Welcome to use the "COPE Cloud ERP" product!
Your trust is essential to COPE Services ("we" or "us"). We are well aware of the importance of user privacy to you, and in compliance with legal and regulatory requirements, we will take corresponding security measures to protect your information to the best of our ability. In this context, this document will help you understand how we provide access, update, control, and protect your information. It also outlines how we may collect, use, store, and share this information when you use our products or services. Before using our products or services, please carefully read, understand, and agree to this Privacy and Information Protection Policy. Once you start using our products or services, it implies your agreement to the collection, use, storage, and sharing of your relevant information in accordance with this Privacy and Information Protection Policy. The aforementioned terms will be specifically highlighted through bold and underlined formatting to draw your special attention.
This Privacy and Information Protection Policy will help you understand the following:
- 1.Scope of Application
- 2.The Information We May Collect
- 3.How We Store Your Information
- 4.How We Protect Your Information
- 5.How We Use Your Information
- 6.Sharing and External Provision of Information
- 7.How to Access and Manage Your Information
- 8.Sensitive Information
- 9.Protection of Minors
- 10.Policy Changes
- 11.Contact Us
- 12.Others
1.Scope of Application
This Privacy and Information Protection Policy applies to all products and services provided by us and our affiliated companies, including the COPE Cloud ERP system, COPE Overseas Warehousing system, BMS billing system, and services provided through these products, including services provided on other products or websites (such as advertising services). However, it does not apply to products and services with independent privacy policies (not incorporated into this Privacy and Information Protection Policy). In this Privacy and Information Protection Policy, "affiliated companies" refer to any other entities that are directly or indirectly controlled by us, control us, or are jointly controlled with others by us. For this purpose, "control" means having the power to make decisions on the management and policies of another entity either through holding securities with voting rights, or through contractual arrangements, or other means (to avoid doubt, holding more than 50% of securities with voting rights or having the right to appoint more than half of the directors should be considered as control).
2.The Information We May Collect
In order to provide services to you and optimize the quality of our services, we may collect the following information and related information that you actively provide, authorize, or generate due to the use of our products and services during registration and use:
-
1. User Information: The personal information you provide, such as name, ID number, email address, phone number, contact address, etc., as well as user profile information for businesses, including company name and address.
-
2. Company Information: We collect the enterprise client information provided by you, as well as the data processed, stored, uploaded, downloaded, distributed, and otherwise obtained or processed during your registration and use of the products and services we provide. Additionally, we gather other enterprise-related information you provide.
-
3. Information about devices or software includes: We may collect information specific to your device or software, such as your hardware model, operating system version, unique device identifiers, and mobile network information, including your phone number. We may associate your device identifiers or phone number with your account.
-
4. Log Information: When you use our services or view content provided by us, we may automatically collect certain information and store it in server logs. This information may include detailed usage of our services, such as your search query content; computer log information; phone log information, such as your phone number, calling party number, call forwarding number, call time and date, call duration, SMS routing information, and call type.
-
5. IP address, device event information: For example, crashes, system activities, hardware settings, browser type, browser language, the date and time of your request, and the referral URL, which can uniquely identify your browser or account through cookies.
-
6. Location Information: When you use services with location features enabled, we may collect and process information about your actual location (such as GPS signals sent by mobile devices). We may also use various technologies for positioning, such as sensor data from your device, which can provide information about nearby Wi-Fi access points and base stations.
-
7. Unique Application Number: Some services include a unique application number. When you install or uninstall related services or when these services communicate with our servers regularly (such as for software updates), the system will send this number and installation-related information (such as the type of operating system and application version number) to us.
3. How We Store Your Information
-
1. Local Storage:
We may use mechanisms such as browser local storage (including HTML5) and application data caching to collect information, including personal information, from your device and the information you provide to us when using our products or services, and store it locally.
-
2. Cookies and Anonymous Identifiers:
When you use our services, we and our partners may use various technologies to collect and store information, during which one or more cookies or anonymous identifiers may be sent to your device. We also use cookies and anonymous identifiers when you interact with services provided to partners (such as advertising services or features that may appear on other websites).
-
3. Cloud Sync Services:
The terms of this "Privacy and Information Protection Policy" also apply when you use our products, services, and websites with cloud sync service functionality. With our cloud sync feature, you can use certain internet services, including storing your cloud-synced content on your compatible devices and computers for access. Once you enable the cloud sync feature, your cloud-synced content will be automatically sent to us and stored. Subsequently, you can access this information or wirelessly push the information to your other devices or computers that have the cloud sync feature enabled. While ensuring the security of your information, you understand and agree that we collect, use, store, and share your information through cloud services according to the conditions specified in this "Privacy and Information Protection Policy."
4. How We Protect Your Information
-
1. We use various security technologies and procedures to prevent the loss, improper use, unauthorized access, or disclosure of information. For example, in certain services, we will use encryption technology (such as SSL) to protect the information you provide.
-
2. We establish dedicated management systems, processes, and organizations to ensure information security. For example, we strictly limit the personnel who can access information, require them to comply with confidentiality obligations, and conduct audits.
-
3. We will formulate emergency plans for network security incidents related to information security, promptly handle system vulnerabilities, computer viruses, network attacks, network intrusions, and other security risks. In the event of or potential for information leakage or loss, we will:
- (1) Take immediate remedial measures, report the handling of information security incidents to regulatory authorities as required by laws and regulations, and promptly inform users;
- (2) Immediately initiate the network security incident emergency plan, investigate and assess network security incidents, take technical measures and other necessary measures to eliminate security risks and prevent harm from expanding;
- (3) Timely inform affected data subjects of the relevant situation through email, letters, phone calls, push notifications, etc. If it is difficult to inform data subjects one by one, we will use reasonable and effective means to publish warning information related to the public.
-
4. We will take reasonable and feasible measures to avoid collecting irrelevant information and retain your information for the period required to achieve the purposes stated in this "Privacy and Information Protection Policy," unless an extension of the retention period is required or permitted by law.
-
5. However, please understand that due to technological limitations and various malicious means that may exist, even with the best efforts to strengthen security measures in the internet industry, it is not always possible to guarantee the absolute security of information. You need to understand that problems may arise with the systems and communication networks you use to access our services due to factors beyond our control.
5. How We Use Your Information
We may use
the information we collect and store under this "Privacy and Information Protection Policy" for the following purposes:
- 1. Provide services to you;
- 2. When providing services, use it for identity verification, customer service, security precautions, fraud monitoring, archiving, backup, etc., to ensure the security of the products and services we provide to you;
- 3. Help us improve existing products and services, develop new features to provide you with better services; understand your personalized needs to provide customized service content, such as language settings, location settings, search results, etc.;
- 4. We may combine the information from one service with information from other services provided by us or our affiliated companies in the future to provide you with more comprehensive and higher-quality services.
-
5. Recommend products and services to you, conduct market research, and analyze information data.
- 6. For all services that require sharing accounts provided by us, we may use the name provided by you in the information to us. In addition, we will replace the name associated with your account before to ensure that the same identity is used in all your services. For other services provided by us, our partners, and affiliated companies that need to be associated with your system account, if our partners and affiliated companies know your email address or other information that can identify you, we may share your name and photo with our partners and affiliated companies.
- 7. In order to provide you with a better experience, improve our services, or for other purposes agreed by you, we may use the information collected through one service for information aggregation or personalization in our other services, in compliance with relevant laws and regulations.
6. Sharing and External Provision of Information
You are aware and agree that
in the following situations, we and our affiliated companies may share, transfer, or disclose your information to our affiliated companies, partners, and/or third parties:
-
1. We and our affiliated companies may share your information with our affiliated companies, partners, and third-party service providers, contractors, and agents for the following purposes:
- (1) Provide products and services of ours and our affiliated companies and partners to you;
- (2) Achieve the purposes described in Part 5 of this "Privacy and Information Protection Policy" ("How We Use Your Information");
- (3) Fulfill our obligations and exercise our rights under this "Privacy and Information Protection Policy";
- (4) Understand, maintain, and improve our services.
-
2. As our business continues to develop, we and our affiliated companies may engage in mergers, acquisitions, asset transfers, or similar transactions, and your information may be transferred as part of such transactions. We will notify you before the transfer and request that the entity receiving your information continue to be bound by this "Privacy and Information Protection Policy," otherwise, we will ask that entity to obtain your authorization and consent again.
-
3. We or our affiliated companies may also retain, preserve, share, transfer, or disclose your information for the following needs, and you understand and agree that in any of the following situations, we do not need to obtain your prior authorization and consent for the retention, preservation, sharing, transfer, or disclosure of your information:
- (1) Comply with applicable laws and regulations;
- (2) Comply with the provisions of court judgments, rulings, or other legal procedures;
- (3) Comply with the requirements of relevant government authorities;
- (4) For purposes reasonably necessary to comply with applicable laws and regulations, maintain public interests, or protect the personal and property safety or legal rights and interests of our customers, us, our affiliated companies, other users, or employees.
-
4.
Without disclosing individual user privacy information or obtaining the relevant user's authorization, we and our delegated affiliated companies and/or partners have the right to deduce, calculate, analyze, organize, and mine the entire user database, and based on this, make commercial use of the user database. We guarantee that we will not disclose or provide the registration information of individual users or non-public content stored with us to third parties without the consent of the relevant users.
-
5. With your prior consent, we may share your personal information with our affiliated companies, partners, and/or third parties.
If we or our affiliated companies share your information with any of the above-mentioned parties, we will only share the information necessary for them to provide the services, and we will take measures such as encryption or anonymization to ensure the security of your information.
7.How to Access and Manage Your Informatio
-
1. In the following circumstances, upon your request, we will delete your information or anonymize it in accordance with applicable laws, regulations, and standards:
- (1)You voluntarily deactivate your account.;
- (2)If we terminate services and operations.;
- (3)In accordance with relevant laws, regulations, and national standards, or if it is required to be deleted by government agencies or judicial authorities, or when the storage period for your information has expired.
- 2. In accordance with applicable laws, regulations, and standards, we ensure your rights to exercise the following regarding your information:
-
(1)If you have any questions regarding this "Privacy and Information Protection Policy," you have the right to contact us as stipulated in Article 11. Upon verifying your identity, you have the right to access and request corrections to your information or the information of the minors under your guardianship. We will provide a response and reasonable explanations within 30 days of receiving your request or within the period specified by laws and regulations.
- (2)Due to legal or technical requirements, we are unable to fulfill all of your requests, we will still respond to your requests within a reasonable timeframe and provide a reasonable explanation.
8.Sensitive Information
Certain information about you, due to its sensitive nature, may be considered as sensitive personal information. Examples of such information include your race, religion, health and medical information, bank account details, property information, credit information, identification card numbers, transaction information, etc. Sensitive personal information is subject to more stringent protection compared to other types of information.We will only share your sensitive personal information with other entities after you have explicitly chosen to agree, and we will make every effort to ensure that the recipients of such data have sufficient capabilities to safeguard information security.
9.Protection of Minors
If you are an individual user under the age of 18, please read and accept this Privacy and Information Protection Policy with the accompaniment of your legal guardian, and pay special attention to the terms for minors. For the collection of personal information from minors who use our products or services with the consent of their legal guardians, we will only use, share, transfer, or disclose this information in accordance with applicable laws and regulations, with the explicit consent of the legal guardian, or when it is necessary to protect the rights and interests of the minors. We will protect the personal information of minors in accordance with relevant national laws and regulations and the provisions of this Privacy and Information Protection Policy.
10.Policy Changes
We may revise relevant terms of this Privacy and Information Protection Policy from time to time, and such revisions constitute part of this Privacy and Information Protection Policy. We will provide notice of these revisions by prominently posting them on the homepage or by sending you an email or other notifications such as through internal messages before the revisions take effect. In such a case, if you continue to use our services, it indicates your agreement to be bound by the revised terms of this Privacy and Information Protection Policy.
11.Contact Us
If you have any questions, comments, or suggestions regarding this Privacy and Information Protection Policy or our data processing, you can contact us through the following contact information. Our contact details are as follows:
Email:service@thecopeservices.com
In general, we will respond within thirty days after receiving your relevant contact information.
12.Others
- 1.The establishment, effectiveness, performance, interpretation, and resolution of disputes of this Privacy and Information Protection Policy shall be governed by the laws of the United States.
- 2.If there is a dispute over the interpretation or execution of this Privacy and Information Protection Policy, the parties shall first attempt to resolve the dispute through amicable negotiations. If the dispute is not resolved through negotiations within sixty days after one party has delivered a written notice to the other party to commence negotiations, either party may submit the dispute to the Shenzhen Arbitration Commission for arbitration in accordance with its rules. During the occurrence of any dispute and throughout the arbitration of any dispute, except for matters in dispute, the parties shall continue to exercise their respective rights and fulfill their respective obligations under this Privacy and Information Protection Policy.
- 3.This Privacy and Information Protection Policy is an integral part of the agreements we publish related to providing products or services to you. It constitutes a unified whole with these agreements. Accepting any of these agreements implies your acceptance of this Privacy and Information Protection Policy.
- 4.If any provision of this Privacy and Information Protection Policy is determined to be wholly or partially invalid or unenforceable for any reason, the remaining provisions of this Privacy and Information Protection Policy shall remain valid and enforceable.
- 5.If any provision of this Privacy and Information Protection Policy conflicts with or is inconsistent with the terms of the already published User Agreement, the provisions of this Privacy and Information Protection Policy shall prevail.