Effective date: 18 November 2022
We, Cooperate Logistics Co., Ltd.(hereinafter referred to as "Company"), as the operators of the Cargosoon Software (hereinafter referred to as "Software " or "Platform"), are fully aware of the importance of personal information for you. We will protect your personal information and privacy in accordance with laws and regulations. This "Privacy Policy of the Cargosoon" (hereinafter referred to as the "Privacy Policy ") will help you understand in detail how we collect, use, store, transmit, share, transfer (if applicable) and protect your personal information, and how you inquire, access, delete, modify your personal information, and how to withdraw your authorization. Please read and understand this Privacy Policy carefully before using our services.
Special Reminder: Please read this Privacy Policy carefully and be sure to understand our rules of processing. Among them, the important content related to your personal information rights and interests has been noticed in the form of bold fonts, underlined, etc. You shall pay special attention to it. If you have any questions of the Software, you can contact our customer service for consultation. If you do not agree with any terms in the agreement, you shall stop accessing and using immediately.
This policy will help you understand the following:
1. Interpretation
2. How do we collect and use personal information
3. How do we use technologies such as cookies
4. How do we share, transfer, and disclose personal information
5. How do we store and protect personal information
6. User rights
7. Provisions on the protection of minors
8. Revision and notification of personal information protection policy
9. Scope of application
1.1. Personal information refers to various kinds of information individually or in combination with other information, identify a specific natural person or reflect the activities of a specific natural person. The personal information referred hereto is listed in the clause "How do we collect and use personal information".
1.2. Personal sensitive information refers to personal information that, once leaked, illegally provided, or misused, may endanger the subject's safety and property security, or easily lead to reputation, physical or mental health damage, or discriminatory treatment. The personal sensitive information involved in the Privacy Policy includes: your property information (including transaction records, bank accounts); personal identification information (including ID); network identification information (including accounts on the Platform or third-party, account nickname and password related to the above). In addition to the unified definition and listing here, we also will remind you of the personal sensitive information in easy-reading form of bold fonts and underlined, or point out separately, etc. You shall pay attention to it.
1.3. The Company will do its best to protect the safety and reliability of your personal information. The Company will abide by the following principles to protect your personal information: (1) the principle of consistency of rights and responsibilities, (2) the principle of clear purpose, (3) the principle of choice and consent, (4) the principle of least sufficiency, (5) the principle of ensuring security, (6) the principle of subject participation, (7) the principle of openness and transparency, etc. . At the same time, the Company will take corresponding security protection measures to protect your personal information in accordance with the mature security standards in the industry.
We will only collect and use your personal information for the following purposes described in the Privacy Policy:
2.1. Registration and Login
You can access and use the Software without an account, but some functions or services may be affected in unlogged mode. To enable you to better enjoy our services, we provide you with the following registration services:
2.1.1. When registering, you shall fill in your mobile phone number and click to get the verification code. Then the Platform will send you a verification code. If the platform subsequently opens registration login channels such as the third-party account authorization and email address verification, you can also follow instructions on the page prompts to register and log in.
2.1.2. After you successfully register an account, you will access a Cargosoon account, and you can complete the relevant network identification information (account nickname, avatar, personal introduction, personal information, etc.) according to the requirements and the modules that the platform opens to users to fill in/modify.
2.2. Authentication
When you use certain services, the Company may conduct special authentication to verify your identity. If needed, you may provide your real identity information (real name, ID card number, mobile phone number, etc.) , your company information (company name, Registration Number) as well as your occupation or Position in the company to complete the authentication. The information above is personal sensitive information. You can refuse to provide. If you refuse, you may not be able to obtain corresponding service, but it does not affect the normal use of other functions and services.
2.3. Chargeable Service
If you purchase our paid services, we will collect your payment information (including payment channels, payment institutions, payment accounts, etc.) and paid service using information, which will be retained as transaction vouchers.
2.4. Sharing
When you choose to use cargo location query or share information on the Platform, we need to use your mobile application list information to jump to the installed social media software for external sharing. We use browser web storage mechanisms and application data caching to collect information on your device and store it locally.
2.5. Improve Our Services
We may also obtain other information about you for reasonable needs to improve our products or services, including relevant feedback information provided when you contact customer service, questionnaire response information sent to us when you participate in a questionnaire survey, and related information that we authorized to obtain when you interact with our affiliates and our partners. For the information collected from your various devices, we may associate them so that we can provide you with consistent services on these devices. We may combine information from one service with information from other services to provide you with better services.
2.6. Ensure your Security of Using The Software
We are committed to providing you with a safe and reliable product and using environment, to providing high-quality and reliable services and information is our core goal. In order to improve the security of your use of our services, to protect the personal and property safety of you, other users or the public, and to better prevent security risks such as phishing websites, fraud, network bugs, computer viruses, network attacks, and network invading, and to identify the violations of laws and regulations or related platform agreement rules more accurately, we may use or combine your registration information, device information, web logs, and the frequency of you using application, crash data, overall usage, performance data, and the sources of applications, to comprehensively judge your account and transaction risks, to perform identity verification, detect and prevent security incidents, and take necessary recording, auditing, analysis, and disposal measures in accordance with the law. The specific information collected and the risks to be prevented are as follows:
2.6.1. To ensure the safe operation of software and services, we may collect your Hardware model, operating system version number, software version number, network access method and type, operation log, information about currently running programs.
2.6.2. To prevent malicious programs and necessary for safe operation, we will collect your log information (including browsing records, retrieved content, click-to-view records, transaction records and IP addresses, browser types, languages used, access date and time) , device information (including device models, device settings, MAC addresses, and IMEI, IDFA, OAID device identifier, operating system, system language, SIM card IMSI information, SIM card home, device environment, ICCID information), and frequency of use of software and related services, crash data, overall installation and usage, performance data. The information above will be used to identify illegal users, improve user security and the overall fairness of the platform.
2.6.3. We may use your account information, device information, service log information, and information that our affiliates and partners have obtained your authorization or can share in accordance with the law to determine account security, perform identity verification, detect and prevent security incidents. For security risk control purposes, we also may obtain a list of your mobile applications.
2.7. Third-party SDK
In the process of providing services to you, we may also collect the following information through third-party SDKs:
No. | SDK | Provider | PersonalInformation Collected by the SDK | Purpose of Collection and use | Provider's Official URL | Provider's Privacy Policy Link |
The collection and processing of information by the Providers listed in the table above will abide by their own personal information protection clauses, which do not apply to the Personal Policy. However, the Company will also strive to review the business access qualifications of the Providers and strive to require the Providers to collect and use personal information for legal compliance and security. When the SDK is found to have risks or problems, the Company will require the SDK to correct within a time limit or immediately deactivate the SDK depending on the circumstances, so as to protect the security of your personal information to the greatest extent.
The collection and processing of information by the Providers listed in the table above will abide by their own personal information protection clauses, which do not apply to the Personal Policy. However, the Company will also strive to review the business access qualifications of the Providers and strive to require the Providers to collect and use personal information for legal compliance and security. When the SDK is found to have risks or problems, the Company will require the SDK to correct within a time limit or immediately deactivate the SDK depending on the circumstances, so as to protect the security of your personal information to the greatest extent.
2.8. Purpose Change
You understand that with the development of our business, we may adjust and change the functions of the software and the services provided. In principle, if a new function or service is related to the function or service we currently provide, the personal information it collects and uses shall also be directly or reasonably related to the original processing purpose; if it is not directly or reasonably related to the original processing purpose, we will inform you and obtain your consent before collecting and using the personal information.
2.9. Consent Exempted for collecting and using
You understand that in the following situations, we do not need to obtain your consent for collecting and using your personal information in accordance with laws, regulations and national standards:
(1) where it is necessary for the performance of statutory duties or statutory obligations.
(2) where it is necessary for national security and national defense security.
(3) where it is necessary for public safety, public health, and major public interests.
(4) where it is necessary for criminal investigation, prosecution, trial, and execution of judgments.
(5) where it is necessary for the protection of your or other individuals' life, property and other significant legitimate rights and interests whereas difficult to obtain the consent of the person.
(6) where you disclose to the public on your own.
(7) where the personal information is collected from legally disclosed information, such as legitimate news reports, government information disclosure.
(8) where it is necessary for signing or performing a contract according to your requirements.
(9) where it is necessary for maintaining the safe and stable operation of software and related services, such as discovering and handling malfunctions of software and related services.
(10) where there are other circumstances stipulated by laws and regulations.
Technologies such as cookies and device information identification are commonly used technologies on the Internet. When you use the Software and related services, we may use related technologies to send one or more cookies or anonymous identifiers to your device to collect and identify information about your visit and use of this Software. We promise that we will not use cookies for any purpose other than those stated in this Privacy Policy. We use cookies and similar technologies to implement the following functions or services:
3.1. Ensure the safe and efficient operation of the Software
We may set cookies or anonymous identifiers for authentication and security, so that we can confirm whether you log in to the service safely, or whether you have encountered embezzlement, fraud, or other illegal acts. These technologies will also help us improve the efficient operation of the Software and increase the speed of login and response.
3.2. Help your access more relaxed
This type of technology can help you avoid repeating filling in your personal information and entering search content (including record order query history, form filling).
3.3.Clearing of Cookies
You can clear cookies stored on your mobile device. If you clear it, you may not be able to use the services or corresponding functions provided by us that rely on cookies.
4.1. Share
4.1.1. The Principle of Share
(1) Authorization and consent principle: Without your consent, we will not share your personal information, unless the shared personal information is de-identified information, and the shared third party cannot re-identify the natural person from such information. If the third party uses the information for a purpose beyond the scope of the original authorization and consent, they need to obtain your consent again.
(2) The principle of legality and minimum necessity: the share data must have a legitimate purpose, and the share data must be limited to what is necessary to achieve the purpose.
(3) The principle of security and prudence: We will carefully evaluate the purpose of third party's use of the shared information, conduct a comprehensive assessment of the security assurance capabilities of third party, and require them to follow the cooperation legal agreement.
4.1.2. Shared Information used to implement functions or services
(1) When you use the functions provided by our affiliates or third parties in the Software, or when software service providers, smart device providers, and system service providers cooperate with us to provide services for you, we will share the information necessary to implement functions or services with these entities above. The shared information will be used for comprehensive statistics and algorithmic analysis of characteristics and preferences to form an indirect portrait to recommend, display or push information that you may be interested in, or push specific functions, services or advertising (if any) that are more suitable for you.
(2) When you purchase our chargeable services, we may share your order information, payment account name and payment account numberand other information with payment institutions. This information is necessary for the purchase. Refusal to provide will result in you being unable to use the chargeable services, but it will not affect the normal use of other services.
(3) If you choose to participate in related activities jointly carried out by us and a third party, we may share with them the information generated during the activity and other necessary information that the third party can provide you with the related services timely. In accordance with the requirements of laws, regulations, or national standards, we will clearly inform you of what kind of information needs to be provided to a third party on the event rules page or through other means.
4.1.3. Shared information used to advertisement (such as the activation of advertisement display function)
(1) Advertisement push: We may share indirect portrait tags that do not identify your personal identity and de-identified device information or anonymized information with partners who entrust us to promote and advertise to help them enhance the effective reach rate of advertisements.
(2) Advertising statistics: We may share and analyze de-identified device information or statistical information with our service providers, suppliers and other partners. The shared information is difficult or impossible to associate with your identity. This information will help us analyze and measure the effectiveness of advertising and related services.
4.1.4. Shared information for security, analysis and statistics
(1) Ensure the security of use: We attach great importance to the security of accounts, services, and content. In order to protect the accounts and property security of your and other's. and protect your and our legitimate rights and interests from illegal infringements, the necessary equipment, account and log information may be shared among the Company, its affiliates or service providers.
(2) Analyze condition of service: In order to analyze condition of service and improve user experience, we may share statistical data on condition of service (crash, quit unexpectedly) with our affiliates or third parties. The shared information is difficult to combine with other information to identify your identity.
(3) Academic research and scientific research: In order to improve scientific research capabilities in related fields and promote the level of scientific and technological development, we may share de-identified or anonymized data with scientific research institutes, universities and other institutions under the premise of ensuring data security and legitimate purpose.
4.2. Transfer
We will not transfer your personal information to any other third parties, except in the following cases:
(1) Obtain your explicit consent in advance.
(2) In accordance with laws and regulations or mandatory administrative or judicial requirements.
(3) When involving asset transfer, acquisition, merger, reorganization, or bankruptcy liquidation, if the transfer of personal information is involved, we will inform you of the relevant situation and require the Successor that hold your personal information to continue to be subject to this policy. If the purposes of using personal information change, we will require the Successor to obtain your explicit consent again.
4.3. Disclosure
In principle, we will not disclose your information publicly. If disclosure is necessary indeed, we will inform you of the purpose of disclosure, the type of the disclosing information and the sensitive information that may be involved, and we will obtain your explicit consent.
4.4. Entrusted Processing
To improve the efficiency, reduce the cost, or improve the accuracy of information processing, in the course of providing website maintenance, data analysis, advertising services, auditing and other similar services, we may entrust competent third parties (including our affiliates or other professional entities, hereinafter referred to as "Entrustee") to process information on our behalf (within the scope of your authorized consent, the Entrustee will only obtain your personal information for the purpose of providing services to us or performing certain acts on our behalf). We will require the Entrustee to abide by strict confidentiality obligations and take effective confidentiality measures through written agreements, on-site audits, etc., and prohibit them from using such information for purposes outside your authorization. We promise that the Entrustee will no longer keep personal information as long as the entrustment relationship terminate.
4.5. Consent Exempted for Sharing, Transfer, and Disclosure
You understand that in the following situations, we do not need to obtain your consent for sharing, transferring, or disclosing your personal information in accordance with laws, regulations and national standards:
(1) where it is necessary for the performance of statutory duties or statutory obligations.
(2) where it is necessary for national security and national defense security.
(3) where it is necessary for public safety, public health, and major public interests.
(4) where it is necessary for criminal investigation, prosecution, trial, and execution of judgments.
(5) where it is necessary for the protection of your or other individuals' life, property and other significant legitimate rights and interests whereas difficult to obtain the consent of the person.
(6) where you disclose to the public on your own.
(7) where the personal information is collected from legally disclosed information, such as legitimate news reports, government information disclosure.
(8) where it is necessary for signing or performing a contract according to your requirements.
5.1. How We Store Your Information
5.1.1. Store Location
Your personal information will be stored in mainland China. At present, we will not transfer your personal information to places outside mainland China. If we transfer, we will explain to you the purpose and the relevant information in accordance with laws and regulations, the provisions of relevant regulatory authorities and the Privacy Policy. Before transmission, we will obtain your consent, and through effective measures such as signing agreements and on-site inspections, require the receiving institution to keep the personal information obtained strictly confidential.
5.1.2. Store Period
The retention period of personal information shall be the minimum period necessary for achieving the purpose of processing. we will retain the information as long as you have not withdrawn your information or your account has not been cancelled. We will delete or anonymize your personal information if the storage period expires. Where the storage period is otherwise provided for in laws and regulations.
5.1.3. Termination of Operation
If we stop the operation of the Software and related services, we will notify you in accordance with relevant laws and regulations in advance and delete or anonymize your personal information after termination of operation.
5.2. How We Protect Your Information
5.2.1. Data Management and Control
We have adopted a data classification system according to the sensitivity and type of data and, according to the classification and grading results, carry out user rights management, adopt identity authentication, access control, communication encryption, security audit and other control measures throughout the data life cycle. We also will delete or anonymize the personal information stored over time.
5.2.2. Technical Protection
The technical protection measures we have taken to keep your personal information, include (1) encrypted storage and isolated storage during storage, (2) desensitization processing during information display and download, and (3) dedicated line transmission, encrypted transmission, and data media isolation transmission during transmission.
5.2.3. Security Audit
We will conduct regular audits on data security, and comprehensively check and control the effectiveness of privacy policies and related procedures, as well as data security.
5.2.4. Internal Mechanism
We have established a personal information protection commissioner and an information security committee to conduct personal information security impact assessments on the collection, use, sharing, and entrusted processing of personal information. At the same time, we continue to conduct training on privacy and security for our staff.
5.2.5. Sensitive Information and Password Protection
(1) Attention to the protection of sensitive personal information: The information you upload, or store may involve personal information or even sensitive personal information of you or others. For example, the video you upload may contain your personal portrait. Therefore, you shall be more caution about whether to upload or store the sensitive information to our server.
(2) If your account requires a password, you shall set a complex one to promote your account security. We will do our best to keep information secure. If our physical, technical, or managerial protection facilities are damaged, and result in unauthorized access, public disclosure, alteration, or destruction of information that undermine your Legitimate rights and interests, we will bear the corresponding legal liability.
(3) Your account has security protection function, please keep your account and password information properly. We will ensure that your information will not be lost, misused, or altered through security measures such as backing up to other servers and encrypting your password. Notwithstanding the aforesaid measure, you shall understand that there are no "perfect security measures" in cyberspace.
5.3. Information Security Incident
5.3.1. Even if we have implemented the aforesaid measure and comply the relevant laws and regulations, you understand that there is no 100% security in cyberspace, due to technical limitations and various malicious methods that may exist. However, we will still do our best to ensure the security of the personal information you provide.
5.3.2. You shall know and understand that your systems and communication networks accessing to our Services may incur problems due to factors beyond our control. Therefore, we strongly recommend that you take proactive measures to protect the security of your personal information.Please do not disclose your account, password and related personal information to others. If you register and log in with your mobile phone number, please do not disclose your mobile phone number and verification code to others; please do not tell your verification code received to others no matter what kind of reason others ask you for your mobile phone verification code. If you register and log in with a third-party account (if the channel has been opened), please keep the third-party account and password properly. If you find that your personal information (especially your account and password) leaks, please contact us immediately so that we can take appropriate measures.
5.3.3. We will formulate emergency response plans and activate them immediately when user information security incidents occur, and we will strive to prevent the impact and consequences of such security incidents from expanding. Once a user information security incident (including but not limited to leakage, loss) occurs, we will, in accordance with the requirements of laws and regulations, promptly inform you of the basic situation and potential impact of the security incident, the disposal measures we have taken or will take, the suggestions that you can take precautions independently and reduce the risk, and the remedies for you. We will promptly inform you in the form of push notifications, emails, letters, messages and related forms. When it is difficult to inform the users one by one, we will adopt a reasonable and effective method to issue announcements. Meanwhile, we will also report the handling of user information security incidents in accordance with the requirements of relevant regulatory authorities.
5.3.4. You shall know and understand that once you leave the Software and related services, and browse or use other websites, services and content resources, we will have no ability and direct obligation to protect any personal information you provide outside the Software, regardless of whether your login, browse or use of the above software is based on links or guidance from the Software.
We attach great importance to your management of your personal information, and we make every effort to protect your related rights to inquiries, access, modification, deletion, withdrawal of consent and authorization, account cancellation, complaint reporting and setting up privacy features so that you can safeguard your privacy and information security.
6.1. Change or Withdraw the Scope of Authorization
6.1.1. Change or Withdraw Sensitive Permission Settings
You can turn off the local storage permission in the operating system of the device itself to change the scope of consent or withdraw your authorization. After the authorization is withdrawn, we will no longer collect information related to these permissions.
6.1.2. Respond to Change or Withdraw Authorization
The normally operation of some specific business functions and services shall be based on accessing to your information. When you withdraw your consent or authorization, we will not be able to continue providing you with the corresponding functions and services, and we will no longer process your corresponding personal information.However, your decision to withdraw your consent or authorization will not affect the finished processing within your previous authorization.
6.2. Access, Deletion, and modification
6.2.1. You can directly query and access your personal information in the software. If you need to modify your personal information, please contact customer service, please, please contact us.
6.2.2. You can delete your personal information by following the instructions on the Software page or by contacting us. When you delete information directly or we confirm to respond to your deletion request, we may not immediately delete the corresponding information from our backup system. However, we assure you that the backup system is detached from the business system, and the relevant information in it is also in a state that cannot be retrieved or accessed.
6.3. Account Cancellation
You can find "My" - "Cancel Account" in the software to cancel the account. Prior to the cancellation, we will verify your personal identity, security status, device information, etc.You shall know and understand that the Cancellation is irreversible and that we will delete or anonymize your information after Cancellation, except as otherwise stipulated by laws and regulations.
6.4. Information Management
6.4.1. If you find that the Company has violated the agreement and wrongly collected and used your information, you can give feedback to the customer service stated in the Privacy Policy, and the Company will process the information according to your requirements.
6.4.2. When you access and manage your personal information, the Company will authenticate your identity to ensure account security. You need to provide your identity information according to the Company's guidelines. If the verification of the information you provide is unsuccessful, you may not be able to manage the personal information.
6.4.3. The Company will do its best technical efforts to meet your personal information management. However, the Company may not be able to meet all your requirements due to technical reasons or legal regulatory requirements. In this situation, you can give feedback to the customer service stated in the Privacy Policy. The Company will review and give you a reply as soon as possible.
6.5. Complaint, Report and Response
6.5.1. If you find or have reasonable ground to believe that your personal information rights may be infringed, or you find clues of the relevant infringement, you can contact us to make a complaint or report. We will feedback your complaints and reports as soon as possible the time limit specified by relevant laws and regulations after verification.
6.5.2. In terms of your reasonable request, we do not charge fees in principle, but for repeated requests that exceed reasonable limits, we will charge a certain cost depending on the circumstances. We may reject requests that are unreasonably repeated, that require excessive technical means (such as, must develop new systems or may fundamentally changes current practices) and that brings a risk to legitimate rights and interests of others, or that are highly impractical.
6.6. Access to Personal Information Protection Policy
When you register, we will remind you of the Privacy Policy and it depends on you to decide whether you will give your consent. You may also review the entire content of the Privacy Policy in the relevant location of the website, App, WeChat applet and other platform (if any).
7.1. Prior to using the Software and related services, the minor shall be guarded, instructed by the guardian to jointly read, and agree unanimously (especially obtain the guardian's consent) to the Privacy Policy.
7.2. We protect the personal information of the minor in accordance with relevant national laws and regulations. We will only collect, use, share or disclose the personal information of the minor where it is permitted by law, or we have obtained the explicit consent of the guardians, or where it is necessary to protect the minor; if we find that personal information of the minor has been collected without prior consent of the verifiable guardians, we will attempt to delete the information as soon as possible.
7.3. You, as the guardian of the minor, can contact us through the contact information disclosed in this Privacy Policy, if you have any questions about the personal information of your ward.
8.1. To provide you with better services, the Software and related services will be updated and changed from time to time, and we may amend this Privacy Policy in due course. The amendments form an integral part of the Privacy Policy. Without your explicit consent, we will not impair your rights under the current Privacy Policy in effect.
8.2. we will announce the updated one in the website home page, or related page of official APP (if any) to notify you. The Platform may also take other appropriate means to assistant you kept abreast of the latest version of the Terms.
9.1. The Privacy Policy only applies to the Cargosoon Software provided by Cooperate Logistics Co., Ltd. It does not apply to other products or services provided by the Company or its related parties. When you use other products or services provided by the foregoing entities, you shall abide by the terms of other products or services.