This policy only applies to the Anbo brand products or services of Anbo Technology Co., Ltd. Latest update date: February 3, 2023
This policy will help you understand the following:
1、 How do we collect and use your user information
2、 How do we use it Cookie Compared to similar technologies
3、 How do we share, transfer, and publicly disclose your user information
4、 How do we protect your user information
5、 Your rights
6、 How do we handle children’s personal information
7、 How your user information is stored and transferred globally
8、 How to update this policy
9、 How to contact us
We deeply understand the importance of user information to you and will do our best to protect the security and reliability of your user information. We are committed to maintaining your trust in us, adhering to the following principles, and protecting your user information: the principle of consistency of rights and responsibilities, the principle of clear purpose, the principle of selective consent, the principle of minimum sufficiency, the principle of ensuring security, the principle of subject participation, and the principle of openness and transparency. At the same time, we promise to take corresponding security measures in accordance with mature industry security standards to protect your user information.
Please read and understand this privacy policy carefully before using our products (or services).
1、 How do we collect and use your user information
(1) The information we collect and use during your use of our products or services
We will only collect and use your user information for the business functions described in this policy. The purpose of collecting user information is to provide you with products or services. You have the right to choose whether to provide this information, but in most cases, if you do not provide it, we may not be able to provide you with the corresponding services or respond to the problems you encounter. When you use our services, we allow us to collect the information you provide to us on your own or necessary for providing services to you, including: mobile phone number, membership name, name, gender, date of birth, place of residence, order transaction information, location information, device information, service log information, etc.
For the user information we collect, we will provide you with registration and account management services, display products and services to you, offer you bookmarking, adding, following, and sharing functions, assist you in placing orders and order management, help you complete payments, and assist in delivering goods or services to you.
The above information you provide will continue to authorize us to use it during your use of this service. When you stop using the push service, we will stop using and delete the above information.
We guarantee that the collected user information will be de identified or anonymized in accordance with the law. Information that cannot be used alone or in combination with other information to identify a natural person’s personal identity is not considered personal information in the legal sense. If we combine non personal information with other information to identify your personal identity, or use it in conjunction with your personal information, we will process and protect such information as your personal information in accordance with this privacy policy during the combined use period.
In order to better operate and improve our technology and services, or due to changes in business strategy, when the collection, use, or processing of user information required for the products or services we provide exceeds the scope mentioned above, or when we intend to use the collected user information for other purposes not specified in this privacy policy, or when we intend to use information collected for specific purposes for other purposes
We will notify you within a reasonable period of time after obtaining user information or before processing user information, and obtain your authorization and consent.
(2) Exceptions to obtaining authorization and consent
Please understand that according to laws, regulations, and relevant national standards, we do not need your authorization or consent to collect and use your user information in the following situations:
1. Directly related to national security and defense security;
2. Directly related to public safety, public health, and major public interests;
3. Directly related to criminal investigation, prosecution, trial, and execution of judgments;
4. For the purpose of safeguarding your or other individuals’ significant legitimate rights and interests such as life and property, but it is difficult to obtain my consent;
5. The user information collected from you is publicly disclosed to the general public by yourself;
6. Collecting your user information from legally disclosed information, such as legitimate news reports, government information disclosure, and other channels;
7. Necessary to sign or fulfill the contract according to your request;
8. Necessary for maintaining the safe and stable operation of software and related services, such as discovering and handling software and related service failures;
9. The personal information controller is a news organization and is necessary for conducting legitimate news reporting;
10. Academic research institutions conduct statistical or academic research based on public interest, and when providing results of academic research or descriptions to external parties, they de identify the personal information contained in the results.
11. Other circumstances stipulated by laws and regulations.
2、 How do we use it Cookie Compared to similar technologies
(1) Cookie
To ensure the normal operation of the website, we will store a name on your computer or mobile device Cookie The small data file. Cookie Usually includes identification characters, site names, as well as some numbers and characters. With the help of Cookie, The website can store your access preference data.
We will not Cookie For any purpose other than those stated in this policy. You can manage or delete according to your preferences Cookie。 You can clear all saved files on your computer Cookie, Most web browsers have blocking features Cookie The function. But if you do so, you will need to personally change the user settings every time you visit our website.
(2) Website beacons and point tags
Except Cookie In addition, we will also use other similar technologies such as website beacons and point tags on the website. For example, the email we send you may contain clicks that connect to the content of our website URL。
If you click on the link, we will track this click to help us understand your product or service preferences and improve customer service. A website beacon is typically a transparent image embedded in a website or email. With the help of point tags in emails, we can determine whether the email has been opened. If you do not want your activities to be traced through this channel, you can unsubscribe from our mailing list at any time.
(3) Do Not Track( Do not trace)
Many web browsers are equipped with Do Not Track Function, which can be published to the website Do Not Track Request. At present, the major Internet standards organizations have not established relevant policies to specify how websites should respond to such requests. But if your browser is enabled Do Not Track, So all of our websites will respect your choices.
3、 How do we share, transfer, and publicly disclose your user information
(1) Sharing
We will not share your user information with any other company, organization, or individual, except in the following circumstances:
1. Sharing with explicit consent: With your explicit consent, we will share your user information with other parties.
2. We may share your user information with external parties in accordance with legal regulations or mandatory requirements of government departments.
3. Sharing with our affiliated companies: Your user information may be shared with our affiliated companies. We will only share necessary user information and are bound by the purposes stated in this privacy policy. If the affiliated company wants to change the purpose of processing user information, it will seek your authorization and consent again.
4. Shared with authorized partners: Some of our services will be provided by authorized partners solely for the purposes stated in this policy. We may share some of your user information with our partners to provide better customer service and user experience. We will only share your user information for legal, legitimate, necessary, specific, and clear purposes, and will only share user information necessary for providing services. In order to better operate and improve technology and services, you agree that we and authorized partners may use the collected information for other services and purposes in compliance with relevant laws and regulations.
The following lists specific authorized partners and provides a link to their privacy policy. We recommend that you read their privacy policy: (1) Message push service provider: Daily Interactive Co., Ltd. provides push technology services. We may provide your device platform, device manufacturer and brand, device model and system version, device identification code, device serial number and other device information, application list information, network information, and location related information to Daily Interactive Co., Ltd. for providing you with push technology services. When we push messages to you, we may authorize Daily Interactive Co., Ltd. to adjust the connection and promote the closure of each other SDK Push itinerary to ensure that you can receive the messages we push to you in a timely manner. For detailed information, please refer to the “Personal Push User Privacy Policy”.
(2) Advertising and Media: We may share the collected information with advertising, media, and our other authorized partners for commercial purposes, including optimizing advertising placements and enhancing marketing effectiveness.
(3) We will sign strict confidentiality agreements with companies, organizations, and individuals with whom we share user information, requiring them to handle user information in accordance with our instructions, this privacy policy, and any other relevant confidentiality and security measures.
(2) TransferWe will not transfer your user information to any company, organization, or individual, except in the following circumstances:
1. Transfer with explicit consent: With your explicit consent, we will transfer your user information to other parties;2. When it comes to mergers, acquisitions, or bankruptcy liquidation, if there is a transfer of user information, we will require the new company or organization holding your user information to continue to be bound by this privacy policy. Otherwise, we will require the company or organization to seek your authorization and consent again.We will only publicly disclose your user information in the following situations:

(3) Public Disclosure
1. After obtaining your explicit consent;

2. Legal Disclosure: We may publicly disclose your user information in the event of legal, procedural, litigation, or mandatory requirements from government agencies.

(4) Exceptions to obtaining prior authorization and consent for sharing, transferring, or publicly disclosing information
Please understand that according to laws, regulations, and relevant national standards, we do not need your authorization or consent to share, transfer, or publicly disclose your user information in the following situations:
1. Directly related to national security and defense security;
2. Directly related to public safety, public health, and major public interests;
3. Directly related to criminal investigation, prosecution, trial, and execution of judgments;
4. For the purpose of safeguarding your or other individuals’ significant legitimate rights and interests such as life and property, but it is difficult to obtain my consent;
5. Information that you disclose to the public on your own;
6. Collected from legally disclosed information, such as legitimate news reports, government information disclosure, and other channels.
4、 How do we protect your user information
(1) We have implemented industry standard security measures to protect the user information you provide, preventing unauthorized access, public disclosure, use, modification, damage, or loss of data. We will take all reasonable and feasible measures to protect your user information. For example, when exchanging data between your browser and the ‘service’ SSL Encryption protection; We also provide website services https Secure browsing pipeline; We will use encryption technology to ensure the confidentiality of data; We will use trusted protection mechanisms to prevent data from being maliciously attacked; We will deploy access control mechanisms to ensure that only authorized personnel can access user information; And we will hold security and privacy protection training courses to enhance employees’ awareness of the importance of protecting user information.
(2) We will take all reasonable and feasible measures to ensure that irrelevant user information is not collected. We will only retain your user information for the period necessary to achieve the purposes stated in this policy, unless an extension of the retention period is required or permitted by law.
(3) The Internet is not an absolutely secure environment, and e-mail, instant messaging, and communication channels with other users are not encrypted. We strongly recommend that you do not send user information through such channels.
(4) We will regularly update and disclose the relevant content of reports on security risks, user information security impact assessments, etc. You can obtain it through the following channels: Supplementary Security Risk Disclosure Channel
(5) The Internet environment is not 100% secure. We will try our best to ensure the security of any information you send us. Even if we make great efforts and take all reasonable and necessary measures, it is still possible that we cannot prevent your user information from being illegally accessed, stolen, tampered with or destroyed, resulting in damage to your legitimate rights and interests. Please understand the above risks of information networks and voluntarily assume them.
(6) After the unfortunate occurrence of a user information security incident, we will promptly inform you of the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, suggestions for you to independently prevent and reduce risks, and remedial measures for you in accordance with legal requirements. We will promptly inform you of the relevant situation of the event through channels such as email, letter, phone, push notifications, etc. When it is difficult to inform the user information subject one by one, we will adopt reasonable and effective channels to publish announcements. At the same time, we will proactively report the handling of user information security incidents in accordance with regulatory requirements.
5、 Your rights
According to relevant laws, regulations, standards in China, as well as common practices in other countries and regions, we guarantee that you exercise the following rights over your user information:
(1) Accessing your user information
You have the right to access your user information, except for exceptions provided by laws and regulations. If you want to exercise data access rights, you can access it yourself through the following channels: Supplementary User Information Access Channel
If you are unable to access these user information through the above connection, you can use our Web Form contact, or send an email to [email protected] We will reply to your access request within 30 days.
For other user information generated during your use of our products or services, as long as we do not require excessive investment, we will provide it to you. If you wish to exercise your data access rights, please send an email to [email protected] .
(2) Correct your user information
When you discover errors in the user information we process about you, you have the right to request us to make corrections. You can submit a correction request through the channels listed in “(1) Accessing Your User Information”. If you are unable to correct these user information through the above connection, you can use our Web Form contact, or send an email to [email protected] We will reply to your correction request within 30 days.
(3) Delete your user information
In the following situations, you can request us to delete user information:
1. If our handling of user information violates laws and regulations;
2. If we collect and use your user information without your consent;
3. If our handling of user information violates our agreement with you;
4. If you no longer use our products or services, or if you cancel your account;
5. If we no longer provide you with products or services.
We will evaluate your deletion request and take appropriate steps to process it if it meets the relevant regulations. When you make a deletion request to us, we may require you to verify your identity to ensure the security of your account. After you delete information from our service, due to applicable laws and security technologies, we may not immediately delete the corresponding information from the backup system. We will securely store your information until the backup can be cleared or anonymized.
(4) Change the scope of your authorized consent
Each business function requires some basic user information to be completed (see “Part One” of this policy). You may grant or revoke your authorization and consent at any time for the collection and use of user information. You can operate it yourself through the following channels: supplementing and changing the access channels for user information
After you withdraw your consent, we will no longer process the corresponding user information. Please also note that revoking your authorization may result in certain consequences, such as us being unable to continue providing you with corresponding services or specific functions. However, your decision to revoke your consent will not affect the user information processing based on your authorization.
(5) User Information Subject Account Cancellation
You can cancel the previously registered account at any time, and you can operate it yourself through the following channels: Supplementary account cancellation operation channel
After account cancellation, we will cease to provide you with products or services and, at your request, delete or anonymize your information, except as otherwise provided by laws and regulations. This may also result in you losing access to the data in your account, please proceed with caution.
(6) User information subject obtains a copy of user information
You have the right to obtain a copy of your user information, and you can operate it yourself through the following channels: supplementing the operation channel for obtaining a copy of user information
Subject to technological feasibility, such as data interface matching, we can also directly transmit a copy of your user information to your designated third-party vendor as per your request.
(7) Constrained information system automatic decision-making
In certain business functions, we may make decisions solely based on non manual automated decision-making mechanisms such as information systems and algorithms. If these decisions significantly affect your legitimate rights and interests, you have the right to demand an explanation from us, and we will also provide appropriate channels for relief.
(8) In response to your above request
To ensure safety, you may need to provide a written request or prove your identity through other channels. We may first require you to verify your identity before processing your request.
We will provide a response within thirty days. If you are not satisfied, you can also file a complaint through the following channels: supplementing other appeal channels
For your reasonable requests, we generally do not charge any fees, but for requests that are repeated multiple times or exceed reasonable limits, we will charge a certain cost fee depending on the situation. We may refuse requests that are unnecessarily repetitive, require excessive technological means (such as developing new systems or fundamentally changing current practices), pose risks to the legitimate rights and interests of others, or are very unrealistic. Please understand that due to security concerns, requirements of relevant laws and regulations, or technological limitations, we may not be able to respond to some of your requests, such as the following situations:
1. Related to the fulfillment of legal and regulatory obligations by user information controllers;
2. Directly related to national security and defense security;
3. Directly related to public safety, public health, and major public interests;
4. Directly related to criminal investigation, prosecution, trial, and execution of judgments;
5. The user information controller has sufficient evidence to indicate that the user information subject has subjective malice or abuse of rights;
6. For the purpose of safeguarding the significant legitimate rights and interests of the user information subject or other individuals, such as life and property, but it is difficult to obtain their consent;
7. Responding to the request of the user information subject will result in serious damage to the legitimate rights and interests of the user information subject or other individuals or organizations;
8. Involving trade secrets.
6、 How do we handle children’s personal information
We attach great importance to the protection of children’s personal information, and our products, websites, and services are mainly aimed at adults. Children should not create their own user accounts without the consent of their parents or guardians. Although local laws and customs define children differently, we consider anyone under the age of 14 as a child.
For cases where we collect user information from children with the consent of parents or guardians, we will only store, use, or publicly disclose this information as permitted by law, with the explicit consent of parents or guardians, or as necessary to protect children. Otherwise, we will endeavor to delete the relevant data as soon as possible.
Due to the limitations of existing technology and business models, it is difficult for us to proactively identify children’s personal information. If you find that we have collected children’s personal information without your knowledge or without obtaining verifiable consent from guardians in advance, you can contact us in a timely manner, and we will try our best to delete it in a timely manner. If we discover the aforementioned situation ourselves, we will also delete it in a timely manner, except for those required by law to be retained.
7、 How your user information is stored and transferred globally
In principle, user information collected and generated within the territory of the People’s Republic of China will be stored within the territory of the People’s Republic of China. We will only retain your user information for the period required for the purposes and purposes stated in this policy and for the shortest period of time as stipulated by laws and regulations. After exceeding the aforementioned retention period, we will delete your user information or anonymize it in accordance with applicable laws and regulations. Unless otherwise provided by laws and regulations, or for the purpose of public interest, scientific and historical research, or with your separate authorization and consent, we may need to retain relevant data for a longer period of time.
Due to our global resources and servers providing products or services, this means that with your authorized consent, your user information may be transferred to or accessed from overseas jurisdictions in the country/region where you use the products or services.
Such jurisdictions may have different data protection laws, or even no relevant laws in place. In such cases, we will ensure that your user information receives sufficient and equal protection within the territory of the People’s Republic of China. For example, we may request your consent for cross-border transfer of user information, or implement security measures such as data de identification before cross-border data transfer.
8、 How to update this policy
Our privacy policy may change. Without your explicit consent, we will not reduce the rights you are entitled to under this privacy policy. We will post any changes made to this policy on this page.
For significant changes, we will also provide more prominent notifications. The significant changes referred to in this policy include but are not limited to:
1. Our service model has undergone significant changes. Such as the purpose of processing user information, the types of user information processed, and the channels for using user information;
2. We have undergone significant changes in ownership structure, organizational structure, and other aspects. Changes in ownership caused by business adjustments, bankruptcy mergers and acquisitions, etc;
3. The main objects of user information sharing, transfer or public disclosure have changed;
4. There has been a significant change in your right to participate in user information processing and the channels for exercising it;
5. When there are changes in the responsible department, contact information, and complaint channels for handling user information security;
6. When the user information security impact assessment report indicates the presence of high risks.
We will also save the old version of this policy for your reference.
9、 How to contact us
If you have any questions, comments, or suggestions regarding this privacy policy, please contact us through the following channels:
E-mail: [email protected]
Whatsapp Phone:+852 46746166
We have established a dedicated department for user information protection. You can contact relevant personnel through the following channels: provide contact information related to user information protection
Normally, we will reply within thirty days.
If you are not satisfied with our response, especially if our user information processing behavior has harmed your legitimate rights and interests, you can also seek solutions through the following external channels: supplementing other external channels to obtain solutions