Privacy Policy

HAOMI Privacy Policy
Update date: July 26, 2022

Effective date: July 26, 2022

【Important Notice】

Hangzhou HAOMI Digital Technology Co., Ltd. and its affiliated companies (hereinafter referred to as "HAOMI" or "we") attach great importance to the protection of user privacy. We are well aware of the importance of personal information to users (hereinafter referred to as "you"), and we will take appropriate security protection measures in accordance with legal and regulatory requirements to try our best to protect the security and controllability of your personal information. To this end, we have specially formulated the "HAOMI Privacy Policy" (hereinafter referred to as "this policy") so that you can learn more about how we will collect, use, transmit, store and disclose your personal information and what rights you have. This policy applies to all services provided by HAOMI (hereinafter collectively referred to as "HAOMI Services"), including but not limited to HAOMI's official website (website: [www.HAOMI.com]), sub-sections of the aforementioned websites Domain name web platform and all HAOMI websites, products and services that display or link to this policy. When you use any individual service of HAOMI, you agree to be protected by this policy and the specific privacy policy terms we set in that individual service (hereinafter referred to as the "Specific Terms", if any), in which case specific The terms and the terms of this policy shall be effective for you at the same time. If the specific terms are inconsistent with this policy, the specific terms shall prevail. If this policy is inconsistent with similar provisions in HAOMI's "Legal Statement", this policy shall prevail. In addition, this policy does not apply to services provided by other companies or individuals (hereinafter referred to as "Third Party Services"). For the convenience of users, HAOMI services may contain third-party services or links to them; however, since the third party will independently collect and process your personal information and we have no control over it, unless otherwise provided by law, we will not be responsible for the third party. The service assumes no responsibility. You are required to read and refer to the privacy policies of these third parties and independently judge whether to use their services.

Before using HAOMI services, please read it carefully (minors should be accompanied by a guardian) and understand this policy, especially the terms marked in bold. You should read them carefully and confirm that you fully understand and agree. Start using again. When you choose to continue signing this policy or start using HAOMI services, it will be deemed that you have accepted and recognized this policy as necessary to provide products and services.

After reading this policy, if you have any questions about this policy or matters related to this policy, you can contact us through the feedback channels listed in the "How to Contact Us" section of this policy, and we will answer you as soon as possible.

This policy will help you understand the following:

  1. How we collect your personal information
  2. How we use your personal information
  3. How we use cookies and similar technologies
  4. How we protect and store your personal information
  5. How we entrust you to process, share, transfer and publicly disclose your personal information
  6. How you access and manage your personal information
  7. How we process personal information of minors
  8. How to update this policy
  9. How to contact us
  10. How we collect your personal information

(1) We will collect the following types of personal information from you through the following channels:

When using HAOMI services, you may need to actively submit to us or authorize us to collect and use personal information including the following two types:

  1. Personal information necessary to achieve the basic business functions of providing you with HAOMIservices. If you refuse to provide corresponding personal information, you will not be able to use HAOMIservices normally;
  2. Personal information required to provide you with additional business functions of HAOMIservices. If you refuse to provide it, you will not be able to use the relevant additional business functions normally or achieve the functional effects we intend to achieve, but it will not affect your normal use of the basic business functions of HAOMIservices.

Please note:

  1. Since we provide many products and services, the functions are diverse, and the specific services that different users choose to use are different; accordingly, the basic/additional functions and the type and scope of personal information collected and used will be different. Please refer to the specific service functions;
  2. If the information you submit to us or collect through our services contains personal information of others, you must ensure that you have legally obtained authorization from the relevant subject. In particular, if the aforementioned personal information involves children's personal information, you must obtain the consent of the corresponding child's guardian in advance.

(2) We will collect the following types of personal information from you for the following purposes:

  1. Register and log in

In order to register and log in to HAOMI services, you need to provide your basic registration or login information, such as your mobile phone number, email address, verification code matching results, and create your account, username, and password. If you only need to use basic functions such as search and browsing, you do not need to register or log in and provide the above information.

Please note that this policy does not apply to all registrations and logins of HAOMI services. Specifically: some services are provided to you after you register and log in to HAOMI Pass. We will adopt the "Haikvision Pass Privacy Policy" Collect and use your personal information; some services are equipped with specific terms, and we will collect and use your personal information through these specific terms.

  1. Recruitment services

In order to manage and process your job application, advance the recruitment process and provide recruitment-related services, we will collect and use the personal information you provide voluntarily or generated during the recruitment process, including basic information (such as real name, ID number, mobile phone number , email address), educational experience (such as graduation school, degree, major, admission date, graduation date, completion date), work experience (such as previous employer, position, entry date, resignation date, reporting relationship, salary level and Other work experience related information), other application materials (such as personal information you actively provide in job application forms and resumes), other information collected or generated during the recruitment process (such as information provided by third-party recruitment websites and headhunting service providers) ).

Please note that in order to verify the authenticity of the above information, with your consent, we may entrust a third-party company to conduct background checks to the extent permitted by laws and regulations.

In order to fulfill legal obligations (such as obligations stipulated in laws and regulations such as taxation, labor and social security, health, disease prevention and control, public security, market supervision, emergency management, immigration management, etc.), we may collect and use your basic information, Contact information, and other necessary application information.

In order to fulfill the company's legal obligations in financial matters, comply with internal and external audit requirements, and conduct cost/budget analysis and control, we may collect and use your basic information, contact information, job information you have applied for, and recruitment Other information collected or generated during the process.

In order to provide you with a convenient job application experience and comply with legal obligations related to fair employment and protection of persons with disabilities, with your consent, we may collect and use medical and health information related to your physical or mental health and medical conditions to provide you with a convenient job application experience. You provide additional support. The above information is sensitive personal information, please provide it with caution.

  1. Research or return visit service

In order to improve our services, we will conduct research or return visits to you. We will send you questionnaires via email, phone calls, online questionnaires on web pages, etc. to solicit your opinions or suggestions. Based on this, you may be required to provide your personal information, such as name, mobile phone number, and company name.

  1. Inquiry service

In some query services, we may collect your mobile phone number and verification code matching results, and then provide you with corresponding query results. The query results will be displayed to you in the relevant function pages.

  1. Customer service or other user response functions

We provide you with product and service consultation, usage support, pre-sales and after-sales services and other customer services through various methods such as telephone, email, and online systems. In order to better meet your needs, we may need you to provide your name, phone number, address, project name, company/organization name, verification code matching results, and project amount. In order to easily contact you, help you solve your problem as soon as possible, or record the solutions and results of related problems, we may need you to provide necessary personal information to match and verify your user identity. We may also collect and store your information in accordance with this policy. Communication/call records and related content with us (including account information, your contact information, feedback questions or suggestions).

  1. Rights protection report

You can give us feedback on clues about counterfeit goods you have discovered through our rights protection reporting channel. In order to facilitate contacting you and verifying the issues and content of your feedback, we may need you to provide your name, contact information and the content of the clues you have reported. .

  1. Security assurance and operation and maintenance services

In order to ensure your normal use of HAOMI services, maintain the normal operation of our services, improve and optimize our service experience, and protect your account security, we will collect relevant information generated during your use of HAOMI services, including :

(1) When you use HAOMI services, we will receive and record the device information you use to use HAOMI services, such as your computer hardware model and operation, based on the specific permissions granted during your use. System version number. Please understand that this information is the basic information we must collect to provide services and ensure the normal operation of our products.

(2) To help us better understand the operation of HAOMI services and ensure the safety of operation and service provision, we will record network log information, as well as the frequency of using related services, crash data, error reports or abnormal service data , System running status information of abnormal equipment.

  1. Provide you with information display and push of services or activities

Based on the information you provide us, the information we may collect, and your information we collect through indirect means (such as your browsing and search history, device information, location information), we may use one or more of the above Combining information, we perform recommendation algorithm modeling, programmatic advertising recommendation algorithm modeling, user behavior analysis and user portraits to extract features related to your browsing, search preferences, behavioral habits, and location information, so as to provide you with information that is more suitable for you. Display and recommend personalized content on required pages. We may also send you marketing information, event information, and user surveys through email, text messages, or other methods based on feature tags to help us improve our services and provide or promote our services.

If you want to manage our personalized services, you can do so according to the guidelines provided by the individual service you use.

  1. Participation in activities

We may launch short-term or long-term activities on this website from time to time (specifically, please refer to the actual activity page description). When you voluntarily choose to participate in these activities, you may be required to provide us with your personal information. The specific personal information that needs to be provided will be displayed on the actual activity page. The protection, storage, entrusted processing, sharing, transfer and disclosure of this personal information shall be handled in accordance with the provisions of this privacy policy.

  1. Exceptions with authorization and consent

According to relevant laws and regulations, your authorization is not required to collect your information in the following situations:

(1) Directly related to national security and national defense security;

(2) Directly related to public security, public health, and major public interests;

(3) Directly related to criminal investigation, prosecution, trial and judgment execution;

(4) To protect your or other individuals’ life, property and other major legitimate rights and interests but it is difficult to obtain your consent;

(5) The personal information collected is disclosed to the public by you yourself;

(6) Necessary to sign and perform the contract according to your requirements;

(7) Collect personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels;

(8) Necessary for conducting legitimate news reporting;

(9) Other situations stipulated by laws and regulations.

  1. Tips on sensitive personal information

Sensitive personal information refers to personal information that, once leaked or illegally used, may easily cause the dignity of a natural person to be infringed or the personal and property safety to be endangered. The above information provided by you or collected by us may include your sensitive personal information, such as ID number, bank account number, communication records and content, property information, and transaction information. Please be careful and pay attention to sensitive personal information. You agree that we can process your sensitive personal information in accordance with the purposes and methods described in this policy.

  1. How we use your personal information

(1) We will use your personal information in accordance with the following rules

  1. We will use it in accordance with the provisions of this policy and to achieve the corresponding product and/or service functions.
  2. We may integrate and use your personal information and/or other information related to your service or product usage behavior that we obtain in a legal way (hereinafter referred to as "other information") to prevent, discover, and investigate fraud and infringement. , endanger safety, illegal or violate agreements with us or our affiliates.
  3. We may process or combine your personal information with other information for the purpose of maintaining, improving, optimizing our products and/or services and enhancing user experience.
  4. When you access third-party services through HAOMIservices, we will share your personal information within the scope of your authorization with the third-party service provider based on your authorization.
  5. Other uses with your permission.

(2) Please note that all personal information you provide or authorize us to collect when using HAOMI services will not be collected when you use our products and services unless you delete it or refuse our collection through account settings or system settings. /Or continue to authorize us to use it during the service period. When you cancel your account, we will stop using and delete or anonymize your personal information, unless otherwise provided by laws and regulations.

(3) When we display you and the personal information you provide, we will desensitize your information using methods including content replacement and anonymization to protect the security of your information.

(4) Please understand that the functions and services we provide you are constantly updated and developed. If new functions or services require the collection and use of your personal information, we will use page prompts, interactive processes, website announcements, etc. We will separately inform you of the type, scope, purpose and usage rules of information collection and obtain your express consent.

(5) We hereby remind you that if the information cannot identify you individually or in combination with other information, it does not belong to your personal information in the legal sense; when your information can identify you alone or in combination with other information When you are personally identifiable or when we combine data that cannot be linked to any specific personal information with other personal information of yours, the information will be treated and protected as your personal information during the period of combined use in accordance with this policy.

  1. How we use cookies and similar technologies

(1) Cookies

  1. Cookie is a mechanism that supports the server (or script) to store and retrieve information on the website or client. When you use HAOMIservices, we will send one or more small data files named Cookies on your computer or mobile device. The Cookie assigned to you is unique, and it can only be released to Read by the web server in your domain. Cookies usually contain identifiers, site names, and some numbers and characters. We will use Cookie technology to simplify your repeated login steps and help determine your login status and account or data security.
  2. We promise that the research on cookie information will only be used for the purpose of improving service/product quality and optimizing user experience. We will not use Cookies for any purpose other than those stated in this policy. You can manage or delete cookies according to your preferences. See AboutCookies.org for details. You can clear all cookies saved on your computer. Most web browsers will automatically accept cookies, but you can usually modify the browser settings to reject cookies according to your needs; in addition, you can also clear all cookies saved in the software. . But if you do this, you may need to personally change the user settings each time you visit HAOMIservices, and the corresponding information you have previously recorded may also be deleted, and this may affect the security of the services you use. Certain impact.

(2) Website beacons and pixel tags

In addition to Cookies, we may also use other similar technologies such as web beacons and pixel tags on our website. For example, emails we sent you may contain click URLs linked to content on our website. If you click this link, we will track this click to help us understand your product or service preferences and improve customer service. A web beacon is typically a transparent image embedded into a website or email. With the help of pixel tags in emails, we can learn whether the emails have been opened. If you do not want your activities to be tracked in this way, you can unsubscribe from our mailing list at any time.

  1. How we protect and store your personal information

(1) Storage and protection of your personal information

  1. We will store user information collected within China in accordance with laws and regulations. If we involve transferring your personal information overseas, we will clearly inform you and obtain your consent.
  2. While you are using HAOMIservices, we will continue to save your personal information for you. If you cancel your account or actively delete your personal information, we will delete or anonymize your personal information, unless otherwise provided by laws and regulations.
  3. In order to prevent your personal information from being illegally accessed, copied, modified, transmitted, lost, destroyed, processed or used under accidental and unauthorized circumstances, we have and will continue to take measures including but not limited to the following measures to protect you. personal information:

(1) Our network services adopt encryption technologies such as Transport Security Protocol and provide transmission services through https and other methods to ensure the security of user data during transmission.

(2) When we deem it necessary, we will use encryption technology to encrypt and save user information, and isolate it through isolation technology.

(3) When using personal information, such as personal information display and personal information correlation calculation, we will use various data desensitization technologies including content replacement, encryption and desensitization to enhance the security of personal information in use.

(4) Establish a strict data use and access system, adopt strict data access permission control and multi-identity authentication technology to protect user information and avoid illegal use of data. We only allow authorized personnel to access user information and require them to fulfill corresponding confidentiality obligations.

(5) When we share your personal information with a third party, our network services adopt encryption technologies such as Transmission Security Protocol. Provide transmission services through https and other methods to ensure the security of user data during transmission.

  1. Please be sure to keep your account number and password properly. When you use our services, we will identify you through your account number, password and other factors. Once you leak the aforementioned information, you may suffer losses and it may be disadvantageous to you. If you find that your account number, password and/or other identity elements may or have been leaked, please contact us immediately so that we can take appropriate measures in a timely manner to avoid or reduce related losses.

(2) Risks faced

  1. Although we have taken the above reasonable and effective measures and have complied with the standards required by relevant legal regulations, we still cannot guarantee the security of your personal information when it is communicated through unsecured channels. Therefore, you should also actively take measures to ensure the security of your personal information, such as setting complex passwords, regularly changing account passwords, and not disclosing your account password and other personal information to others.
  2. There are always risks of various information leaks in the network environment. When unexpected events, force majeure, etc. cause your information to be leaked, we will try our best to control the situation and promptly inform you of the cause of the incident, the security measures we have taken, and what you can do. Proactive safety measures and other relevant information. However, we cannot be held responsible for any losses caused to you by accidents, force majeure, etc., and you understand and agree to this.
  3. After an information security incident unfortunately occurs, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, and you can prevent and reduce risks on your own suggestions, remedies for you, etc. We will also promptly notify you of incident-related information through emails, letters, phone calls, push notifications, etc. When it is difficult to notify personal information subjects one by one, we will issue announcements in a reasonable and effective manner. At the same time, we will report to the corresponding competent authorities in accordance with the requirements of laws and regulations.
  4. How we entrust you to process, share, transfer and publicly disclose your personal information

(1) Delegation and sharing

  1. In order to improve information processing efficiency, reduce information processing costs, or improve information processing accuracy, we may entrust capable affiliates or other professional organizations to process information on our behalf. We will require the entrusted company to abide by strict confidentiality obligations and take effective confidentiality measures through written agreements, on-site audits, etc., and prohibit them from using this information for purposes without your authorization. When the entrustment relationship is terminated, it will be required to delete your personal information immediately.
  2. In order for you to use our services, our services may embed the SDK of authorized partners or other similar applications. We will conduct strict security monitoring of the application programming interface (API) and software tool development kit (SDK) used by authorized partners to obtain relevant information, and agree on strict data protection measures with authorized partners to ensure that they comply with our entrusted purposes. Service Description and this Privacy Policy to process personal information.
  3. We will not share your personal information with third parties, except in the following circumstances:

(1) We have obtained your explicit authorization or consent to share your personal information with third parties according to the scope of your authorization;

(2) We may share your personal information externally in accordance with laws and regulations, litigation, dispute resolution needs, or as required by administrative and judicial authorities in accordance with the law;

(3) Handling of infringement complaints: When you are complained by others about infringement of intellectual property rights or other legal rights, you need to disclose your necessary information to the complainant in order to handle the complaint;

(4) Sharing with authorized partners: We may entrust authorized partners to provide you with certain services or perform functions on our behalf, including providing infrastructure technical services, SMS services, and data processing services for our services. For example, share the information required for real-name authentication with the real-name authentication service provider; share the information required for electronic signature with the electronic signature provider. We will only share your personal information for the legal, legitimate, necessary, specific and clear purposes stated in this policy. Authorized partners can only have access to the information they need to perform their duties and may not use this information for any other purpose. . We will sign strict confidentiality agreements with the companies, organizations and individuals we entrust to process personal information, requiring them to process personal information in accordance with our requirements, this Privacy Policy and any other relevant confidentiality and security measures.

  1. In addition, our products/services also incorporate services provided by third parties. When you use the services provided by these third parties, the third parties may collect and use your personal information for the purpose of providing services. Therefore, we remind you to carefully read the relevant terms and policies provided by the third parties before using these services.
  2. It should be noted that third-party service providers can provide products or services to you through the terminal. You can choose whether to use third-party services and when to terminate or cancel the use of third-party services. During use, third-party service providers may collect, use and store your relevant data or information. Before you decide whether to use such services, please fully understand the personal information and privacy protection policies of the third-party service provider, or contact your enterprise/organization user for more information.

(2) Transfer

We will not transfer your personal information to any company, organization or individual, except in the following circumstances:

  1. When obtaining your explicit consent;
  2. When a merger, acquisition or bankruptcy liquidation is involved, if personal information is transferred, we will require the new company or organization that holds your personal information to continue to be bound by this privacy policy. Otherwise, we will require the company or organization to continue to be bound by this privacy policy. The organization will ask you for authorization again.

(3) Public disclosure

  1. We will only publicly disclose your personal information under the following circumstances:

(1) We may publicly disclose your personal information with your explicit consent or based on your active choice;

(2) Disclosure based on law: We may publicly disclose your personal information when required by law, legal proceedings, litigation or compulsory requirements from government authorities;

(3) Reasonably necessary to implement relevant service agreements or this privacy policy, safeguard social and public interests, handle complaints/disputes, and protect the personal and property safety or legitimate rights and interests of our customers, us or our affiliates, other users or employees the use of.

  1. If we disclose your personal information for the above reasons, we will promptly notify you on the basis of complying with relevant laws and regulations and this policy.

(4) Exceptions to obtaining prior authorization and consent when sharing, transferring, or publicly disclosing personal information

In accordance with relevant laws, regulations and national standards, we may share, transfer, and publicly disclose personal information in the following circumstances without obtaining the prior authorization and consent of the personal information subject:

  1. Relevant to our performance of obligations stipulated in laws and regulations;
  2. Directly related to national security and national defense security;
  3. Directly related to public safety, public health, and major public interests;
  4. Directly related to criminal investigation, prosecution, trial and judgment execution;
  5. To protect the life, property and other major legitimate rights and interests of the personal information subject or other individuals but it is difficult to obtain the authorization and consent of the individual;
  6. Personal information disclosed by the personal information subject to the public on his own initiative;:
  7. Collect personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels.

In addition, in accordance with the aforementioned regulations, if de-identified personal information is provided externally and the data recipient is unable to recover and re-identify the personal information subject, there will be no need to notify you or obtain your consent.

  1. How you access and manage your personal information

In accordance with relevant Chinese laws, regulations, standards, and common practices in other countries and regions, we guarantee that you can exercise the following rights with respect to the personal information you provide:

(1) Access or correct the personal information you provide

  1. You have the right to access and update some of your personal information. Generally, you can view or update your registration information on the "Personal Center" or similar page, and view or update your device information on the Resource Center page. You agree that before you perform relevant operations, we may ask you to perform identity verification to confirm the identity of the visitor and ensure the security of your information.
  2. In addition to the personal information listed above, we are unable to provide you with access and correction services for some of your personal information. This information is mainly collected from your device information to improve your user experience and ensure transaction security. Personal information necessary to ensure the normal operation of the business functions you have chosen. We will use the above information within the scope of your authorization. You cannot access or correct it, but you can contact us to delete or anonymize it.

(2) Delete your personal information

  1. Some of your personal information can be deleted directly by you. The details are subject to the actual display on the service page.
  2. In the following circumstances, you can make a request to us to delete personal information:

(1) If our processing of personal information violates laws and regulations;

(2) If we collect and use your personal information without your consent;

(3) If our processing of personal information violates our agreement with you;

(4) If your account is canceled or recycled;

(5) If we terminate our services and operations.

  1. If we decide to respond to your deletion request, we will also notify the entities that obtained your personal information from us and require them to delete it in a timely manner, unless otherwise provided by laws and regulations, or these entities obtain your independent authorization.
  2. When you or we assist you in deleting relevant information, we may not be able to delete the corresponding personal information from the backup system immediately due to applicable laws and security technologies, but we will delete the information when the backup is updated or within a reasonable time.

(3) Change the scope of your authorization or withdraw your authorization

  1. You can change the scope of your authorization for us to continue collecting personal information or withdraw your authorization by deleting personal information, turning off equipment or service functions, and setting privacy settings on the HAOMIservice website. You can also withdraw all authorization for us to continue collecting your personal information by canceling your account.
  2. Please understand that each business function requires some of your personal information to be implemented. When you withdraw your consent or authorization, we cannot continue to provide you with the services corresponding to the withdrawal of consent or authorization, and we will no longer process your corresponding personal information. information. However, your decision to withdraw your consent or authorization will not affect the previous information processing based on your authorization.
  3. When you use HAOMIservices, you may receive push notifications from the system. You can turn on or off the permission to push information to users at any time.

(4) Cancel account

HAOMI provides you with a channel to cancel your account. The specific cancellation path and process shall be disclosed on the relevant page of the individual service or as otherwise required by HAOMI. Once your account is canceled, it cannot be restored, so please operate with caution. After you voluntarily cancel the relevant account, we will stop providing you with the product or service, and delete or anonymize the personal information you provided in accordance with the requirements of applicable laws, unless otherwise provided by laws and regulations.

(5) Obtaining a copy of personal information

If you need a copy of your personal information, you can contact us through the feedback channel listed in the "How to Contact Us" section of this policy. After verifying your identity, we will provide you with your personal information in our services. Copies (including basic information and identity information), except as otherwise provided by laws and regulations or as otherwise agreed in this policy.

(6) Respond to your above request

  1. If you are unable to access, correct or delete your personal information through the above methods, or you need to access, correct or delete other information generated when you use our products and/or services, or you believe that we have violated any law You can contact us through the feedback channels listed in the "How to Contact Us" section of this policy to comply with regulations or agreements with you regarding the collection or use of information. To ensure security, we may require you to provide a written request or otherwise prove your identity.
  2. In principle, we do not charge fees for your reasonable requests, but for repeated requests that exceed reasonable limits, we will charge a certain cost depending on the situation. For those that are gratuitously repetitive, require excessive technical means (for example, require the development of new systems or fundamentally change existing practices), pose risks to the legitimate rights and interests of others, or are very impractical (for example, involving information stored on backup tapes) request, we may deny it.
  3. In the following circumstances, we will not be able to respond to your request in accordance with legal and regulatory requirements:

(1) Related to national security and national defense security;

(2) Relevant to public safety, public health, and major public interests;

(3) Relevant to criminal investigation, prosecution, trial and judgment execution, etc.;

(4) There is sufficient evidence to show that you have subjective malice or abused your rights;

(5) Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations;

(6) Involving trade secrets.

  1. How we process personal information of minors
  2. Our services are mainly for adults. Minors should not create their own personal information subject accounts without the consent of their parents or guardians. If you are a minor, we ask that you ask your parents or guardians to read this policy and use our services or provide information to us with the consent of your parents or guardians.
  3. For the collection of personal information of minors with the consent of parents or guardians, we will only use or publicly disclose this information when permitted by law, explicit consent from parents or guardians, or necessary to protect minors.
  4. If we find that we have collected personal information from minors without obtaining formal parental or guardian consent in advance, we will try to delete the relevant information as soon as possible.
  5. How to update this policy
  6. We will update this policy in a timely manner when the following major changes occur:

(1) Changes in our basic situation, such as changes in owners caused by mergers, acquisitions, and reorganizations;

(2) Changes in the scope, purpose, and rules of collecting, storing, and using personal information;

(3) The objects, scope, and purpose of providing personal information to external parties change;

(4) Changes in the way you access and manage personal information;

(5) Changes in data security capabilities and information security risks;

(6) Changes in the channels and mechanisms for user inquiries and complaints, as well as external dispute resolution agencies and contact information;

(7) Other changes that may have a significant impact on your personal information rights.

  1. If this policy is updated, we will notify you by means of push notifications, pop-up prompts, sending emails/short messages, or publishing announcements on the official website. In order for you to receive timely notifications, it is recommended that you notify us in time when your contact information is updated. If you continue to use HAOMIservices after this policy update comes into effect, it means that you have fully read, understood and accepted the updated policy and are willing to be bound by the updated policy.
  2. How to contact us

If you have any questions, comments or suggestions about this privacy policy, you can contact us through the following contact information:

Hangzhou HAOMI Digital Technology Co., Ltd.

Email: [market@HAOMI.com]

Under normal circumstances, we will respond within fifteen working days after receiving your relevant information and verifying your identity.

If you are not satisfied with our response, especially if our personal information processing behavior has harmed your legitimate rights and interests, you can also seek a solution by filing a lawsuit with a court with jurisdiction in Binjiang District, Hangzhou.

【appendix】

Concepts and terms referenced in this policy shall be interpreted as follows:

  1. Personal information: Personal information is various information related to identified or identifiable natural persons recorded electronically or by other means, excluding anonymized information.
  2. Sensitive personal information: Sensitive personal information is personal information that, once leaked or illegally used, can easily cause the dignity of a natural person to be infringed or the personal and property safety to be endangered, including biometrics, religious beliefs, specific identities, medical health, and financial accounts. , whereabouts and other information, as well as personal information of minors under the age of fourteen.
  3. Children: refers to minors under the age of fourteen.
  4. De-identification: refers to the process of technical processing of personal information so that the subject of personal information cannot be identified without the help of additional information.
  5. Anonymization: refers to the process in which personal information is processed so that a specific natural person cannot be identified and cannot be recovered.
  6. Deletion: refers to the act of removing personal information from the systems involved in realizing daily business functions, so that it cannot be retrieved or accessed.
  7. SDK: Also called software development kit, it is a collection of development tools for building application software using specific software packages, software frameworks, hardware platforms, operating systems, etc.