research, statistical analysis and forecasting purposes, for the purpose of improving the content and layout of the Wannalooks Platform, to support products or services for business decisions, and to improve our products and services, then such processed data may be used without separate notice to you and without your consent.
2. How we use cookies and similar technologies
(1) Cookies
To ensure that the Site works efficiently and effectively and to make your visit easier, we may store information on your computer or mobile device: these may be cookies, Flash cookies, or other local storage provided by your browser or associated applications (collectively, "cookies") ).
Please understand that some of our services are only available through the use of cookies. You may modify your acceptance of cookies or refuse our cookies if your browser or browser add-on service allows it, but refusing our cookies may in some cases affect your ability to access the Site and use the services we provide safely.
You may modify your acceptance of cookies or reject our cookies if your browser or browser add-on service allows you to do so, but if you do so, it may in some cases affect your ability to access our site securely and may require you to change your user settings each time you visit our site.
(2) Web beacons and pixel tags
In addition to cookies, we use other similar technologies on our website, such as web beacons and pixel tags. For example, an email we send you may contain a link to an address that links to content on our site, and if you click on that link, we track that click to help us understand your product or service preferences so that we can proactively improve our customer service experience. A web beacon is typically a transparent image embedded in a website or email. With the help of pixel tags in emails, we can tell if an email has been opened. If you do not want your activity to be tracked in this way, you can unsubscribe from our mailing list at any time.
3. How we share, transfer and publicly disclose your personal information
(1) Sharing
We will not share your personal information with any company, organization or individual outside of Chengdu Pairuo Import & Export Trading Co.
1.1 Sharing with explicit consent: We will share your personal information with other parties after obtaining your explicit consent.
1.2 Sharing under legal circumstances: We may share your personal information to the public in accordance with the provisions of laws and regulations, the need for litigation dispute resolution, or as requested by administrative or judicial authorities in accordance with the law.
1.3 Sharing under your active choice: When you purchase goods or services through the Wannalooks platform, we will share the necessary information related to the transaction in your order information to the provider of the relevant goods or services according to your choice, in order to realize your transaction and after-sales service needs.
1.4 Sharing with Affiliates: Your personal information may be shared with our affiliates in order to facilitate our joint provision of services to you based on the affiliated account, to identify abnormalities in the member's account, or to protect the personal and property safety of Wannalooks affiliates or other users or the public from infringement. We will only share personal information that is necessary and subject to the purposes stated in this Privacy Policy, and will seek your authorized consent again if we share your personally sensitive information or if our affiliates change the purposes for which personal information is used and processed.
1.5 Sharing with Authorized Partners: To achieve the purposes stated in this Privacy Policy only, some of our services will be provided jointly by us and our authorized partners. We may share some of your personal information with our partners in order to provide better customer service and user experience. We will only share your user information for purposes that are legal, legitimate, necessary, specific, and explicit, and only as much user information as is necessary to provide the services. Our partners do not have the right to use the shared user information for any other purpose.
Currently, our authorized partners include the following types: suppliers, service providers and other partners. We send information to suppliers, service providers and other partners who support our business by providing basic technical services, providing customer service, consulting, analysis and other professional services.
For companies, organizations and individuals with whom we share user information, we enter into strict data privacy agreements requiring them to handle personal information in accordance with our instructions, this Privacy Policy and any other relevant confidentiality and security measures.
(2) Transfer
We will not transfer your personal information to any company, organization or individual, except for the following.
2.1 Obtain your prior express consent or authorization.
2.2 Provided in accordance with the applicable laws and regulations, the requirements of legal proceedings, and mandatory administrative or judicial requirements as necessary.
2.3 In accordance with the relevant agreements signed with you (including the online signed electronic agreement and the corresponding platform rules) or other legal documents agreed to be provided.
2.4 In the event of a merger, acquisition, transfer of assets or similar transaction involving the transfer of personal information, we will require the new company or organization holding your personal information to continue to be bound by this Privacy Policy, otherwise we will require the company or organization to seek your authorized consent again.
(3) Public disclosure
We will only publicly disclose your personal information if we take security measures that are consistent with industry standards and if.
3.1 To disclose personal information specified by you in accordance with your needs and in the manner of disclosure expressly agreed by you.
3.2 If we are required to provide your personal information by law, regulation, mandatory administrative enforcement or judicial requirements, we may publicly disclose your personal information based on the type of personal information requested and the manner of disclosure. Subject to laws and regulations, when we receive a request for such disclosure, we will require that a legal document, such as a subpoena or letter of inquiry, must be produced in response. We strongly believe in being as transparent as possible about the information we are asked to provide, to the extent permitted by law. We carefully review all requests to ensure that they have a legitimate basis and are limited to data that law enforcement has a legitimate right to obtain for specific investigative purposes. To the extent permitted by law or regulation, the documents we disclose are protected by encryption keys.
(4) Exceptions for sharing, transferring, and publicly disclosing personal information with prior authorized consent
Your prior authorized consent is not required for the sharing, transfer, or public disclosure of your personal information in the following circumstances.
4.1 In connection with the performance of our obligations under laws and regulations.
4.2 Related to national security, national defense security.
4.3 Related to public safety, public health, significant public interest.
4.4 Related to crime investigation, prosecution, trial and sentence enforcement, etc..
4.5 For the protection of your or other individuals' life, property and other significant legitimate rights and interests but it is difficult to get my consent.
4.6 Personal information that you disclose to the public on your own.
4.7 Collection of personal information from legitimate public disclosures, such as legitimate news reports, government information disclosure and other channels.
According to the law, sharing or transferring personal information that has been DE-identified and ensuring that the recipient of the data cannot recover and re-identify the subject of the personal information is not an act of sharing, transferring or publicly disclosing personal information to the public, and the storage and processing of such data will not require separate notification to you and your consent.
4. How we use cookies and similar technologies
(1) Cookies
To ensure that the Site works efficiently and effectively and to make your visit easier, we may store information on your computer or mobile device: these may be cookies, Flash cookies, or other local storage provided by your browser or associated applications (collectively, "cookies") ).
Please understand that some of our services are only available through the use of cookies. You may modify your acceptance of cookies or refuse our cookies if your browser or browser add-on service allows it, but refusing our cookies may in some cases affect your ability to access the Site and use the services we provide safely.
You may modify your acceptance of cookies or refuse our cookies if your browser or browser add-on service allows you to do so, but if you do so, it may in some cases affect your ability to access our site securely and may require you to change your user settings each time you visit our site.
(2) Web beacons and pixel tags
In addition to cookies, we use other similar technologies on our website, such as web beacons and pixel tags. For example, an email we send you may contain a link to an address that links to content on our site, and if you click on that link, we track that click to help us understand your product or service preferences so that we can proactively improve our customer service experience. A web beacon is typically a transparent image embedded in a website or email. With the help of pixel tags in emails, we can tell if an email has been opened. If you do not want your activity to be tracked in this way, you can unsubscribe from our mailing list at any time.
5. How we protect your personal information security
(1) We take the security of your information very seriously. We have implemented reasonable and practicable security measures in accordance with industry standards to protect your information from unauthorized access, public disclosure, use, modification, damage or loss. For example, the exchange of data between your browser and our servers is protected by encryption over the SSL protocol; we also provide secure browsing over the HTTPS protocol on the Wannalooks Platform; we use encryption technology to enhance the security of personal information; we use trusted protection mechanisms to prevent malicious attacks on personal information; we deploy access control mechanisms to ensure that only authorized personnel have access to We will use trusted protection mechanisms to prevent malicious attacks on personal information; we will deploy access control mechanisms to ensure that only authorized personnel have access to personal information; and we will hold security and privacy training courses to enhance employee awareness of the importance of protecting personal information.
(2)We have an industry-advanced data security management system that focuses on data and revolves around the data life cycle, and improves the security of the entire system in multiple dimensions, including organizational construction, system design, personnel management, and product technology.
(3) We will take reasonable and practicable steps to use our best efforts to avoid collecting irrelevant personal information. We will only retain your personal information for as long as necessary to achieve the purposes described in this policy, unless an extension of the retention period is required by mutual agreement or permitted by law. We will delete or anonymize your personal information after the retention period described above.
(4) In the event that our products and services cease to operate, we will take reasonable measures to protect the security of your personal information, including promptly ceasing activities that continue to collect personal information; notifying users of the cessation of operations by delivery or announcement on a case-by-case basis; and deleting or anonymize the personal information held, etc.
(5) You should also protect the security of your account. When using the Wannalooks Platform services, we strongly recommend that you do not use communication methods other than those recommended by Wannalooks Platform to send your information, and that you also use complex passwords to protect the security of your account. When using the Wannalooks platform products or services, you will inevitably have to disclose your personal information, such as contact information or contact address, to counter-parties or potential counter-parties. In addition, you may also use our services to establish communication with third parties, exchange information or analyze content. Please protect your personal information and provide it to others only when necessary. If you discover that your personal information, especially your account or password, has been compromised, please contact Wannalooks Customer Service immediately so that we can take appropriate action upon your request.
(6) After the unfortunate occurrence of personal information security incidents, we will inform you in a timely manner in accordance with the requirements of laws and regulations: the basic situation of the security incident and the possible impact, the disposal measures we have taken or will take, the suggestions you can independently prevent and reduce the risk, the remedial measures for you, etc. We will inform you by email, letter, telephone, push notification, etc. When it is difficult to inform the subject of personal information one by one, we will take a reasonable and effective way to publish the announcement.
At the same time, we will also report the disposition of personal information security incidents in accordance with regulatory requirements.
6. How we store your personal information
(1) Storage Location
Personal information collected and generated in our operations in the People's Republic of China will be stored in China. We will provide your personal information to entities outside of China after we have fulfilled our obligations under the law under the following circumstances.
1.1 The applicable laws are clearly defined.
1.2 Obtain your express authorization; or
1.3 Your personal active behavior such as cross-border transactions via the Internet.
In the above cases, we will ensure that your personal information is protected to a degree no less than that specified in this policy, including through contracts.
(2) Storage Period
We will take reasonable and practicable steps to avoid collecting and processing unrelated personal information. We will only retain your personal information for as long as necessary to achieve the purposes described in this policy, unless there is a mandatory retention requirement by law. We judge the duration of storage of personal information by reference to the following criteria and whichever is longer.
2.1 Complete the transaction purposes related to you, maintain the corresponding transaction and business records in response to your possible inquiries, complaints or litigation.
2.2 To ensure the safety and quality of the services we provide to you.
2.3 Whether you agree to a longer retention period.
2.4 Whether there is any other special agreement on the retention period.
After the retention period has expired, we will delete or anonymize your personal information as required by applicable law.
7. How you manage your information
You can access and manage your information in the following ways.
(1) Inquiries, corrections and additions to your information
You have the right to access, correct or supplement your information. You can access and correct your personal data and account information by logging into the Wannalooks mobile client, going to the "Personal Center" page and clicking on the settings icon in the upper right corner.
If you are unable to access such personal information through the above mentioned channels, you may contact us at any time through Wannalooks online customer service.
(2) Delete your information
You may delete some of your information in the manner specified in "(a) Inquiries, corrections and additions to your information". You may make a request to us to delete your personal information in the following cases.
2.1 If our handling of personal information violates laws and regulations.
2.2 If we collect and use your personal information without your explicit consent.
2.3If our handling of personal information is in material breach of the agreement with you.
2.4 if you cancel your Wannalooks platform account.
2.5 If we terminate the service and operation.
If we decide to respond to your request for deletion, we will also, to the extent possible, simultaneously notify the subjects who received your personal information from us and request that they delete it promptly, unless otherwise required by law or regulation, or unless these entities have your independent authorization. When you delete information from our service, we may not immediately delete the corresponding information from our backup system, but will delete it when the backup is updated.
(3) Change the scope of your authorized consent
Each business function requires some basic personal information in order to be completed (see "Part I" of this Privacy Policy). In addition, you can give or withdraw your consent in your device settings or in our client's "Personal Center - Settings - Account Security - System Permissions" or by contacting Wannalooks Customer Service. Please note, however, that we may not be able to respond to your request to change the scope of your authorization for certain types of personal information, such as information necessary to perform the basic functions of Wannalooks products or services, or information necessary for us to fulfill our obligations under law or regulation (see (v) Responding to your request above).
When you withdraw your consent, we will no longer process the corresponding personal information. However, your decision to withdraw your consent will not affect the processing of personal data previously carried out on the basis of your authorization.
(4) Cancellation of your account
You may request to cancel your account by logging into the Wannalooks mobile client and going to "Personal Center - Settings - Account & Security - Cancel Account". After you voluntarily cancel your account, we will stop providing you with products or services and delete or anonymize your personal information as required by applicable law. (v) To respond to your request above
For security purposes, you may be required to provide a written request or otherwise prove your identity. We may ask you to verify your identity before processing your request.
We will respond within 15 days. If you are not satisfied, you can also initiate a complaint through the Wannalooks platform customer service.
In principle, we do not charge a fee for your reasonable requests, but we will charge a fee for repeated requests that exceed reasonable limits, at our discretion. We may deny requests for information that is not directly related to your identity, that is unwarranted repetitive, or that requires excessive technical means (for example, requiring the development of new systems or fundamental changes to current practices), that poses a risk to the legal rights of others, or that is impractical.
We will not be able to respond to your request if we are required by law or regulation to do so in the following circumstances.
4.1 Related to national security and national defense security.
4.2 Related to public safety, public health, significant public interest.
4.3 Related to crime investigation, prosecution, trial and enforcement of sentences, etc..
4.4 There is sufficient evidence of subjective malice or abuse of rights by the subject of personal information.
4.5 Response to your request will lead to serious damage to the legitimate rights and interests of you or other individuals or organizations.
4.6 Involving trade secrets.
8. How we handle personal information of minors
The products and services of the Wannalooks Platform are intended primarily for adults. Minors are not allowed to create their own user accounts without the consent of their parents or guardians. If you are a minor, we recommend that you ask your parent or guardian to read this Privacy Policy carefully and to use our services or provide us with information with the consent of your parent or guardian.
In cases where we collect personal information from minors with the consent of their parents or guardians to use our products or services, we will only use, share, transfer or disclose this information as permitted by law or regulation, with the express consent of the parent or guardian, or as necessary to protect the minor.
9. How to update this privacy policy
(1) This Privacy Policy may be updated to provide you with better service and as Wannalooks develops its business. However, we will not reduce your rights under this Privacy Policy without your express consent. We may issue updated versions on the Wannalooks website, Wannalooks mobile and alert you to the updates by posting on the website or by other appropriate means before they become effective, and please visit Wannalooks to keep up to date with the latest Privacy Policy.
(2) For material changes, we will also provide more prominent notice (we will provide specific changes to our privacy policy by means including, but not limited to, email, text message or a special notice on the page you are viewing).
Material changes within the meaning of this policy include, but are not limited to.
2.1 Significant changes in our service model. Such as the purpose of handling personal information, the type of personal information handled, and the way personal information is used.
2.2 We have significant changes in control and other aspects. Such as change of information controllers caused by mergers and acquisitions, reorganizations, etc..
2.3 A change in the main target of personal information sharing, transfer or public disclosure.
2.4 Significant changes in your rights to participate in the processing of personal information and the manner in which they are exercised.
2.5 Change in the person responsible for handling personal information security or contact and complaint channels in our charge.
2.6 The personal information security impact assessment report indicates a high risk.
10. How to contact us
You can contact us in the following ways, we will reply to your request within 15 days: If you have any questions, comments or suggestions about the content of this policy, you can contact us through the Wannalooks platform online customer service
If you are not satisfied with our response, especially if you believe that our personal information processing actions have harmed your legitimate rights and interests, you can also seek a solution by filing a lawsuit with the court with jurisdiction in the defendant's domicile