Privacy Policy

FUZHOU SONLAM BUILDING MATERIALS CO.,LTD (hereinafter referred to as "we") fully understands the importance of personal information to you and will do its best to protect the safety and reliability of your personal information.

We are committed to maintaining your trust in us and abide by the following principles to protect your personal information: the principle of consistency of rights and responsibilities, the principle of clear purpose, the principle of choice and consent, the least sufficient principle, the principle of ensuring security, the principle of subject participation, the principle of openness and transparency, etc. .

At the same time, we promise that we will take corresponding security protection measures to protect your personal information in accordance with mature security standards in the industry.

Please read and understand this Privacy Agreement carefully before using our SONLAM mall.

1. How we collect and use your personal information

Personal information refers to various information recorded electronically or in other ways that can identify a specific natural person alone or in combination with other information or reflect the activities of a specific natural person.

We will only collect and use your personal information for the following purposes described in this policy:

(1) Provide you with online services

1. Business function one: Register as a user. To complete the account creation, you need to provide the following information: your name, mobile phone number, email address, and created password.

During the registration process, if you provide the following additional information, it will help us provide you with better services and experience: email number, nickname, avatar, bank card, ID card. However, if you do not provide this information, it will not affect the basic functions of using this service.

The above information you provide will continue to be used by us during your use of this service. When you cancel your account, we will stop using and delete the above information.

The above information will be stored within the territory of the People's Republic of China. If cross-border transmission is required, we will obtain your authorization separately.

2. Business function two: product display, personalized recommendations, and sending promotional marketing information.

(2) Carry out internal data analysis and research, third-party SDK statistical services, and improve our products or services

We collect data based on your interactions with us and the choices you make, including your privacy settings and the products and features you use.

The data we collect may include SDK/API/JS code version, browser, Internet service provider, IP address, platform, timestamp, application identifier, application version, application distribution channel, unique device identifier, iOS advertising identifier (IDFA), Android advertiser identifier, network card (MAC) address, International Mobile Equipment Identity (IMEI), clipboard information, OAID, device model, terminal manufacturer, terminal device operating system version, session start/stop Time, language location, time zone and network status (WiFi, etc.), hard disk, CPU and battery usage, etc.

(3) Other usage situations

When we want to use information for other purposes not specified in this policy, we will ask for your consent in advance.

When we want to use the information collected for a specific purpose for other purposes, we will ask for your consent in advance.

2. How we use cookies and similar technologies

(1) Cookies To ensure the normal operation of the website, we will store small data files called Cookies on your computer or mobile device. Cookies usually contain an identifier, the site name, and some numbers and characters. Cookies allow websites to store data such as your preferences or the items in your shopping basket.

We will not use Cookies for any purpose other than those stated in this policy. You can manage or delete cookies according to your preferences. You can clear all cookies saved on your computer, and most web browsers have the ability to block cookies.

(2) Web beacons and pixel tags In addition to Cookies, we will also use other similar technologies such as web beacons and pixel tags on our website.

For example, emails we sent you may contain click URLs linked to content on our website. If you click this link, we will track this click to help us understand your product or service preferences and improve customer service. A web beacon is typically a transparent image embedded into a website or email. With the help of pixel tags in emails, we can learn whether the emails have been opened. If you do not want your activities to be tracked in this way, you can unsubscribe from our mailing list at any time.

(3) Do Not Track

Many web browsers have a Do Not Track feature that issues a Do Not Track request to a website. Currently, the major Internet standards organizations have no policies in place that govern how websites should respond to such requests. However, if your browser has Do Not Track enabled, all of our sites will respect your choice.

3. How we share, transfer and publicly disclose your personal information

(1) Sharing

We will not share your personal information with any other company, organization or individual, except in the following circumstances:

1. Sharing with explicit consent: After obtaining your explicit consent, we will share your personal information with other parties.

2. We may share your personal information externally in accordance with laws and regulations, or in accordance with the mandatory requirements of government authorities.

3. Sharing with our affiliated companies: Your personal information may be shared with our affiliated companies. We will only share personal information that is necessary and subject to the purposes stated in this Privacy Agreement.

If affiliated companies want to change the purpose of processing personal information, they will ask for your authorization and consent again.

4. Sharing with authorized partners: Only to achieve the purposes stated in this privacy agreement, some of our services will be provided by authorized partners. We may share some of your personal information with partners to provide better customer service and user experience.

For example, companies we hire to provide third-party data statistics and analysis services may need to collect and access personal data for data statistics and analysis. In this case, these companies must comply with our data privacy and security requirements.

We will only share your personal information for legal, legitimate, necessary, specific, and clear purposes, and we will only share personal information necessary to provide services.

We will sign strict confidentiality agreements with companies, organizations and individuals with whom we share personal information, requiring them to handle personal information in accordance with our instructions, this Privacy Agreement and any other relevant confidentiality and security measures.

(2) Transfer

We will not transfer your personal information to any company, organization or individual, except in the following circumstances:

1. Transfer with explicit consent: After obtaining your explicit consent, we will transfer your personal information to other parties;

2. When a merger, acquisition or bankruptcy liquidation is involved, if personal information is transferred, we will require the new company or organization that holds your personal information to continue to be bound by this privacy policy. Otherwise, we will require the company or organization to continue to be bound by this privacy policy. Re-ask for your authorization and consent.

(3) Public disclosure

We will only publicly disclose your personal information under the following circumstances:

1. After obtaining your explicit consent;

2. Disclosure based on law: We may publicly disclose your personal information when required by laws, legal procedures, lawsuits or mandatory requirements from government authorities.

4. How we protect your personal information

(1) We have used security protection measures that comply with industry standards to protect the personal information you provide and prevent data from unauthorized access, public disclosure, use, modification, damage or loss. We will take all reasonably feasible measures to protect your personal information.

For example, the exchange of data (such as credit card information) between your browser and the "Service" is protected by SSL encryption; we also provide https secure browsing on our website; we will use encryption technology to ensure the confidentiality of data; we will Use trusted protection mechanisms to prevent data from malicious attacks; we will deploy access control mechanisms to ensure that only authorized personnel can access personal information; and we will hold security and privacy protection training courses to strengthen employees' awareness of the importance of protecting personal information. know.

(2) We will take all reasonable and feasible measures to ensure that no irrelevant personal information is collected. We will only retain your personal information for the period necessary to achieve the purposes stated in this policy, unless an extension of the retention period is required or permitted by law.

(3) The Internet is not an absolutely secure environment, and emails, instant messaging, and communication with other our users are not encrypted. We strongly recommend that you do not send personal information through such methods. Please use a complex password to help us ensure the security of your account.

(4) The Internet environment is not 100% safe, and we will try our best to ensure or guarantee the security of any information you send to us. If our physical, technical, or management protection facilities are damaged, resulting in unauthorized access, public disclosure, tampering, or destruction of information, resulting in damage to your legitimate rights and interests, we will bear corresponding legal liability.

(5) After an unfortunate personal information security incident occurs, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, and the measures you can take to prevent and control your own information. Recommendations for reducing risks, remedial measures for you, and more. We will promptly notify you of the incident-related information through emails, letters, phone calls, push notifications, etc. When it is difficult to inform the personal information subjects one by one, we will issue announcements in a reasonable and effective manner.

At the same time, we will also proactively report the handling of personal information security incidents in accordance with the requirements of regulatory authorities.

5. Your rights

In accordance with relevant Chinese laws, regulations, standards, and common practices in other countries and regions, we guarantee that you can exercise the following rights with respect to your personal information:

(1) Access your personal information

You have the right to access your personal information, except for exceptions provided by laws and regulations. If you wish to exercise your right to access your data, you can do so yourself by:

Account information - If you wish to access or edit the profile information and payment information in your account, change your password, add security information or close your account, etc., you can find Account Security Implementation in Settings by opening the Personal Center Such operations.

Search information - You can access or clear your filled history, view and modify, and manage other data in "Me."

For other personal information generated during your use of our products or services, we will provide it to you as long as we do not need to invest too much. If you would like to exercise your data access rights, please contact SONLAM customer service.

(2) Correct your personal information

When you discover an error in the personal information we process about you, you have the right to ask us to make a correction.

You can apply for correction through the methods listed in "(1) Access to your personal information".

(3) Delete your personal information

You can make a request to us to delete personal information under the following circumstances:

1. If our handling of personal information violates laws and regulations;

2. If we collect and use your personal information without your consent;

3. If our processing of personal information violates our agreement with you;

4. If you no longer use our products or services, or you cancel your account;

5. If we no longer provide you with products or services.

If we decide to respond to your deletion request, we will also notify the entities that obtained your personal information from us and require them to delete it promptly, unless otherwise provided by laws and regulations, or these entities obtain your independent authorization.

When you delete information from our services, we may not delete the corresponding information from the backup system immediately, but we will delete the information when the backup is updated.

(4) Change the scope of your authorization and consent

Each business function requires some basic personal information to be completed (see "Part 1" of this Agreement). You can give or withdraw your consent at any time for the collection and use of additional personal information.

You can operate it yourself in the following ways: Open SONLAM Mall-My-Settings-Account Security

When you withdraw your consent, we will no longer process the corresponding personal information. However, your decision to withdraw your consent will not affect the previous processing of personal information based on your authorization.

(5) Personal information subject cancels account

You can cancel your previously registered account at any time. You can do it yourself in the following ways: Contact SONLAM customer service

After canceling your account, we will stop providing products or services to you and delete your personal information according to your request, unless otherwise provided by laws and regulations.

(6) Constraint information system automatic decision-making

In some business functions, we may make decisions based only on non-human automated decision-making mechanisms including information systems, algorithms, etc. If these decisions significantly affect your legal rights and interests, you have the right to ask us for an explanation, and we will also provide appropriate relief.

(7) Respond to your above request

For security reasons, you may be required to provide a written request or otherwise prove your identity. We may ask you to verify your identity before processing your request.                        

We will respond within thirty days. If you are not satisfied, you can also complain through the following channels:

Personal Center - Complaints and Suggestions

In principle, we do not charge fees for your reasonable requests, but for repeated requests that exceed reasonable limits, we will charge a certain cost depending on the circumstances. For those that are gratuitously repetitive, require excessive technical means (for example, require the development of new systems or fundamentally change existing practices), pose risks to the legitimate rights and interests of others, or are very impractical (for example, involving information stored on backup tapes) request, we may deny it.                        

In the following circumstances, we will not be able to respond to your request in accordance with legal and regulatory requirements:

1. Related to national security and national defense security;

2. Related to public safety, public health, and major public interests;

3. Related to criminal investigation, prosecution and trial;

4. There is sufficient evidence that you have subjective malice or abuse of rights;

5. Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations.

6. How we process children’s personal information

Our products, websites and services are primarily intended for adults. Children may not create their own user accounts without the consent of a parent or guardian.                        

For cases where we collect personal information from children with parental consent, we will only use or publicly disclose this information as permitted by law, with the explicit consent of the parent or guardian, or as necessary to protect the child.                        

Although local laws and customs may define children differently, we consider anyone under the age of 14 to be a child.                        

If we discover that we have collected personal information from children without first obtaining verifiable parental consent, we will seek to delete the data as quickly as possible.

7. How your personal information is transferred globally

In principle, the personal information we collect and generate within the territory of the People's Republic of China will be stored within the territory of the People's Republic of China.

Because we provide products or services through resources and servers around the world, this means that, with your authorization and consent, your personal information may be transferred to overseas jurisdictions in the country/region where you use the products or services, or subject to access from these jurisdictions.                  

Such jurisdictions may have different or no data protection laws. In such cases, we will ensure that your personal information is adequately protected within the People's Republic of China. For example, we may ask for your consent to the cross-border transfer of personal information, or implement security measures such as data de-identification before cross-border data transfer.

8. How to update this privacy agreement

We may adjust or change this Privacy Agreement from time to time. Any updates to this Privacy Agreement will be posted on our website with the update time. Unless there are other mandatory provisions in laws, regulations or regulatory provisions, the adjusted or changed content It will take effect 7 days after being notified or announced. If you continue to use any of the services we provide or visit our related websites after the privacy agreement has been adjusted or changed, we believe this means that you have fully read, understood and accepted the revised privacy agreement and are bound by it.

9. Information from third-party social media services

The Company allows you to create an account and log in to use the Services through the following third-party social media services:

Apple

Google

Facebook

Instagram

During the operation of our product application, we need to collect your device's unique identification code (IMEI/android; ID/DEVICE_ID/IDFA, SIM card; IMSI; information) to provide statistical analysis services, and improve performance through application startup data and exception error log analysis and user experience to provide users with better services.

Message push service provider (self-starting)

We may provide your device platform, device manufacturer, device brand, device identification code and other device information, application list information, network information and location-related information to our partners to provide you with message push technology services. When we push messages to you, we may authorize our partners to perform link adjustments and mutually activate the closed SDK push process to ensure that you can receive the messages we push to you in a timely manner.

Usage scenarios: push system messages such as order payment, delivery, after-sales, balance withdrawal, payment, etc.

Google one-click login/Apple one-click login (association activation)

Types of information that may be obtained; personal files stored

Device permissions: read external storage, write external storage

Usage scenarios: Register and log in account, share, user place order and pay, order application for after-sales service

Device permissions: Read network status

Usage scenarios: User placing an order, applying for after-sales service

Google Maps, Tencent Maps, Baidu Maps, Amap (self-starting) may obtain information types IMEI, openid, location information

Device permissions: Get network status, access Wi-Fi status, location information, access rough location, access precise positioning, read phone status and identity

Usage scenarios: obtaining address information for intra-city delivery, automatically recommending nearby stores for intra-city pickup

10. How to contact us

If you have any questions, comments or suggestions about this Privacy Policy, please contact us through the following methods:

Email: sonlam@sonlam.net

Official website: https://www.sonlam.net

Normally, we will respond within thirty days.