Privacy

TM2AS takes users' privacy and personal information protection very seriously. We may collect and use information about you when you use our products or services.Through the TM2AS Privacy Policy ( "this Privacy Policy"), we want to explain to you how we collect, use, store, share and transfer this information when you use our products or services, and how we provide you with access to, update, delete and protect this information.

This Privacy Policy is closely related to the TM2AS service you use and the various business functions included in the service (hereinafter collectively referred to as "our products or services"). We hope that you will carefully read and confirm that you have fully understood the contents of this Privacy Policy before using our products or services.And allow you to make the choices you deem appropriate, as guided by this Privacy Policy. We will try to keep the terms in this Privacy Policy as concise as possible and provide links for further explanation so that you can better understand them.If you start to use or continue to use our products or services after we update this privacy policy (we will promptly remind you of the update), it means that you agree to the content of this privacy policy (including the updated version), and agree that we collect, use, save and share your relevant information in accordance with this privacy policy.

Please note that this Privacy Policy applies to the products and services we provide to you in the form of websites, clients, applets and new forms with the development of technology.If the products or services of TM2AS are used in the products or services of us and our affiliated companies (such as using TM2AS account to log in) but there is no independent privacy policy, this privacy policy shall also apply to such products or services. Where we and our affiliates have a separate privacy policy for the products or services they provide to you, the corresponding privacy policy applies to the corresponding products or services.

If you have any questions about this Privacy Policy or related matters, you can contact us at any time by sending an email to the [email protected] or calling any of our customer service numbers.

I. How we collect and use your personal information

Personal information refers to all kinds of information recorded by electronic or other means that can identify the identity of a specific natural person or reflect the activities of a specific natural person alone or in combination with other information.Personal sensitive information refers to personal information that may endanger personal and property safety and easily lead to damage to personal reputation, physical and mental health or discriminatory treatment once it is disclosed, illegally provided or abused.Personal information covered in this privacy policy includes: basic information (including personal name, birthday, gender, address, personal telephone number, e-mail); Personal identity information (including ID card, military ID card, passport, driver's license, etc.); personal biometric information (including voiceprint, facial recognition features, etc.);Network identity information (including personal information subject account, IP address, personal digital certificate, etc.); personal property information (including transaction and consumption records, balance, coupons, digital assets, game exchange codes and other virtual property information); address book; personal online records (including web browsing records, software use records, click records);Personal common device information (including hardware model, device MAC address, operating system type, software list unique device identification code (such as IMEI/android ID/IDFA/OPENUDID/GUID, SIM card IMSI information, etc.)); Personal location information (including travel information, accurate positioning information, accommodation information, longitude and latitude);Among them, the bold part of the font is the personal sensitive information involved.

We collect and use your personal information only for the following purposes:

(I) Circumstances under which you must authorize us to collect and use your personal information

Our products or services include some core functions, which include the functions necessary for the implementation of application services and the functions necessary for the security of transactions. We may collect and use the following information about you to perform these functions. If you do not provide the information, you will not be able to enjoy the products or services we offer. These features include:

 

1. Realize the necessary functions for online shopping

    (1) User registration

    You first need to register a TM2AS account to become a TM2AS user. When you register, you need to provide us with at least the TM2AS account name, password, your mobile phone number and email address (for email verification) that you are going to use. We will verify whether your identity is valid by sending SMS verification code or email.Your account name is your default nickname. You can modify and supplement your nickname, gender, birthday, hobbies and your real-name authentication related information, which belong to your "account information".Your supplementary account information will help us provide you with better services, but if you do not provide such supplementary information, it will not affect your basic functions of using the application service.

    (2) Application service information display and search

    In order for you to quickly find the application services you need,We may collect device information (including device name, device model, device identification code, operating system and application version, language setting, resolution, service provider network ID (PLMN)) and browser type from your use of our products or services to provide you with the best way to display application service information.We will also use your above information in order to continuously improve and optimize the above functions.

    You can also search to find exactly the application or service you need. We will retain your search content to make it easier for you to repeat or show you the application or service associated with your search content.

    Please note that the device information, browser type or search keyword information alone cannot identify you and is not your personal information, and we have the right to use it for any purpose;Only when your device information, browser type or search keyword information is combined with your other information and can be used to identify you, we will treat your device information, browser type or search keyword information as your personal information and protect it in accordance with this privacy policy.

    In order to show you the application or service information you are interested in, or show you the application or service you may want to find when you search, we may collect your order information, browsing information, your interests and hobbies (you can fill in the account information) for data analysis to form a user portrait.We may also obtain other information from you that we reasonably need to provide services and improve the quality of our services, including information you provide when you contact customer service, information you send us in response to questionnaires when you participate in surveys, and information we obtain when you interact with our affiliates and our partners.We may correlate the information we collect from your various devices so that we can provide you with consistent services on those devices. We may combine information from a Service with information from other Services to provide you with services, personalized content, and recommendations.If you do not want to be affected by personalized content, you can choose to browse and find application services and services by category on the application service display page. We also provide you with non-personal options in the search results, such as sorting by price, sales volume, broadcast volume and usage;We will not provide your relevant personal information to third parties without your express consent.

    (3) Place an order

    When you are ready to settle your purchase of an application service, the TM2AS system generates an order for your purchase of the application service. The order will include the order number, information about the application or service you purchased, the amount you should pay for the goods, and the method of payment.

    All of the above information constitutes your "order information". We will use your order information to verify your identity, confirm transactions, pay and settle accounts, complete authorization, inquire about orders for you, and provide customer service consultation and after-sales service. We will also use your order information to determine whether your transaction is abnormal to protect your transaction security.

    (4) Payment function

    After you place an order, you can choose the payment services provided by the affiliates of TM2AS or the third-party payment institutions cooperating with TM2AS (including Visa, BitPay, Paypal, Webmoney and other payment channels, hereinafter collectively referred to as "Payment Institutions").The payment function itself does not collect your personal information, but we need to share your TM2AS order number and transaction amount information with these payment institutions to confirm your payment instructions and complete the payment. "Affiliate" means any company or organization that a Party now or hereafter controls, is controlled by, or is under common control with, and the legal representative of such company or organization."Control" means the possession, directly or indirectly, of the ability to influence the management of the company referred to, whether through ownership, voting shares, contract or other means as determined by the People's Court.

    (5) Customer service and after-sales function

    Our telephone customer service and after-sales functions will use your account information and order information.

    To ensure the security of your account, our call center customer service and online customer service will use your account information to verify your identity with you. When you need us to provide customer service and after-sales service related to your order information, we will inquire about your order information.You may provide information other than the above when communicating with our customer service personnel, such as when you ask us to change your shipping address, contact person, or contact number.

2. Functions necessary to ensure transaction security

In order to improve the security of the system when you use our products or services, more accurately prevent phishing website fraud and protect the security of your account, we may judge the risk of your account by understanding your browsing information, order information, software information and equipment information commonly used by you, and may record some links ( "URL") that we think are risky.We will also collect your equipment information to analyze TM2AS system problems, count traffic and troubleshoot possible risks, and troubleshoot when you choose to send us abnormal information.

(II) Circumstances under which you can choose to provide personal information

1. In order to enable you to have a better service experience of TM2AS, we may collect and use your personal information in the following extended functions. If you do not provide this personal information, you can still use TM2AS, but you may not be able to avoid the need to fill in some information repeatedly when you purchase some application services. These extensions include:

    (1) Personalized recommendation function based on location information: We will collect your location information (we only collect your geographical location at that time, but will not combine your location information at various times to determine your track) to determine your location, and automatically recommend products or services that can be purchased in your area.

    (2) Extended function based on camera (camera): You can use this extended function to complete the functions of video shooting, photo taking, code scanning and face recognition login. We collect your facial information when you log in using Face Recognition.In the future, we may apply face recognition technology to more scenarios, and then we will confirm with you again whether you want us to use your facial information to achieve these extended functions.

    (3) Extended function based on picture uploading: You can upload your photos in TM2AS to realize the photo transaction function and the list, evaluation and Q & A functions. We will use the pictures or videos you upload to identify the products or services you need to buy, or use the list, evaluation and Q & A contents containing the pictures or videos you upload.

    (4) Extended functions based on voice technology: You can directly use the microphone to conduct voice transactions or consult and interact with our customer service. In these functions, we will collect your recording content to identify your shopping needs and customer service and after-sales needs.

    (5) Extended function based on address book information: In this function, we will collect your address book information so that you do not need to manually enter the contact information in your address book during the transaction (for example, you can directly recharge the phone number in the address book).In order to increase the social fun of your transaction, we can also determine whether your friends are also TM2AS users when we get your consent, and establish a connection for your communication in TM2AS.

2. The above extended functions may require you to open the access rights of your geographical location (location information), camera (camera), photo album (photo library), microphone and address book to us in your device, so as to realize the collection and use of the information involved in these functions.You can access the "Account Settings-General-Privacy Settings" page in TM2AS to check the opening status of your above permissions one by one, and you can decide to open or close these permissions at any time (we will guide you to complete the settings in your device system).Please note that if you open these permissions, it means that you authorize us to collect and use these personal information to achieve the above functions. If you close the permissions, it means that you cancel these authorizations, and we will not continue to collect and use your personal information, nor can we provide you with the above functions corresponding to these authorizations.Your decision to turn off permissions will not affect the processing of personal information previously based on your authorization.

(III) You shall be fully aware that we do not need to obtain your authorization and consent for the collection and use of personal information under the following circumstances:

1. Related to national security and national defense security;

2. Related to public safety, public health and major public interests;

3. Related to criminal investigation, prosecution, trial and execution of judgments;

4. In order to safeguard the life, property and other important legitimate rights and interests of the subject of personal information or other individuals, it is difficult to obtain their consent;

5. The personal information involved is disclosed to the public by the subject or guardian of the personal information;

6. Your personal information is collected from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels;

7. Necessary for signing and performing the contract according to your requirements;

8. Necessary for maintaining the safe and stable operation of the products or services provided, such as finding and dealing with the faults of the products or services;

9. Necessary for legitimate news reporting;

10. When it is necessary for academic research institutions to carry out statistical or academic research based on public interests and provide the results of academic research or description to the outside world, the personal information contained in the results shall be de-identified;

11. Other circumstances stipulated by laws and regulations.

(IV) Circumstances in which we obtain your personal information from a third party

We may obtain the account information (avatar, nickname) that you are authorized to share from a third party, and bind your third party account to your TM2AS account after you agree to this privacy policy, so that you can directly log in and use our products or services through the third party account.We will confirm the legitimacy of the source of personal information according to the agreement with the third party, and use your personal information on the premise of complying with relevant laws and regulations.

(V) Rules for the use of your personal information

1. We will use the personal information collected to realize the functions of our products or services in accordance with the provisions of this privacy policy.

2. After collecting your personal information, we will de-identify the information through technical means, and the de-identified information will not be able to identify the subject. Please understand and agree that we have the right to use the information that has been de-identified in this case;On the premise of not disclosing your personal information, we have the right to analyze and commercialize the user database.

3. Please understand and agree that all personal information provided by you when using our products or services, unless you delete it or refuse us to collect it through system settings, will be deemed to continue to authorize us to use it during your use of our products or services. When you cancel your account, we will stop using and delete your personal information.

4. We will make statistics on the use of our products or services, and may share these statistical information with the public or third parties to show the overall use trend of our products or services. However, these statistics do not contain any identifying information about you.

5. When we display your personal information, we will desensitize your information by means of content replacement and anonymous processing to protect your information security.

6. When we want to use your personal information for other purposes not specified in this privacy policy, or when we use personal information collected for specific purposes for other purposes, we will seek your express consent in advance. Please understand that the products or services we provide to you will be constantly updated and changed.If you choose to use other products or services not listed in this Privacy Policy, we will explain the purpose, method and scope of information collection to you in detail and ask for your consent through agreements, page prompts and other means before collecting your personal information.If you do not agree to provide the above information, you may not be able to use the product or service, but it does not affect your use of existing products or services.

II. How we use Cookies and similar technologies

(I) Use of Cookies

    1. In order to realize the personalized needs of your online experience and make your access experience easier. We may send one or more small data files called cookies on your computer or mobile device. Cookies assigned to you are unique and can only be read by a Web server in the domain that issued them to you.Cookies are sent to you in order to simplify your repeated login steps, store your transaction preferences or temporary data of your application services, provide you with transaction preferences, help you optimize the selection and interaction of advertisements, and help determine your login status and account or data security.

    2. We will not use Cookies for any purpose other than those stated in this Privacy Policy. You can manage or delete Cookies according to your preferences. You can clear all Cookies saved on your computer. Most web browsers automatically accept Cookies, but you can usually modify your browser settings to reject Cookies according to your needs;In addition, you can clear all Cookies stored in the software. However, if you do so, you may need to change the user settings yourself every time you visit the TM2AS website, and the corresponding information you have previously recorded will be deleted, which may have an impact on the security of the services you use.

(2) The use of network Beacon and similar technologies

In addition to Cookies, we also use other similar technologies on our website, such as Internet Beacon. We often include electronic images (called "single-pixel" GIFs or "web beacons") on our web pages. We use the network Beacon in the following ways:

    1. Use the network Beacon on the TM2AS website to calculate the number of user visits and stay time, and identify the registered TM2AS users by accessing Cookies;

    2. Provide you with personalized services through the obtained Cookies information.

III. How do we share, transfer and publicly disclose your personal information?

(I) Sharing

1. We will not share your personal information with any company, organization or individual other than TM2AS, except for the following:

    (1) Obtain your explicit consent or authorization in advance;

    (2) When necessary in accordance with applicable laws and regulations, the requirements of legal procedures, mandatory administrative or judicial requirements;

    (3) To the extent permitted by laws and regulations, it is necessary to protect the interests, property or safety of TM2AS, its affiliates or partners, you or other TM2AS users or the public from damage;

    (4) Only by sharing your personal information can we realize the core functions of our products or provide the services you need;

    (5) Handle disputes or controversies between you and others at your request;

    (6) Provided in accordance with the relevant agreements signed with you (including the electronic agreements signed online and the corresponding platform rules) or other legal documents;

    (7) Use based on academic research;

    (8) Use based on social and public interests in accordance with laws and regulations.

2. We may share your personal information with our affiliates. However, we will only share personal information as necessary and for the purposes stated in this Privacy Policy. If our affiliates want to change the purpose of processing personal information, they will ask for your authorization again.

3. We may share your order information, account information, equipment information and location information with partners and other third parties to ensure the smooth completion of the services provided to you. However, we will only share your personal information for lawful, legitimate, necessary, specific and specific purposes and only to the extent necessary to provide products and/or services.Our partners are not authorized to use shared personal information for any other purpose. Our partners include the following types:

    (1) Suppliers of application services or technical services. We may share your personal information with vendors who support our functions. These supports include supplying us with goods or providing us with infrastructure technology services, logistics and distribution services, payment services, data processing, etc.We share this information to enable core transactional functions of our products or services, for example, we must share your order information with a logistics service provider to arrange for delivery;When the application or service ordered by you is directly shipped or provided by the supplier, we need to share the ordering information and receiving information in your order with the supplier to instruct them to deliver the application service or provide the service.

    (2) Third-party merchants. We must share your order information and necessary information related to the transaction with third-party merchants to fulfill your needs to purchase applications or services from them and enable them to complete subsequent after-sales services.

    (3) The partner who entrusts us with the promotion (the "entrusting party"). Sometimes we accept the commission of other enterprises to promote our products or services to users.We may use your personal information, as well as indirect user portraits formed by the aggregation of your non-personal information, to share with clients, but we will only provide these clients with information on the coverage and effectiveness of the promotion, and will not provide your personally identifiable information or aggregate such information so that the provision of such information does not personally identify you.For example, we can inform the client of the number of people who have purchased the client's application services after viewing the client's promotional information or after seeing the information, or provide the client with non-personally identifiable statistical information to help him understand the audience or customers.

4. We will sign strict confidentiality agreements with companies, organizations and individuals with whom we share personal information, requiring them to handle personal information in accordance with our instructions, this privacy policy and any other relevant confidentiality and security measures.In order to ensure the security and controllability of data in the third party, we launched Yunding Service, which provides a safe and reliable data use and storage environment in the cloud to ensure the security of user data. In the use of personal sensitive information, we require third parties to use data desensitization and encryption technology to better protect personal sensitive information.See here for a list of SDKs for third parties such as our access partners.

5. Exchange information with other companies and organizations in order to comply with the law, enforce or apply our conditions of use and other agreements, or to protect the rights of TM2AS, you or other TM2AS users and their property or safety, such as to prevent illegal activities such as fraud and reduce credit risk.However, this does not include personal information that is sold, rented, shared or otherwise disclosed for profit in violation of the promises made in this Privacy Policy.

(II) Transfer

We will not transfer your personal information to any company, organization or individual, except in the following cases:

1. Obtain your explicit consent or authorization in advance;

2. Provide in accordance with the applicable laws and regulations, the requirements of legal procedures, and the mandatory administrative or judicial requirements;

3. It is provided in accordance with the relevant agreements signed with you (including the electronic agreements signed online and the corresponding platform rules) or other legal documents;

4. In the case of merger, acquisition, asset transfer or similar transactions, if the transfer of personal information is involved, we will require the new company or organization holding your personal information to continue to be bound by this privacy policy, otherwise, we will require the company or organization to seek your authorization and consent again.

(III) Public disclosure

We will only publicly disclose your personal information under the following circumstances, provided that we take security precautions that comply with industry standards:

1. According to your needs, disclose your designated personal information in the way you explicitly agree to;

2. We may publicly disclose your personal information according to the type of personal information and the way of disclosure required if your personal information must be provided according to the requirements of laws and regulations, mandatory administrative law enforcement or judicial requirements.Subject to compliance with laws and regulations, when we receive a request to disclose information as described above, we will require a corresponding legal document, such as a subpoena or a letter of investigation. We strongly believe that we should be as transparent as possible about the information we are asked to provide, within the limits of the law.All requests are carefully reviewed to ensure that they have a legitimate basis and are limited to data that law enforcement has a legitimate right to obtain for specific investigative purposes. To the extent permitted by laws and regulations, the documents we disclose are protected by encryption keys.

IV. How we protect and keep your personal information

(I) Our technologies and measures to protect your personal information

We take the security of your personal information very seriously and take all reasonably practicable steps to protect your personal information:

1. Technical measures for data security

We will adopt security protection measures in line with industry standards, including establishing reasonable system norms and security technologies to prevent your personal information from unauthorized access, use, modification, damage or loss of data.

The network service of TM2as adopts encryption technologies such as transport layer security protocol, and provides browsing services through HTTPS and other means to ensure the security of user data in the transmission process.

TM2AS adopts encryption technology to encrypt and store user's personal information, and isolates it through isolation technology.

In the use of personal information, such as personal information display, personal information association calculation, we will use a variety of data desensitization technologies including content replacement, SHA256 and so on to enhance the security of personal information in use.

TM2AS adopts strict data access control and multiple identity authentication technology to protect personal information and avoid illegal use of data.

TM2AS adopts code security automatic inspection and data access log analysis technology to conduct personal information security audit.

2. Other security measures taken by TM2AS to protect personal information

TM2AS manages and standardizes the storage and use of personal information by establishing data classification and grading system, data security management specification and data security development specification.

TM2AS provides full security control of the data through contactee confidentiality agreements, monitoring and auditing mechanisms.

Enhance safety awareness. We also run security and privacy training courses to raise awareness of the importance of protecting personal information.

3. We only allow employees and partners of TM2AS and TM2AS affiliated parties who need to know such information to access personal information, and have set up strict access control and monitoring mechanisms for this purpose. At the same time, we require all persons who may have access to your personal information to fulfill the corresponding confidentiality obligations.Failure to comply with these obligations may result in legal liability or termination of the partnership with TM2AS.

4. We will take all reasonable and feasible measures to ensure that no irrelevant personal information is collected.

5. We have also done some creative work on user data protection:

In the TM2as trading system, the exposure of users' personal information in the trading process should be avoided as far as possible.

6. The Internet is not an absolutely secure environment, and it is impossible to determine whether e-mail, instant messaging, social software and other communication methods with other users are completely encrypted. We recommend that you use complex passwords when using such tools, and pay attention to protecting your personal information security.When trading online products or services with third parties through TM2AS, it is inevitable that you will disclose your personal information, such as contact information or residential address, to the counterparty or potential counterparty. Please protect your personal information and provide it to others only when necessary.

7. Handling of security incidents In order to deal with the possible risks of personal information leakage, damage and loss, TM2AS has formulated a number of systems to clarify the classification and grading standards of security incidents and security vulnerabilities and the corresponding handling procedures.TM2AS has also established a special emergency response team for security incidents. According to the requirements of security incident disposal specifications, it initiates security plans for different security incidents, carries out stop-loss, analysis, positioning, formulates remedial measures and jointly traces and attacks relevant departments.

In the event of a personal information security incident, we will, in accordance with the requirements of laws and regulations, promptly inform you of the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, the suggestions you can independently prevent and reduce risks, and the remedial measures for you.At the same time, we will timely inform you of the relevant information of the event by mail, letter, telephone, push notification, etc. When it is difficult to inform the subject of personal information one by one, we will take a reasonable and effective way to issue an announcement. At the same time, we will take the initiative to report the disposal of personal information security incidents in accordance with the requirements of the regulatory authorities.

8. The Internet environment is not 100% secure, and we will do our best to ensure or guarantee the security of any information you send to us. If our physical, technical, or administrative safeguards are compromised, resulting in unauthorized access, public disclosure, alteration, or destruction of information, which results in damage to your legitimate rights and interests, we will assume corresponding legal responsibilities.

9. If you have any questions about the protection of our personal information, you can contact us through the contact method agreed in this privacy policy. If you find that your personal information is leaked, especially your account and password, please contact us immediately through the contact method agreed in this privacy policy [VIII. How to contact us], so that we can take corresponding measures.

(II) Preservation of your personal information

1. Your personal information will be stored in the United States. If you use cross-border transaction services and need to transfer your personal information abroad to complete the transaction, we will separately obtain your authorization and require the recipient to process such personal information in accordance with our instructions, this privacy policy and any other relevant confidentiality and security measures.

2. During your use of our products or services, your personal information will be kept for the purpose of achieving the purposes described in this policy, and will be determined in accordance with the provisions of the mandatory retention requirements of the law.

3. Please note that after you successfully cancel your TM2AS account, we will delete or anonymize your personal information.When you or we assist you in deleting the information, we may not be able to immediately delete the information from the backup system because of applicable legal and security technical limitations. We will securely store your personal information and restrict any further processing of it until the backup can be deleted or anonymized.

4. If we terminate the service or operation, we will notify you at least 30 days in advance, and delete or anonymize your personal information after the termination of the service or operation.

How do you manage your personal information?

TM2AS takes your concerns about your personal information very seriously and makes every effort to protect your right to access, correct, delete and withdraw consent to your personal information so that you have sufficient ability to protect your privacy and security. Your rights include:

1. Access and correct your personal information

Except as provided by laws and regulations, you have the right to access and correct your personal information at any time, including:

    (1) If you need to access or correct other personal information generated in the course of using our products or services, please contact us at any time. We will respond to your request in the manner and within the time limits set out in this Privacy Policy.

2. Delete your personal information

The information that you can directly clear or delete in our product or service page, including order information, browsing information and receiving address information.

You may request the deletion of your personal information from us in the following circumstances:

    (1) If our processing of personal information violates laws and regulations;

    (2) If we collect and use your personal information without your consent;

    (3) If our processing of personal information violates the agreement with you;

    (4) If we terminate our services and operations.

If we decide to respond to your request for deletion, we will also notify the entities that have obtained your personal information from us and ask them to delete it in a timely manner, unless otherwise required by laws and regulations, or these entities have obtained your independent authorization.If we respond to your deletion request, we cannot guarantee that the information will be deleted from the backup system immediately, but we will delete the information when the backup system is updated.

3. Change the scope of your authorization or withdraw your authorization

You can change the extent to which you authorize us to continue to collect personal information or withdraw your authorization by deleting information, turning off device functions, making privacy settings on the TM2AS website or software, etc. You may also revoke our full authorization to continue to collect your personal information by cancelling your account.

Please understand that each business function requires some basic personal information to complete. When you withdraw your consent or authorization, we will not be able to continue to provide you with the services corresponding to the withdrawal of consent or authorization, nor will we process your corresponding personal information. However, your decision to withdraw your consent or authorization will not affect the processing of personal information previously carried out on the basis of your authorization.

5. Respond to your request

If you are unable to access, correct or delete your personal information through the above means, or you need to access, correct or delete other personal information generated by your use of our products or services, or you believe that TM2AS has any violation of laws and regulations or agreements with you on the collection or use of personal information, You can send an email to email @ tm2as.Com or contact us through other means in this Privacy Policy. For security purposes, we may require you to provide a written request, or provide your identification documents, and we will respond to your request within 15 days after we receive your feedback and verify your identity.For your reasonable request, we do not charge in principle, but for repeated requests that exceed the reasonable limit, we will charge a certain cost according to the situation.Requests that are unnecessarily repetitive, require excessive technical effort (for example, requiring the development of new systems or fundamental changes to existing practices), pose a risk to the legitimate interests of others, or are highly impractical (for example, involving information stored on backup tapes) may be denied.

We will not be able to respond to your request as required by law in the following circumstances:

    (1) It is related to the performance of the obligations stipulated by laws and regulations by the personal information controller;

    (2) related to national security and national defense security;

    (3) related to public security, public health and major public interests;

    (4) Related to criminal investigation, prosecution, trial and execution of judgments;

    (5) There is sufficient evidence to show that you have subjective malice or abuse of rights;

    (6) In order to safeguard the major legitimate rights and interests of the subject of personal information or other individuals, such as life and property, but it is difficult to obtain their consent;

    (7) Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations;

    (8) Involving trade secrets.

VI. Personal Information Protection of Minors

1. TM2AS attaches great importance to the protection of minors' personal information. If you are a minor under the age of 18, you must obtain the prior consent of your guardian before using our products or services. TM2AS protects the personal information of minors in accordance with relevant national laws and regulations.

2. We will not actively and directly collect personal information from minors. Where personal information is collected from a minor with the consent of a guardian, we will only use, share, transfer or disclose this information as permitted by law, as consented to by the guardian or as necessary to protect the minor.

3. If it is proved that a minor has registered to use our products or services without the consent of the guardian, we will consult with the relevant guardian and try to delete the relevant personal information as soon as possible.

4. For the personal information of children under the age of 14 that may be involved, we further take the following measures to protect it:

    (1) For the collected personal information of children, in addition to abiding by the provisions of this privacy policy on personal information of users, we will also adhere to the principles of legitimate necessity, informed consent, clear purpose, security and legal use, and strictly comply with the requirements of laws and regulations such as the Regulations on the Protection of Children's Personal Information Network.It will not exceed the time limit necessary to achieve the purpose of collection and use, and we will delete or anonymize children's personal information after expiration.

    (2) When you, as a guardian, choose to use TM2AS related services for the child under guardianship, we may need to collect personal information of the child under guardianship from you for the purpose of performing related services to you. If we need to collect children's personal information from you in specific services, we will obtain your authorization and consent in advance, and inform you of the purpose and use of the collection.If you do not provide the aforementioned information, you will not be able to enjoy the relevant services provided by us. In addition, you may voluntarily provide us with children's personal information when sharing information related to the application service by using the list, evaluation and question-and-answer functions. Please know clearly and choose carefully. As a guardian, you should perform your guardianship duties correctly and protect the personal information security of children.If the child himself/herself needs to register or use our products or services, you should guide and supervise them properly.

    (3) Children or their guardians have the right to access and correct their personal information at any time, and can also make requests to us for correction and deletion. If you have any comments, suggestions, complaints or reports on matters related to children's personal information, please contact us. We are here to help.

VII. Notices and Amendments

1. In order to provide you with better services and with the development of TM2AS business, this privacy policy will be updated accordingly. However, we will not reduce your rights under this Privacy Policy without your express consent.We will issue the updated version on the TM2AS website and TM2AS mobile terminal, and remind you of the update of the relevant content through the website announcement or other appropriate ways before it comes into effect. Please also visit TM2AS to keep abreast of the latest privacy policy.

2. For major changes, we will also provide a more prominent notice (we will explain the specific changes in the privacy policy by means of, including but not limited to, email, SMS or special reminders on the browsing page).

Material changes referred to in this Privacy Policy include, but are not limited to:

    (1) Significant changes have taken place in our service model. For example, the purpose of processing personal information, the type of personal information processed, the way of using personal information, etc.;

    (2) Significant changes have taken place in our ownership structure and organizational structure. Such as changes in ownership caused by business adjustment, bankruptcy and mergers and acquisitions;

    (3) The main object of personal information sharing, transfer or public disclosure has changed;

    (4) There is a significant change in your right to participate in the processing of personal information and the way you exercise it;

    (5) Our department responsible for handling personal information security, contact information and complaint channels change;

    (6) When the personal information security impact assessment report indicates that there is a high risk.

Slice 1 Created with Sketch.