Privacy

 

Welcome to use our products and services! Your trust is very important to us, we understand the importance of your personal information, we will take appropriate security measures to protect your personal information in accordance with the requirements of laws and regulations. In view of this, we have formulated this Legal Notice and Privacy Policy (hereinafter referred to as "this policy"), which only applies to Seestar website software products or services developed by ZWO itself. We remind you that you must read and thoroughly understand this Policy before using the products or services, and use the products or services only after you have confirmed that you fully understand and agree to it. Once you start using the product or service, you will be deemed to have accepted and approved the contents of this policy.

 

The first part of the definition and scope of application

 

  1. Definition

 

You: The individual who uses our products or services, including the individual who uses our products or services through an account under the name of an institutional customer.

 

We: Refers to the provider of software products or services, SuZhou ZWOCo., Ltd. and its subsidiaries, affiliates, etc. (or "ZWO").

 

ZWO Store: Refers to the store developed by ZWO itself.

 

Seestar website: Refers to the official website of ZWO’s self-developed Seestar sub-brand. Include the ZWO Store.

 

Personal Information: Information submitted by you orcollected by us, electronically or otherwise, that can identify a specific natural person or reflect the activities of a specific natural person, either alone or in combination with other information. It does not include information that has been anonymized.

 

Sensitive personal information: Sensitive personal information is personal information that, if leaked or used illegally, could easily lead to the violation of a natural person's human dignity or endanger the safety of his or her person or property, including biometric, religious beliefs, specific identity, medical and health, financial accounts, whereabouts and track information. (We will prominently identify specific personal sensitive information in bold in this Privacy Policy).

 

Children: Refers to minors under the age of fourteen.

 

Device information: Including device identifier (IMEI, IDFA, Android ID, MAC, OAID, IMSI and other device-related information), application information (application crash information, notification switch status, application installation list and other application-related information), device parameters and system information (device type, device model, operating system and hardware-related information), device network Environment information (IP address, WiFi information, base station information and other network-related information). Subject to the actual collection of the product.

 

De-identification: Refers to the process by which personal information is processed so that it cannot identify a specific natural person without the help of additional information.

 

Anonymization: The process by which personal information is processed in such a way that it cannot be identified with a specific natural person and cannot be recovered.

 

II. Scope of Application

 

This Agreement applies to all products and services provided by ZWO to you in the form of the Seestar websitewebsite, the Client and any new forms that emerge with technological development. This policy also includes any agreements, rules, specifications, announcements, notices or business rules regarding the Software and related services that ZWO may issue and revise from time to time.

 

In addition to the information collection and use activities described in this policy, this policy does not apply to other services provided to you by other third parties, and other services are subject to their privacy policies and other personal information use rules that are separately stated to you.

 

Part IILegal Notices

 

I. Attribution of Rights

 

Unless we state otherwise, all rights (including copyrights, trademarks, patents, trade secrets and other related rights) in all products, technologies, software, programs, data and other information (including text, icons, images, photos, audio, video, graphics, color combinations, layout, etc.) in the Seestar websiteare owned by the Seestar websiteService Provider and/or its affiliates. Without the permission of the Seestar websiteservice provider and/or its affiliates, no one is allowed to use any content in the Seestar websiteby monitoring, copying, transmitting, displaying, mirroring, uploading, downloading, etc., including through robots, spiders and other programs or devices.

 

The words and/or logos "Seestar website" and other logos, emblems, product and service names of Seestar websiteare trademarks of Seestar websiteService Provider and/or its affiliates in China and other countries, and you must obtain permission from Seestar websitefor any use such as promotion or display. Service provider and/or its affiliates prior written authorization.

 

II. Limitation of Liability

 

We hereby advise that you should comply with the laws and regulations of the People's Republic of China during the use of our services, not to endanger network security, and not to use our services to engage in activities that violate the reputation, privacy, intellectual property rights and other legitimate rights and interests of others. Notwithstanding the foregoing, we do not assume any responsibility for the use and purpose of your use of our services.

 

Part IIIPrivacy Policy

 

This policy will help you understand the following.

I. How we collect and use your personal information

II. How we use cookies and similar technologies

III. How we share, transfer and publicly disclose your personal information

IV. How we protect your personal information

V. Your rights

VI. How we handle personal information of children

VII. How your personal information is stored and how it is transferred globally

VIII. How to update this policy

IX. How to contact us

 

We understand the importance of personal information to you and will do our best to protect the security and reliability of your personal information. We are committed to maintain your trust in us and abide by the following principles to protect your personal information: the principle of consistent authority and responsibility, the principle of clear purpose, the principle of choice of agreement, the principle of minimum sufficient, the principle of ensuring security, the principle of subject participation, the principle of openness and transparency. At the same time, we promise that we will take appropriate safety protection measures to protect your personal information in accordance with the mature safety standards in the industry.

 

I. How we collect and use your personal information

 

In the course of your use of our products or services, we will only collect and use your personal information for the business functions described in this policy, the purpose of collecting personal information is to provide you with products or services, optimize our products or services, and to protect the security of your account, you have the right to choose whether to provide such personal information, but in most cases, if you do not provide, we may not be able to provide you with corresponding services or respond to problems you encounter. These functions include

 

1. Account registration and login

You need to register ZWO account to log in Seestar website, at the same time, in the process of using your ZWO account to log in the mall, your ZWO account will be associated with your operation on the mall, we will collect your ZWO account number, email address, used to provide you with account login services and account security, if you do not provide the above information, we can not provide you with login services to the mall.

 

2. Functions necessary to achieve online shopping

(1) Product information display and search

In order for you to quickly find the products you need, we may collect information about your device (including device model, operating system, language settings, network status information), browser type, WiFi BSSID:, in order to provide you with the best way to display product information. We will also use your personal information as described above in order to continuously improve and optimize the features described above.

You can also search to find the exact product or service you are looking for. We will retain your search content to allow you to repeat it or to show you products that are related to your search. Please note that the answers selected by your search keyword information cannot identify you individually and are not part of your personal information, which we have the right to use for any purpose; only when your search keyword answer information is combined with your other information (such as IMEI (for Android QI and below)/OAID (for Android Q) and above)/UUUID (for IOS devices only)). (only collected by IOS devices)) are used in combination with each other and can identify you, we will treat your search keyword information as your personal information during the combination period, and handle and protect it together with your search history in accordance with this privacy policy.

 

(2) Placement of orders

When you are ready to check out the products in your shopping cart, the system will generate an order for you to purchase the products. You will need to include at least your consignee's name, shipping address, cell phone number and email address in the order, and the order number, information about the goods or services you are purchasing, the amount you should pay and the method of payment, which you must provide to ensure accurate delivery of the goods. In addition, a list of the items purchased may be used to print an invoice and to enable you to identify the items in your package. All of the above information constitutes your order information. In order to help you achieve the order-related services, we will use your order information to verify your identity, determine the transaction, make payment, complete the delivery, check and display the order details for you, and provide customer service consultation and after-sales service.

 

(3) Payment function

After you place an order, you can choose the payment service provided by ZWO Store's affiliates or third-party payment institutions (PayPal) that cooperate with ZWO Store. The payment function itself does not collect your personal information, but we need to share your order number and transaction amount information with these payment institutions in order for them to confirm your payment instructions and complete the payment.

 

(4) Delivery of products or services

After you place an order and complete the payment online, the third party delivery companies (including but not limited to China Post, 17 Post servce, Aramex, DHL Express, DHL Express (Piece ID), FedEx, TNT, UPS, hereinafter referred to as delivery companies) cooperating with ZWO Mallwill complete the order for you. delivery of your order. You acknowledge and agree that the third-party delivery company with which ZWO Storecooperates will use your order information in the above-mentioned process to ensure the safe delivery of your ordered goods.

 

(5) Customer Service and After-Sales Features

When you contact us or make a dispute request, in order to protect the security of your account and system, we need you to provide the necessary personal information to verify your identity as a mall user.

We may keep records of your communications, correspondence/calls and related content (including account information, order information, other information you provide to prove relevant facts, or contact information you leave) with us. If you make an inquiry, complaint, or suggestion regarding a specific order, we will use your account information and order information in order to contact you, help you resolve the problem as soon as possible, or record the solution and outcome of the problem.

We may also use other information about you, including information you provide when you contact Customer Service, as reasonably necessary to provide and improve the quality of our services.

 

3. Features Necessary to Secure Transactions

In order to improve the security of our system when you use our products and/or services, to more accurately prevent phishing site fraud and to protect account security, we may determine your account risk by knowing your account information, browsing information, order information, your commonly used software information, device information and other means, and may record some links ("URL") that we consider risky;we may also collect your device information (MAC address, IMEI and other device identifiers) for risk verification to comprehensively determine the risk of your account and transactions, verify your identity, detect and prevent security incidents, and take necessary record, audit, analysis and disposal measures in accordance with the law.

 

4. Exceptions with authorized consent

Please understand that, according to laws and regulations and relevant national standards, we do not need to obtain your authorized consent to collect and use your personal information in the following cases.

(1) Directly related to national security and national defense security.

(2) Directly related to public safety, public health, and significant public interest.

(3) Directly related to crime investigation, prosecution, trial and execution of judgments, etc.

(4) For the protection of your or other individuals' life, property and other significant legitimate rights and interests but it is difficult to obtain your consent.

(5) Where the personal information collected from you is disclosed to the public by you.

(6) Your personal information collected from legitimate public disclosures, such as legitimate news reports, government information disclosure and other channels.

(7) Necessary for the conclusion or performance of contracts and other written documents at your request.

(8) Necessary for maintaining the safe and stable operation of the products and/or services provided, such as the detection and disposal of product and/or service failures.

(9) Personal information controller is a news organization and necessary for the public interest its in the conduct of legitimate news reporting.

(10)Academic research institutions based on the public interest to carry out statistical or academic research necessary, and when providing the results of academic research or description to the public, de-identification or anonymization of the personal information contained in the results

(11) Other circumstances specified by laws and regulations.

 

II. How we use cookies and similar technologies

 

1. Cookies

(1) To ensure that a product or service works properly, we store small data files called cookies on your computer or mobile device. cookies typically contain an identifier, the name of the site, and some numbers and characters. Cookies allow a product or service to store data about your access preferences, and we can only read the cookies we provide.

(2) We will not use cookies for any purpose other than those described in this policy. You can clear all cookies stored on your computer, and most web browsers have a feature to block cookies. However, if you do so, you will need to personally change your user settings each time you visit our products or services.

 

2. Web beacons and pixel tags

(1) In addition to cookies, we may use web beacons and pixel tags and other similar technologies on our products or services, for example, emails we send you may contain clickable links to the content of our products or services.

(2) If you click on that link, we may track that click to help us understand your product or service preferences and improve customer service. A web beacon is typically a transparent image embedded in a website or email. With the help of pixel tags in emails, we can tell if an email has been opened. If you do not want your activity to be tracked in this way, you can unsubscribe from our mailing list at any time.

(3) If your browser has Do Not Track enabled, then all of our products or services will respect your choice.

 

III. How we share, transfer and publicly disclose your personal information

 

1. Sharing

We will not share your personal information with any other companies, organizations and individuals, except for the following cases.

(1) Sharing with explicit consent: We will share your personal information with other parties after obtaining your explicit consent.

(2) We may share your personal information with external parties in accordance with laws and regulations, or as mandated by government authorities.

(3) Sharing with our affiliated companies: Your personal information may be shared with our affiliated companies. We will only share personal information that is necessary and subject to the purposes stated in this policy. Affiliates who wish to change the purposes for which personal information is processed will again seek your authorized consent.

(4) Sharing with Authorized Partners: Certain of our services will be provided by authorized partners only to achieve the purposes stated in this policy. We may share some of your personal information with our partners in order to provide better customer service and user experience. We will only share your personal information for purposes that are legal, legitimate, necessary, specific, and explicit, and only as much personal information as is necessary to provide the services. In order to better operate and improve technology and services, you agree that we and our authorized partners may use the collected information for other services and purposes, subject to relevant laws and regulations.

 

(5) Advertising, Media: We may share the information we collect with advertising, media and our other authorized partners for commercial purposes including optimizing advertising placement and improving marketing effectiveness. If you do not wish to receive commercial electronic messages from us, you may unsubscribe by contacting us.

 

(6) For companies, organizations and individuals with whom we share personal information, we will enter into strict confidentiality agreements with them, requiring them to handle personal information in accordance with our instructions, this policy and any other relevant confidentiality and security measures.

 

2. Transfer

We will not transfer your personal information to any company, organization, or individual, except for the following.

(1) Transferring with express consent: We will transfer your personal information to other parties after obtaining your express consent.

(2) In the event of a merger, acquisition or bankruptcy and liquidation involving the transfer of personal information, we will then require the new company or organization holding your personal information to continue to be bound by this policy, or we will require the company or organization to seek your authorized consent again for the new privacy policy.

 

3. Public Disclosure

We will only disclose your personal information publicly when.

(1) After obtaining your express consent.

(2) Disclosure based on law: We may publicly disclose your personal information when compelled to do so by law, legal process, litigation or government authorities.

 

4. Exceptions to prior authorized consent for sharing, transferring, or publicly disclosing information

Please understand that, in accordance with laws and regulations and relevant national standards, we are not required to obtain your authorized consent for sharing, transferring, or publicly disclosing your personal information in the following cases.

(1) Directly related to national security and national defense security.

(2) Directly related to public safety, public health, and significant public interests.

(3) Directly related to crime investigation, prosecution, trial and execution of judgments, etc.

(4) For the protection of your or other individuals' life, property and other significant legitimate rights and interests but it is difficult to obtain your consent.

(5) Information that you disclose to the public on your own.

(6) Gathered from lawful public disclosures, such as lawful news reports, government information disclosure and other channels.

 

IV. How we protect your personal information

 

1. We have used security measures that meet industry standards to protect the personal information you provide against unauthorized access, public disclosure, use, modification, damage or loss of personal information. We will take all reasonably practicable steps to protect your personal information.For example, we use encryption technology to ensure the confidentiality of personal information; we use trusted protection mechanisms to prevent malicious attacks on personal information; we implement access control mechanisms to ensure that only authorized personnel have access to personal information; and we conduct security and privacy protection training courses to enhance employee awareness of the importance of protecting personal information.

 

2. We will take all reasonable and practicable steps to ensure that no unrelated personal information is collected. We will only retain your personal information for as long as necessary to achieve the purposes described in this policy, unless an extended retention period is required or permitted by law.

 

3. The Internet is not an absolutely secure environment, and since e-mail, instant messaging, and other forms of communication with individuals are not encrypted, we strongly recommend that you do not send personal information through such means.

 

4. To protect the security of your personal information, you and we need to cooperate together, please do not disclose your login and password to others, if you find that your personal information, especially your account or password is leaked, please contact us immediately so that we can take appropriate and reasonable measures according to your application.

 

5. The Internet environment is not 100% secure and we will do our best to ensure the security of any information you sendus. Even if we make great efforts and take all reasonable and necessary measures, it may still be impossible to prevent your personal information from being illegally accessed, illegally stolen, illegally tampered with or destroyed, resulting in damage to your legitimate rights and interests, please understand the above-mentioned risks of information networks and voluntarily assume them.

 

6. After the unfortunate occurrence of personal information security incident, we will inform you in a timely manner in accordance with the requirements of laws and regulations: the basic situation of the security incident and the possible impact, the disposal measures we have taken or will take, the suggestions you can independently prevent and reduce the risk, the remedial measures for you, etc. We will promptly inform you of the event-related situation by email, letter, telephone, push notification, etc. When it is difficult to inform the subject of personal information one by one, we will take a reasonable and effective way to issue an announcement. At the same time, we will also take the initiative to report the disposition of personal information security incidents in accordance with the requirements of the regulatory authorities.

 

V. Your rights

 

1. Access to your personal information

You have the right to access your personal information, except for the exceptions provided by laws and regulations. If you want to exercise the right of access, you can access it by yourself in the following ways.

(1) If you wish to access or modify your personal information, such as address information, etc., you can perform such operations by visiting the personal information-related pages in Seestar website; if you wish to access to modify your personal password, you can perform such operations by visiting the account security pages in Seestar website.

(2) If you are unable to access such personal information through the above means, you can send to an email to wewill respond to your request for access as soon as possible.

 

2. Correct your personal information

You have the right to ask us to make corrections when you find that our personal information about you is incorrect. You can send an email to support@zwoptical.com , we will reply to your visit request as soon as possible.

 

3.Deletion of your personal information

You can request us to delete your personal information in the following cases.

(1) If we handle personal information in violation of laws and regulations.

(2) If we collect and use your personal information without your consent.

(3) If our handling of personal information violates our agreement with you.

(4) If you no longer use our products or services and you cancel your account.

(5) If we no longer provide products or services to you.

We will evaluate your request for deletion and take appropriate steps to process it if it meets the appropriate requirements.

(6) When you make a deletion request to us, we may require you to verify your identity to safeguard your account. When you delete information from our service, we may not immediately delete the corresponding information from our backup system because of applicable laws and security technology, and we will store your information securely until the backup can be erased or anonymized. However, your decision to delete will not affect our previous processing of personal information based on your authorization.

 

4. Personal information subject to cancel the account

(1) You can cancel your registered account at any time. Please send an email to support@zwoptical.com.

(2) After canceling your account, we will stop providing you with products or services and delete or anonymize your information upon your request, except as otherwise provided by law or regulation. This may also result in you losing access to data in your account, so please proceed with caution.

 

5. Automatic Information System Decision Making

In some business functions, we may make decisions based solely on automated, non-human decision-making mechanisms, including information systems and algorithms. If these decisions significantly affect your legal rights, you have the right to request an explanation from us and we will provide appropriate remedies.

 

6. To respond to your request above

For security purposes, you may be required to provide a written request or otherwise prove your identity. We may ask you to verify your identity before we process your request.

We will respond within fifteen business days. If you are not satisfied, you may also file a complaint by the following means: Supplementing other avenues of complaint.

For your reasonable requests, we do not charge a fee in principle, but for requests that are repeated several times and exceed reasonable limits, we will charge a cost fee depending on the circumstances. We may deny requests that are unwarrantedly repetitive, require excessive technical means (for example, requiring the development of new systems or fundamental changes to current practices), pose a risk to the legal rights of others, or are highly impractical. Please also understand that we may not be able to respond to some of your requests due to safety and security concerns, requirements of relevant laws and regulations, or technical limitations, such as the following.

(1) Related to the personal information controller to fulfill the obligations under laws and regulations.

(2) Directly related to national security and national defense security.

(3) Directly related to public safety, public health, and significant public interest.

(4) Directly related to crime investigation, prosecution, trial and execution of judgments, etc.

(5) Where the controller of personal information has sufficient evidence of subjective malice or abuse of rights by the subject of personal information

(6) For the purpose of safeguarding the life, property and other significant legitimate rights and interests of the subject of personal information or other individuals but where it is difficult to obtain the consent of the person.

(7) Responding to the request of the subject of personal information will lead to serious damage to the legitimate rights and interests of the subject of personal information or other individuals or organizations.

(8) Where commercial secrets are involved.

 

VI. How we handle children's personal information

 

1. We take the protection of children's personal information very seriously. Children should not create their own user accounts without the consent of their parents or guardians. If you are a child, we ask that you ask your parent or guardian to read this policy carefully and to use our products or services and provide information to us with the consent of your parent or guardian.

2. In the case of personal information collected from children with the consent of their parents or guardians, we will only store, use, share, transfer or publicly disclose this information as permitted by law, with the express consent of the parents or guardians, or as necessary to protect the child, or we will seek to delete the data as soon as possible.

3. Given the limitations of existing technology and business models, it is difficult for us to actively identify children's personal information. If you discover that we have collected children's personal information without their knowledge or prior verifiable guardian consent, you may promptly contact us and we will attempt to delete it promptly upon discovery, or if we discover the foregoing ourselves, we will promptly delete it, except where we are required by law to Except for those that we are required by law to retain.

 

VII. How your user information is stored or transferred worldwide

 

1. Storage Location

In principle, the personal information we collect and generate in the People's Republic of China will be stored in the People's Republic of China.

We will provide your personal information to entities outside of China after we have fulfilled our obligations under the law in the following cases.

(1) The applicable law expressly provides for it.

(2) With your express and separate consent.

(3) Where you engage in personally-initiated conduct such as cross-border transactions via the Internet.

(4) Because we provide our products or services through resources and servers located around the world, this means that, with your authorized consent, your personal information may be transferred to, or accessed from, jurisdictions outside the country in which you use the product or service.

(5) Such jurisdictions may have different data protection laws or even no relevant laws in place. We will seek your consent before doing so. If you consent to the transfer of your personal information, we will ensure that your personal information is adequately and equally protected within the People's Republic of China. For example, we may ask for your consent to transfer personal information across borders or implement security measures such as data de-identification prior to the transfer of data across borders.

 

In such cases, we will ensure, including through contracts, that your personal information is protected to a level no less than that set out in this policy.

 

2. Storage Period

We will retain your personal information only for the period necessary for the purposes and uses described in this policy and for the minimum period required by law or regulation, after which we will delete or anonymize your personal information as required by applicable law or regulation. Unless otherwise required by law or regulation, or for purposes of public interest, scientific and historical research, etc., or if you have otherwise authorized your consent, we may need to retain the relevant data for a longer period of time.

 

3. Storage security

(1) Technical measures for data protection

 

We have taken reasonable and feasible security measures in accordance with industry standards to protect your information from unauthorized access, public disclosure, use, modification, damage or loss of personal information. For example, we use encryption technology to enhance the security of personal information, which is protected by SSL protocol encryption when exchanging data between your browser and the server, and we provide HTTPS protocol for secure browsing; we use trusted protection mechanisms to prevent malicious attacks on personal information; and we deploy access control mechanisms to make every effort to ensure that only authorized personnel have access to personal information. At present, our important information systems have passed the network security level protection assessment of Level 3 or higher.

 

(2) Response to personal information security incidents

 

If our physical, technical or management protection facilities are damaged, resulting in unauthorized access, public disclosure, tampering or destruction of information, resulting in damage to your legitimate rights and interests, we will promptly activate our emergency response plan and take reasonable and necessary measures to minimize the impact on you personally. If a personal information security incident occurs, we will also inform you of the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, the suggestions you can independently prevent and reduce the risk, and the remedial measures for you in accordance with the requirements of laws and regulations. We will inform you by SMS, telephone, push notification and other reasonable channels, and if it is difficult to inform you one by one, we will take reasonable and effective ways to issue announcements. At the same time, we will also report the disposition of personal information security incidents in accordance with the requirements of the regulatory authorities.

 

(3) Prevention of account security risks

 

In the use of Seestar websiteservices, if you inevitably have to disclose your personal information to counterparties or potential counterparties, or you choose to establish communication, exchange information or analyze content with third parties through our or our affiliates' services, please protect your personal information properly, provide it to others only under the necessary circumstances, and do not trust transactions through other trading tools to avoid information being To avoid the theft of information or even encounter telecommunication network fraud.

 

If you are concerned that your personal information, especially your account or password, has been compromised, please contact ZWO Customer Service immediately so that we can take appropriate measures based on your application.

 

VIII. How to update this policy

 

1. This policy is subject to change. We will not reduce your rights under this Policy without your express consent. We will post any changes to this policy on this page.

2. We will also provide more prominent notice of material changes. Material changes within the meaning of this Policy include, but are not limited to.

(1) Significant changes to our service model. such as the purposes for which personal information is processed, the types of personal information processed, and the manner in which personal information is used.

(2) Significant changes in our ownership structure, organizational structure, etc. such as change of ownership caused by business restructuring, bankruptcy and merger, etc.

(3) Changes in the primary recipients of personal information sharing, transfer or public disclosure.

(4) Significant changes in your rights to participate in the processing of personal information and the manner in which they are exercised.

(5) When there is a change in the department responsible for handling personal information security, our contact information and complaint channels.

(6) When the personal information security impact assessment report indicates that there is a high risk.

 

IX. How to contact us

 

1. If you have any questions, comments or suggestions about this policy, or wish to withdraw personal information that you have authorized us to use (cancel your account, cancel your authorization but it will result in some functions not working properly), you can contact us by

Email:support@zwoptical.com

Telephone: +86 051265923102

2. If you are dissatisfied with our response, especially if our personal information handling behavior has harmed your legitimate rights and interests, you can also file a complaint or report to the regulatory departments of network information, telecommunications, public security and industry and commerce.

 

End.