User Privacy Policy

Latest update date: February 28, 2024 

If you have any questions, opinions or suggestions, please contact us through the following contact information:

· Application Name: Surinamesafe 

· Developer: Shenzhen Shuchuang Yingke Technology Co., Ltd 

· Email: isafesys@163.com

Please carefully read and fully understand the terms of the Privacy Policy. Your permissions include but are not limited to: in order to provide you with location services, we need you to authorize access to location services, file reading and writing, mobile phone calls, and other services. You can view, change, and manage your authorization in the system settings.

 

This policy will help you understand the following content:

· 1 How do we collect and use your user information

· 2、 How do we use cookies and similar technologies

· 3、 How do we share, transfer, and publicly disclose your user information

· 4、 How do we protect your user information

· 5、 Your rights

· 6、 How do we handle children's personal information

· 7、 How to update this policy

· 8、 How to contact us

We understand the importance of user information to you and will do our best to protect the security and reliability of your user information. We are committed to maintaining your trust in us and adhering to the following principles to protect your user information: the principle of consistency of rights and responsibilities, the principle of clear purpose, the principle of consent, the principle of minimum sufficiency, the principle of ensuring security, the principle of subject participation, and the principle of openness and transparency. At the same time, we promise to take corresponding security measures in accordance with mature industry security standards to protect your user information.

Please carefully read and understand this privacy policy before using our products (or services).

1、 How do we collect and use your user information

1) The information we collect and use during your use of our products or services

We will only collect and use your user information for the business functions described in this policy. The purpose of collecting user information is to provide you with products or services. You have the right to choose whether to provide this information, but in most cases, if you do not provide it, we may not be able to provide you with the corresponding services or respond to the problems you encounter:

· 1. Registration and login service: When you register and log in to Surinamesafe online services, we will collect and use your account and mobile device number. Collecting this information is to help you complete SurinaeSafe online registration and use SurinaeSafe online related functions, and to protect the security of your SurinaeSafe online account. Collecting and using mobile phone numbers is to meet the requirements of relevant laws and regulations for authenticating real identity information. If you do not provide such information, you may not be able to use our services properly.

· 2. Application operation: In order to ensure your normal use of our services, in accordance with legal and regulatory requirements, as well as the need to improve and optimize our service experience and ensure the security of your account, authorized phone permissions are required. We will collect your device identifiers (IMEI, IDFA, AndroidID, MAC, OAID and other related information), SD card data, application information (application crash information, software list and other related information), device parameters and system information (device type, device model, operating system and hardware related information), network information (IP address, WiFi information and other related information), WLAN access points (such as SSID, BSSID), application information you installed or running process information. The above Information is the basic information collected to provide services.

· 3. Location Services: We will obtain your location information (GPS information) after obtaining your voluntary consent, with the aim of providing you with location services. This information belongs to sensitive information. Refusing to provide this information will prevent you from viewing the current location information, but it will not affect your normal use of other functions. When you use location services, we will use the map location function. After receiving the location information returned by Google Map, it will be displayed on the map in a timely manner, only for location display and historical record query, and will not be used for other purposes.

· 4. Update service: When you request remote version updates for network data, you need to authorize external storage permissions. You can refuse authorization for external storage permissions, which will not affect the overall use of the application and may affect some functions that cannot be used normally. 

2) The information we obtained from third parties

Where permitted by laws and regulations, and within the scope of your authorized consent, we may collect and use your user information from third parties.

We guarantee to immediately deidentify or anonymize the collected user information. Information that cannot be individually or in combination with other information to identify the personal identity of a natural person is not considered legal personal information. If we combine non personal information with other information to identify your personal identity, or use it in conjunction with your personal information, we will process and protect such information as your personal information in accordance with this privacy policy during the combined use period.

In order to better operate and improve our technology and services, or due to changes in business strategy, when the collection, use, or processing of user information required for the products or services we provide exceeds the scope mentioned above, or when we want to use the collected user information for other purposes not specified in this privacy policy, or when we want to use information collected for specific purposes for other purposes, we will notify you within a reasonable period after obtaining user information or before processing user information, and obtain your authorization and consent.

2、 How do we use cookies and similar technologies

1) Cookies

To ensure the normal operation of the website, we will store small data files called cookies on your computer or mobile device. Cookies typically contain identifiers, site names, and some numbers and characters. With the help of cookies, websites can store your access preference data.

We will not use cookies for any purpose other than those stated in this policy. You can manage or delete cookies according to your preferences. You can clear all cookies saved on your computer, and most web browsers have a feature to block cookies. But if you do this, you will need to personally change user settings every time you visit our website.

2) Website beacons and pixel labels

In addition to cookies, we will also use other similar technologies such as website beacons and pixel labels on the website. For example, the email we send you may contain a click URL that links to our website content.

If you click on the link, we will track this click to help us understand your product or service preferences and improve customer service. A website beacon is usually a transparent image embedded in a website or email. By using pixel labels in emails, we can determine whether the email has been opened. If you do not want your activities to be tracked in this way, you can unsubscribe from our mailing list at any time.

3) Do Not Track

Many web browsers have the Do Not Track feature, which allows you to post Do Not Track requests to websites. At present, the major Internet standards organizations have not established relevant policies to specify how websites should respond to such requests. But if your browser has Do Not Track enabled, then all of our websites will respect your choice.

3、 How do we share, transfer, and publicly disclose your user information

1) Third party sharing
1. Huawei push 
information acquisition: application basic information, device identifiers within the application, hardware information of the device, system basic information and system settings information, software list.
Purpose of
use: push message usage scenario: when pushing messages on Huawei mobile terminals.
Collection method: SDK collects information on its own.
Official website link: https://developer.huawei.com/consumer/cn/doc/app/20213
Privacy Agreement Address:
https://developer.huawei.com/consumer/cn/doc/development/HMSCore-Guides/sdk-data-security-00000010500421772 Aurora push 
information
acquisition: device
identifier (such as IMEI, OAID, hardware serial number/Serial, IMSI, Android ID, GAID/AAID), application information, network information, IP address, device information 
Purpose of use
: push message Usage scenario: When pushing messages on Android and Apple mobile terminals Collection method: SDK collects information by itself Official website link: https://docs.jiguang.cn/jpush
Privacy Agreement Address:
https://docs.jiguang.cn/jpush/client/Android/android_jghgzy3 
Information
acquisition of Youmeng Mobile Statistics SDK: Mac address, unique device identification code (IMEI/android ID/IDFA/OPENUDID/GUID, SIM card IMSI information), BSSID, SSID, geographic location information 
Purpose of
use
: Data statistics Usage scenarios: Application installation and uninstallation Information statistics Collection method: SDK collects privacy protocol address on its own: 
https://www.umeng.com/policy4 

Obtaining information from Youmeng Mobile Statistics SDK: device information, rough location, mobile phone number, device IMEI/MAC/Android D/IDFA/OpenUDID/GUID/SIM card/BSSID/SSID/IMSI/ICCID/IP information
, geographic location information. Usage 
purpose
: abnormal reporting analysis, collecting application crash logs. Usage scenario: application crash logs. Upload and collection method: SDK collects privacy protocol addresses by itself
https://www.umeng.com/policy5 Google Maps 
information 
acquisition: device identifier (Android such as IMEI, MEID, OAID, hardware serial number/Serial, ICCID, Android ID, IMSI, iOS such as IDFV, IDFA), device
MAC address, IP address, location information (such as GPS, Bluetooth, and base station), WLAN access point (such as SSID, BSSID), Wi Fi list, device sensor information, application information, device information 
Purpose of use: Display map, location location Location usage scenario: Users use location related functions Collection method: SDK collects information on its own 
Official website Link: https://www.google.cn/intl/zh-CN_CN/help/terms_maps/
Privacy Agreement Address:
https://policies.google.com/privacy6 360 Reinforcement SDK (Android version) 
information acquisition
: network information, system name, system version, SD card data usage purpose: for detecting app faults and diagnosis, App security reinforcement protection, piracy detection services, threat environment detection services, in order to help users quickly solve abnormal situations 
Usage scenario

: App packaging reinforcement to prevent decompilation Collection method: SDK collects privacy protocol address: 
https://jiagu.360.cn/#/global/help/295

The above SDKs, with the user's consent for authorization, will send the user's personal information to third-party SDKs such as Huawei Cloud 

2) Transfer

We will not transfer your user information to any company, organization, or individual, except in the following circumstances:

· 1. Transfer with explicit consent: After obtaining your explicit consent, we will transfer your user information to other parties;

· 2. When it comes to mergers, acquisitions, or bankruptcy liquidation, if it involves the transfer of user information, we will require the new company or organization that holds your user information to continue to be bound by this privacy policy. Otherwise, we will require the company or organization to seek your authorization and consent again.

3) Public disclosure

We will only publicly disclose your user information in the following situations: 

· 1. After obtaining your explicit consent;

· 2. Legal disclosure: In the event of legal, procedural, litigation, or mandatory requirements from government authorities, we may publicly disclose your user information.

4) Exceptions to obtaining authorization and consent before sharing, transferring, or publicly disclosing information

Please understand that according to laws, regulations, and relevant national standards, we do not need your authorization or consent to share, transfer, or publicly disclose your user information in the following situations:

· 1. Directly related to national security and national defense security;

· 2. Directly related to public safety, public health, and major public interests;

· 3. Directly related to criminal investigation, prosecution, trial, and enforcement of judgments;

· 4. For the purpose of safeguarding your or other individuals' significant legitimate rights and interests such as life and property, but it is difficult to obtain my consent;

· 5. Information that you disclose to the public on your own;

· 6. Collected from legally disclosed information, such as legitimate news reports, government information disclosure, and other channels.

4、 How do we protect your user information

· 1) We have used security measures that comply with industry standards to protect the user information you provide, preventing unauthorized access, public disclosure, use, modification, damage, or loss of data. We will take all reasonable and feasible measures to protect your user information. For example, being protected by SSL encryption when exchanging data (such as credit card information) between your browser and the "service"; We also provide HTTPS secure browsing for the website; We will use encryption technology to ensure the confidentiality of data; We will use trusted protection mechanisms to prevent data from being maliciously attacked; We will deploy access control mechanisms to ensure that only authorized personnel can access user information; And we will hold security and privacy protection training courses to enhance employees' awareness of the importance of protecting user information.

· 2) We have obtained the following certifications: Level 3 Safety Certificate and ISO9001 Certification.

· 3) Our data security capabilities include establishing a data classification and grading system, data security management standards, and data security development standards to manage the storage and use of standardized information.

· 4) We will take all reasonable and feasible measures to ensure that irrelevant user information is not collected. We will only retain your user information for the period necessary to achieve the objectives stated in this policy, unless an extension of the retention period is required or permitted by law.

· 5) The Internet is not an absolutely secure environment, and e-mail, instant messaging, and communication with other users are not encrypted. We strongly recommend that you do not send user information through such methods. Please use complex passwords to assist us in ensuring the security of your account.

· 6 In the event of an unfortunate user information security incident, we will promptly inform you in accordance with legal and regulatory requirements of the basic situation and possible impacts of the security incident, the measures we have taken or will take to dispose of it, suggestions for you to independently prevent and reduce risks, and remedial measures for you. We will promptly inform you of the relevant situation of the event through email, letter, phone, push notifications, and other means. If it is difficult to inform the user information subject one by one, we will take reasonable and effective measures to publish an announcement. At the same time, we will also proactively report the handling of user information security incidents in accordance with regulatory requirements.

5、 Your rights

According to relevant laws, regulations, standards, and common practices in other countries and regions, we guarantee that you exercise the following rights over your user information:

1) Access your user information

You have the right to access your user information, except for exceptions specified by laws and regulations. If you want to exercise data access rights, you can access them yourself through the following methods:

· www.surinamesafe.com 

If you are unable to access these user information through the above link, you can contact us anytime using our web form or by sending an email to isafesys@163.com . We will reply to your visit request within 15 days.

For any other user information you may encounter during the use of our products or services, as long as we do not require excessive investment, we will provide it to you. If you wish to exercise data access rights, please send an email to isafesys@163.com .

2) Correct your user information

When you discover errors in the user information we handle about you, you have the right to request us to make corrections. You can submit a correction request through the methods listed in "Contact Us". 
If you are unable to correct these user information through the above link, you can contact us at any time using our web form or by sending an email to isafesys@163.com . We will respond to your correction request within 15 days.

3) Delete your user information

In the following situations, you can request us to delete user information:

· 1. If our handling of user information violates laws and regulations;

· 2. If we collect and use your user information without your consent;

· 3. If our handling of user information violates our agreement with you;

· 4. If you no longer use our products or services, or if you cancel your account;

· 5. If we no longer provide you with products or services.

If we decide to respond to your deletion request, we will also notify the entities that have obtained your user information from us, requesting them to delete it in a timely manner, unless otherwise provided by laws and regulations, or if these entities have obtained your independent authorization.

When you delete information from our service, we may not immediately backup the system to delete the corresponding information. We will securely store your information until the backup can be cleared or anonymized.

4) Change the scope of your authorized consent

Each business function requires some basic user information to be completed (see "Part One" of this policy). For the collection and use of additional user information, you may grant or revoke your authorization at any time. You can operate it yourself by:

· User Information Protection Manager Email: isafesys@163.com

After you withdraw your consent, we will no longer process the corresponding user information. Please also note that revoking your authorization may result in certain legal consequences, such as our inability to continue providing you with corresponding services or specific features. However, your decision to revoke your consent will not affect the user information processing based on your authorization.

5) User information subject cancels account

You can cancel your previously registered account at any time by following the steps below:

· User Information Protection Manager Email: surinamesafe@163.com

After canceling your account, we will stop providing you with products or services and, at your request, delete or anonymize your information, except as otherwise provided by laws and regulations. This may also result in you losing access to the data in your account. Please operate with caution.

6) Constrained Information System Automatic Decision Making

In certain business functions, we may only make decisions based on non manual automatic decision-making mechanisms such as information systems and algorithms. If these decisions significantly affect your legitimate rights and interests, you have the right to request an explanation from us, and we will also provide appropriate remedies.

7) In response to your above request

To ensure security, you may need to provide a written request or other means of proving your identity. We may first request you to verify your identity before processing your request.

We will provide a response within 15 days.

For your reasonable requests, we do not charge any fees in principle, but for requests that are repeated multiple times or exceed reasonable limits, we will charge a certain cost fee depending on the situation. We may reject requests that are unreasonably repetitive, require excessive technical means (such as developing new systems or fundamentally changing current practices), pose risks to the legitimate rights and interests of others, or are highly impractical (such as involving information stored on backup tapes). Please also understand that due to security considerations, relevant legal requirements, or technical limitations, we may not be able to respond to some of your requests, such as the following situations:

· 1. Related to the fulfillment of legal and regulatory obligations by the user information controller;

· 2. Directly related to national security and national defense security;

· 3. Directly related to public safety, public health, and major public interests;

· 4. Directly related to criminal investigation, prosecution, trial, and enforcement of judgments;

· 5. The user information controller has sufficient evidence to indicate that the user information subject has subjective malice or abuse of rights;

· 6. For the purpose of protecting the significant legitimate rights and interests of the user information subject or other individuals, such as life and property, but it is difficult to obtain my consent;

· 7. Responding to the request of the user information subject will cause serious damage to the legitimate rights and interests of the user information subject or other individuals or organizations;

· 8. Involving trade secrets. 

6、 How do we handle children's personal information

We attach great importance to the protection of children's personal information, and our products, websites, and services are mainly aimed at adults. Children should not create their own user accounts without the consent of their parents or guardians. Although local laws and customs define children differently, we consider anyone under the age of 14 to be a child.

For the collection of child user information with the consent of parents or guardians, we will only store, use, or publicly disclose this information when permitted by law, explicitly agreed upon by parents or guardians, or necessary to protect children. Otherwise, we will try to delete the relevant data as soon as possible.

Due to the limitations of existing technology and business models, it is difficult for us to proactively identify personal information of children. If you find that we have collected personal information of children without our knowledge or with the consent of verifiable guardians in advance, you can contact us in a timely manner, and we will try to delete it in a timely manner after discovering it. If we discover the aforementioned situation ourselves, we will also delete it in a timely manner, except for those required by law to be retained.

7、 How to update this policy

Our privacy policy may change.

Without your explicit consent, we will not reduce your rights under this privacy policy. We will post any changes made to this policy on this page.

For significant changes, we will also provide more significant notifications (including for certain services, we will send notifications via email explaining the specific changes in privacy policy).

The significant changes referred to in this policy include but are not limited to:

· 1. Our service model has undergone significant changes. Such as the purpose of processing user information, the type of user information processed, and the way user information is used;

· 2. We have undergone significant changes in ownership structure, organizational structure, and other aspects. Changes in ownership caused by business adjustments, bankruptcy mergers and acquisitions, etc;

· 3. The main objects of user information sharing, transfer, or public disclosure have changed;

· 4. Your rights to participate in user information processing and the way you exercise them have undergone significant changes;

· 5. When there are changes in the responsible department, contact information, and complaint channels for handling user information security;

· 6. When the user information security impact assessment report indicates a high risk.

· We will also archive the old version of this policy for your reference.

 

8、 How to contact us

If you have any questions, opinions or suggestions regarding this privacy policy, please contact us through the following methods: isafesys@163.com

We have established a dedicated department for user information protection (or a user information protection specialist), and you can contact them through the following methods:

· User Information Protection Manager Email: isafesys@163.com 

Normally, we will reply within 15 days.