Privacy Policy

Our Privacy Policy

Chcmetal Metal Products Co., Ltd. (hereinafter referred to as “we”) fully recognizes the importance of personal information to you and will make every effort to protect your personal information. We are committed to maintaining your trust in us and follow the following principles to protect your personal information: the principle of consistency between rights and responsibilities, the principle of clear purpose, the principle of choice consent, the principle of minimum necessary use, the principle of ensuring security, the principle of subject participation, and the principle of openness and transparency. At the same time, we promise to take appropriate security protection measures to protect your personal information under the mature security standards of the industry.

We hope to explain to you through this “Privacy Policy” how we collect, use, store, and share this information when using all related services (including but not limited to online information, social networks, etc.), and how we provide you with ways to access, update, control, and protect this information.

If you do not agree with any content of this Privacy Policy, you can choose to stop using the services related to our organization; when you use or continue to use our services, it means you agree to our collection, use, storage, and sharing of information about you.

This part of the Privacy Policy will help you specifically understand the following contents:

– How we collect and use your personal information
– How we use cookies and similar technologies
– How we store and protect your personal information
– How we share, transfer, and publicly disclose personal information
– How we protect your personal information
– How you can exercise your rights to manage personal information
– How we handle the personal information of minors
– How your personal information is transferred globally
– How this Privacy Policy is updated
– How to contact us

How we collect and use your personal information:

According to the “Information Security Technology Personal Information Security Specification” (GB/T 35273-2017), personal information refers to various types of information that can identify a specific natural person’s identity or reflect a specific natural person’s activities, recorded in electronic or other forms. The personal information involved in this Privacy Policy includes basic information (including gender, address, region, personal phone number, email), network identification information (including system account number, IP address, password), personal internet usage records (including login records, browsing records), personal commonly used device information (including hardware model, operating system type, device MAC address, software list, unique device identifiers such as IMEI/android ID/IDFA, etc., information describing the basic situation of personal commonly used devices), personal location information (including precise location information, latitude, longitude, etc.).

Sensitive personal information refers to personal information that, if disclosed, illegally provided, or abused, may endanger personal and property safety, easily lead to damage to personal reputation, physical and mental health, or result in discriminatory treatment. The sensitive personal information involved in this Privacy Policy includes: Internet identification information (including account name, account nickname, user avatar, password-related forwards); and other information (including personal phone number, browsing history, precise location information). For sensitive personal information, we will mark it prominently in this policy, please read carefully.

Due to the length of the text, I’ve provided a translation for the introduction and the beginning of the section on personal information collection and usage. If you need the rest of the text translated, please let me know, and I will continue to provide the translation in segments.

Please note that the translation provided is a direct translation of the content and not a legal or official document. For legal or official use, it is recommended to have the translation reviewed by a professional translator or legal expert.

I will continue with the translation from where we left off:

1.1 Registration, Authentication, and Login 1.1.1 You must register and create an account to use our services, which can be done by using your mobile phone number and completing the relevant online identification information (avatar, nickname, password). If there are any identity authentication function requirements, according to relevant laws and regulations, you may need to provide your real identity information (real name, ID number, phone number) to complete real-name verification. This information is collected to help you complete registration and authentication. This information is sensitive personal information, and you can refuse to provide it, but you may not be able to access the relevant services, which does not affect the normal use of other functions and services. For some accounts involving the dissemination of public information, such as real-name official accounts, we will forcibly collect the ID information of the main person in charge to maintain public communication order.

1.2 Information Browsing 1.2.1 Log information for information display includes: Your behavioral information for operation and use: clicks, follows, favorites, searches, browsing, and sharing. Information you actively provide: feedback, posts, likes, comments. Geographic location information: GPS information. 1.2.2 GPS geolocation is sensitive personal information. If you refuse to provide it, we will not recommend information based on GPS information, nor will it affect the normal use of other functions. 1.2.3 The information we collect and use has been de-identified, and data analysis only corresponds to specific codes, which cannot be directly associated with your identity, nor will it be associated with your real identity.

1.3 Posting and Interaction 1.3.1 Information Posting a. When you post content, comments, questions, or answers, we will collect the information you post and display your nickname, avatar, and posted content. When you post information and choose to display your location, we will request your authorization for geographic location permissions and collect location information related to the service. If you refuse to authorize the provision of precise geographic location information, you will not be able to use this feature, but it will not affect the normal use of other functions. b. When you use the function of uploading pictures, audio, and video, we will request your authorization for camera, album, and microphone permissions. If you refuse to provide authorization, you will not be able to use this function, but it will not affect your normal use of other functions. c. Information collected by users due to the use of our products or services, for example, information posted by other users may contain some of your information (such as comments, messages, pictures, texts, audio, and video related to you).

1.3.2 Interactive Communication a. You actively follow and interact with accounts, articles, and columns that interest you. When you browse, comment, collect, like, or share content, we will collect the accounts you follow and display their content.

1.4 Search When you use the search service of Chcmetal’s refractory insulation materials, we will collect your search keyword information and log records. To provide an efficient search service, some forwarded information will be temporarily stored in your local storage device and may display search results and search history to you.

1.5 Conducting Internal Data Analysis and Research, Third-Party SDK Statistical Services, Improving Our Products or Services: We collect data based on your interactions with us and the choices you make, including your privacy settings, the products and features you use. The data we collect may include SDK/API/JS code version, browser, Internet service provider, IP address, platform, timestamp, application identifier, application version, application distribution channel, unique device identifier, iOS advertising identifier IDFA, Android advertising identifier, network card (MAC) address, international mobile equipment identity (IMEI), device model, terminal manufacturer, terminal device operating system version, session start/end time, language location, time zone, network status (WiFi, etc.), hard disk, CPU, and battery usage, etc.

When we wish to use the information for other purposes not specified in this policy, we will seek your consent in advance. When we wish to use the information collected for a specific purpose for any other purpose, we will seek your consent in advance.

Currently, our main partners, access to third-party SDKs, and their privacy policy links are as follows:

When you share interesting content to Facebook on the Chcmetal refractory insulation materials website, we will provide the service through the Weibo SDK. This product will obtain your basic information, such as your Weibo name, avatar, personal Weibo homepage address, and device identification information. In addition to the information mentioned above, other information will only be used with your explicit authorization.

How We Use Cookies and Similar Technologies: 2.1. Cookies To ensure the normal operation of the website, we store small data files called cookies on our computers or mobile devices. Cookies usually contain identifiers, website names, and some numbers and characters. With cookies, websites can store data, such as your preferences or items in your shopping cart.

We will not use cookies for any other purpose beyond what is described in this policy. You can manage or delete cookies according to your preferences. You can clear all cookies saved on your computer, and most web browsers have a function to block cookies. However, if you do so, you will need to change user settings personally each time you visit our website.

2.2. Web Beacons and Pixel Tags In addition to cookies, we also use other similar technologies on our website, such as Web Beacons and Pixel Tags. For example, the emails we send to you may contain a clickable URL that links to the content within our website. If you click on the link, we will track the click to help us understand your product or service preferences and improve customer service. Web Beacons are usually transparent images embedded in websites or emails. With pixel tags in emails, we can know whether the email has been opened. If you do not wish to be tracked in this way, you can unsubscribe from our mailing list at any time.

2.3. Do Not Track Many web browsers have a Do Not Track feature that sends a do not track request to websites. Currently, there is no major Internet standard organization that has formulated a policy on how websites should respond to these requests. However, if your browser has Do Not Track enabled, all of our websites will respect your choice.

How We Store and Protect Your Personal Information: 3.1. Area of Information Storage 3.1.1 The personal information of users collected in China according to laws and regulations will be stored in China. 3.1.2 We currently do not transfer or store your personal information across borders. If it is necessary to transfer or store data across borders in the future, we will inform you of the purpose of the information going abroad, the recipient, security measures, and security risks, and obtain your consent.

3.2. Method and Period of Information Storage 3.2.1 We will securely store your information, including local storage (such as data caching using APP), databases on servers, and server logs. 3.2.2 Generally, we will only store your personal information for the period required to achieve the purpose of the service or as stipulated by laws and regulations. 3.2.3 In normal circumstances, for the disposal of expired information, we use the server’s automatic overwrite method.

3.3. We use industry-wide security technology and anonymization to prevent the loss of information, improper use, unauthorized viewing, or disclosure. For example, in some services, we will use encryption technology (such as SSL) to protect the personal information you provide.

3.4. Although reasonable and effective measures have been taken and are in accordance with the requirements of relevant laws and regulations, please understand that due to technical limitations and various malicious means that may exist in the Internet industry, even if we make every effort to strengthen security measures, it is not always possible to guarantee 100% information security. You need to understand that the system and communication network you use to access our services may have problems due to factors beyond our control.

How We Share, Transfer, and Publicly Disclose Personal Information: 4.1. Sharing We will not share your personal information with any other company, organization, or individual unless in the following cases:

(4.1.1) Sharing with explicit consent: After obtaining your explicit consent, we will share your personal information with others. (4.1.2) According to the mandatory requirements of laws and regulations or government agencies, we may share your personal information externally. (4.1.3) Sharing with our affiliated companies: Your personal information may be shared with our affiliated companies. We will only share the necessary personal information and will be limited to the purposes stated in this Privacy Policy. If the affiliated company wants to change the purpose of processing personal information, it will request your authorization again. (4.1.4) Sharing with authorized partners: Some of our services will be provided by authorized partners, only for the purposes stated in this Privacy Policy. We may share some of your personal information with partners to provide better customer service and user experience. For example, the third-party statistical and analysis service company we hire may need to collect and access personal data for statistics and analysis. In this case, these companies must comply with our data privacy and security requirements. We will only share your personal information for legal, legitimate, necessary, specific, and explicit purposes, and only share the personal information necessary to provide services.

For companies, organizations, and individuals with whom we share personal information, we will sign strict confidentiality agreements with them, requiring them to handle personal information according to our instructions, this Privacy Policy, and any other relevant confidentiality and security measures.

4.2. Third-Party Services and Applications To achieve the purposes stated in this policy and to provide you with better services, we may access SDKs or other similar applications provided by third-party service providers and share some of the information we collect with these third-party service providers according to this policy to provide better customer service and user experience. Currently, we have integrated third-party service providers to achieve the following functions or services:

4.2.1 Product Usage Analysis: To analyze our service usage and improve user experience, we have integrated the Umeng+ SDK, which requires collecting your device’s Mac address and unique device identifier (IMEI/android ID/IDFA/OPENUDID/GUID, SIM card IMSI information) to provide statistical analysis services, and through geographic location calibration, report the accuracy of data and provide basic anti-cheating services. At the same time, it is integrated with the third-party service provider JPush for message push services. The JPush SDK requires collecting your device information: device identifiers (IMEI, IDFA, Android ID, MAC, OAID, and other related information), application information (application crash information, notification switch status, software list, and other related information), device parameters and system information (device type, device model, operating system and hardware-related information), network information: IP address, WiFi information, base station information, and other related information. According to relevant laws and regulations, when the JPush SDK needs to collect the terminal user’s “network information” and/or “location information” to achieve the following business functions, the premise is that the terminal user needs to authorize the “read and write SD card permission,” “network access permission,” “device information permission,” and/or “location permission.” If your terminal user does not wish the above information to be collected, you can achieve this by turning off the “read and write SD card permission,” “network access permission,” “device information permission,” and/or “location permission”; we will cooperate with the third-party service provider Amap to share the user’s GPS location information and provide real-time location services for specific H5 activities that require GPS positioning. You will also receive a prompt to obtain location permissions on the event page. You can choose not to authorize, but such activities will not achieve the effect of precise positioning and will not affect the normal use of other functions without authorization. Single device information is information that cannot identify a specific natural person. If we combine such non-personal information with other information to identify a specific natural person or use it in combination with personal information, such non-personal information will be treated as personal information during the period of combination use, unless authorized by you or otherwise stipulated by laws and regulations, we will anonymize and de-identify such information.

4.2.2 Content Sharing: When you click the “Share” button to share content from our website with third-party social media, we will complete the sharing function through third-party service providers Sina Weibo, Tencent QQ, and WeChat. This feature may collect your information (shared content, etc.) to operate normally.

4.2.3 Implementation of Information Sharing Related to Advertising:

a) Advertising Push: We may share information with partners who entrust us with promotion and advertising, but we will not share information used to identify your personal identity (name, ID number), but only provide these partners with unrecognizable indirect user portrait tags and de-identified or anonymized information to help them improve the effective reach rate of advertisements without identifying your personal identity.

b) Advertising Statistics: We may share de-identified statistical information with our business service providers, suppliers, and other partners, which is difficult to associate with your recognizable information, which will help us analyze and measure the effectiveness of advertisements and related services.

We will only share your information for legal, necessary, and specific purposes. Only de-identified or anonymized information is shared with third parties. For third-party service providers with whom we share information, we will require them to fulfill their confidentiality obligations, take corresponding security measures, and provide corresponding security level certifications.

These third-party services are operated by the relevant third parties. Your use of these third-party services (including any information you provide to them) is subject to the third party’s own service terms and information protection statements (not this policy), and you need to read their terms carefully. This policy only applies to the personal information we collect and does not apply to any third-party services or third-party information usage rules. If you find that these third-party services pose risks, it is recommended that you terminate the related operations to protect your legitimate rights and interests.

4.3 Transfer We will not transfer your personal information to any company, organization, or individual unless in the following cases:

4.3.1 Transfer with explicit consent: After obtaining your explicit consent, we will transfer your personal information to another party.

4.3.2 In the event of a merger, acquisition, or bankruptcy liquidation involving the transfer of personal information, we will require the new company and organization holding your personal information to comply with this Privacy Policy. Or, if the existing company or organization continues to operate, we will require it to continue to be bound by this Privacy Policy and to request your authorization again.

4.4 Public Disclosure We will only publicly disclose your personal information in the following cases:

4.4.1 After obtaining your explicit consent.

4.4.2 According to the law: We may publicly disclose your personal information according to the law, legal procedures, litigation, or mandatory requirements of government agencies.

4.5 Legal Exemptions for Sharing, Transferring, and Publicly Disclosing Personal Information: Please understand that in the following cases, according to laws, regulations, and national standards, we do not need your authorization and consent to share, transfer, and publicly disclose your personal information:

(4.5.1) Directly related to national security and defense security.

(4.5.2) Directly related to public safety, public health, and significant public interest.

(4.5.3) Directly related to criminal investigation, prosecution, trial, and execution of judgments.

(4.5.4) To protect your life, property, and other significant legitimate rights and interests, but it is difficult to obtain your consent.

(4.5.5) Personal information you have publicly disclosed yourself.

(4.5.6) Collecting personal information from legally public information, such as legal news reports, government information disclosure, and other channels.

How We Protect Your Personal Information: 5.1 We have adopted industry-standard security measures to protect the personal information you provide to us to prevent unauthorized access, public disclosure, use, modification, damage, or loss of data. We will take all reasonable and feasible measures to protect your personal information. For example, when data (such as credit card information) is exchanged between your browser and the “service,” it is protected by SSL encryption; our website also provides secure browsing with HTTPS; we will also use encryption technology to ensure the confidentiality of data; we will use trusted protection mechanisms to prevent malicious attacks on data; we will deploy access control mechanisms to ensure that only authorized personnel can access personal information; we will also conduct security and privacy protection training courses to enhance employees’ awareness of the importance of protecting personal information.

5.2. We will take all reasonable and feasible measures to ensure that we do not collect irrelevant personal information. We will only retain your personal information for the time required to achieve the purposes described in this policy, unless the law requires or allows an extension of the retention period.

5.3. The Internet is not an absolutely secure environment, and emails, instant messaging, and other user communications are not encrypted. We strongly advise you not to send personal information through these methods. Please use a complex password to help us protect the security of your account.

5.4. The Internet environment is not 100% secure, and we will do our best to ensure or guarantee the security of any information you send to us. If our physical, technical, or management protection facilities are compromised, resulting in unauthorized access, public disclosure, tampering, or destruction of information, causing damage to your legitimate rights and interests, we will bear the corresponding legal responsibilities.

5.5. In the event of an unfortunate personal information security incident, we will notify you in a timely manner in accordance with the requirements of laws and regulations; the basic situation of the security incident and its potential impact, the measures we have taken or will take, and suggestions for you to prevent and reduce risks on your own. We will notify you of the relevant information about the incident through email, letters, phone calls, push notifications, and other means in a timely manner. When it is difficult to notify each individual subject of personal information, we will take reasonable and effective measures to issue a public announcement. At the same time, we will also take the initiative to report the handling of personal information security incidents to regulatory authorities as required.

How to Exercise Your Rights to Manage Personal Information: According to Chinese laws, regulations, and standards, you have certain rights in personal information processing activities, including:

• You have the right to understand and decide the processing of personal information, and you have the right to restrict or refuse others from processing your personal information, unless otherwise provided by law.

• You have the right to access and copy personal information at the personal information processor, unless otherwise provided by law.

• You have the right to request

that your personal information be transferred to the personal information processor you designate.

• If you find that your personal information is inaccurate or incomplete, you have the right to request the personal information processor to correct or supplement it.

• You have the right to request the deletion of your personal information.

• You have the right to require the personal information processor to explain its personal information processing rules.

a. Clear offline data and cache Click on the menu in the upper left corner, select settings, and clear cache.

b. Account cancellation The client currently only provides browsing functions and does not provide registration and login functions. When the client is no longer in use, it can be directly uninstalled.

How We Handle the Personal Information of Minors: We attach great importance to the protection of minors’ information. If you are a minor, we recommend that you use our services with the consent of your parents or guardians and provide us with information with their consent. For the personal information of minors collected with the consent of parents or guardians when using our products or services, we will only use, share, and transfer the personal information of minors that is allowed by laws and regulations, explicitly agreed to by parents or guardians, or necessary to protect minors. We will protect the personal information of minors in accordance with the provisions of relevant national laws and regulations and this “Privacy Policy.”

How Your Personal Information is Globally Transferred: In principle, the personal information we collect and generate within China will be stored within China.

Due to our provision of products or services through resources and servers around the world, this means that after obtaining your authorization and consent, your personal information may be transferred outside the jurisdiction where you use the product or service, or may be accessed by them.

These jurisdictions may have different data protection laws, or may not have relevant laws at all. In this case, we will ensure that your personal information is fully and equally protected within China. For example, we may request your consent for cross-border transfer of personal information or implement security measures such as data de-identification before cross-border data transmission.

How to Update This Privacy Policy Our privacy policy may change from time to time. We will not limit your rights under this privacy policy without your explicit consent. We will notify you of changes to the client’s information. For significant changes, we will also provide more conspicuous notifications (including public announcement notifications, and even pop-up prompts for you). The significant changes mentioned in this policy include but are not limited to:

9.1. There have been significant changes in our service model, such as the purpose of processing user information, the way user information is used, etc.

9.2. We have undergone significant changes in control, organizational structure, etc., such as changes in ownership due to business adjustments.

9.3. There have been significant changes in the main entities with whom user information is shared, transferred, or publicly disclosed.

9.4. There have been changes in the department responsible for the security of user information, contact information, and complaint channels.

9.5. When the user information security impact assessment report indicates high risk.

How to Contact Us: If you have any questions, opinions, or suggestions about the content of this Privacy Policy, you can contact us by email or phone [s18552018316@163.com Mr. Xiao: 18626068481 Ms. Shi: 18552018316].

Contact Info

We're Ready, Let's Talk

Shopping Cart
Scroll to Top