TOP
Suzhou Junzhong Gene Technology Co.(hereinafter referred to as “we”) is aware of the importance of personal information to users. We will take appropriate security measures in accordance with the requirements of laws and regulations, and endeavor to protect the security and control of your personal information. In view of this, we have developed this Privacy Policy to explain to you how we collect, use, store, share and transfer such information when you use our products and services, as well as the ways we provide you with to access, update, delete and protect such information, so that you can understand the specific categories of personal information we collect for a particular function, the reasons for its use and the way it is collected.
Before you use the products or services provided by us, please make sure that you read and thoroughly understand this Policy, especially the terms and conditions identified in bold/underlined, which you should focus on, and confirm that you fully understand and agree to before you start using them. If you have any questions, suggestions or comments regarding this Policy, you may contact us via the contact information provided.
Product and Service Providers: Suzhou Jun Among Genetics Technology Co., Ltd. and the main body of the provision of related services, subject to the actual provision of the platform and the specific services of the operating entity.
This policy applies to all related products or services we provide to you. This Policy also applies to products or services provided by our affiliates that use our products or services but do not have a separate privacy policy. Users are deemed to have accepted this Policy if they access our Service Platform and use any of the Services on the Service Platform. Please also note that this Policy does not apply to third-party services (including any third-party websites) accessed through our Services, and if you use the aforementioned third-party services, the privacy policy of that third party will apply. We recommend that you fully understand the terms of service and privacy policies of third parties before accepting or using their products or services. If you find that any third party product or service provider has violated the law, we recommend that you terminate the relevant operation. At the same time, you can give us feedback and we will deal with it after verification.
From time to time, we may revise or update certain instructions, policies and terms of this Policy. Such instructions, policies and terms form part of this Policy. If we consider any change to this Policy to be a material change, we will notify you (by means of an announcement on our website, or by direct communication with you or otherwise) before the change becomes effective. By continuing to use our Services after we have modified this Policy and given notice, you agree to be bound by this Policy as modified.
This policy will help you understand the following.
i. how we collect and use your personal information
How we use cookies and similar technologies
How we share, transfer, and publicly disclose your personal information
How we store and protect your personal information
V. How you manage your personal information
Liability statement to third parties
How we handle children's personal information
How to update this policy
IX. How to contact us
I. How we collect and use your personal information
When you use our products or services, we need or may need to collect and use your personal information. Depending on the functional distinction of the product or service you use, we will collect and use your personal information according to the following principles.
1. In order to achieve the basic functions of the products or services provided to you, you must authorize us to collect the information necessary to achieve such functions. If you refuse to provide the corresponding information, you will not be able to use our products or services normally.
(i) Personal Information You Provide Directly or Are Automatically Collected
We collect and use your personal information to fulfill the following functions of this policy:
1. To help you log in to our online ordering system
You can log in to our online ordering system (“Platform” or “System”) by logging in from your cell phone. When you log in to the System, you will need to provide us with your cell phone number and verification code.
In certain cases, in order to protect your legitimate rights and interests, you are required to provide us with information including, but not limited to, your real name and valid identification documents (including, but not limited to, the number and a copy of your ID card) as prompted by us, so as to facilitate the authentication of your real name by us. If you do not provide such information, it may affect your normal use of some of the system's core business functions.
2. To help you use the system
In the course of your use of our services and systems, we may automatically collect and store the following information about you as web log information, including.
Basic information such as name, cell phone, email address, and address.
Device information. We will receive and record information about the device you are using during the course of your use, including but not limited to device model, operating system version number, network status, device settings, device identifier, list of mobile applications for the device environment.
Service Log Information. When you use our Services, we will automatically collect details of your use of our Services to be kept as service logs, which may include track information such as browsing, clicking to view, search query, etc., as well as IP address, browser type telecommunication carrier, language used, date and time of access.
Please note that in order to provide you with better quality services that meet your individual needs, we may determine your preferences based on your device information and the service log information we collect when you use the Services, and use the resulting preference labels for display, push messages and possible commercial advertising.
If you do not wish to continue to receive commercial advertisements from us, you may unsubscribe or close them by using the opt-out method provided by us when we send you commercial advertisements, or any other method we notify you of.
3. Device Permission Calls
In order to provide you with convenient and high-quality services, we may call some of the permissions of your device, the following is a list of the device permissions that we may call and the corresponding use of the purpose of the description, you have the right to choose to turn off the authorization of the following permissions at any time, but may affect the normal use of some or all of the functions of our system, services or goods.
(1) Personalized recommendation service based on location information: We will access to obtain your location information after you turn on the location privilege, and provide you with page displays, products or services that better meet your needs based on your location information.
(2) Additional services based on camera/camera: You can use the function to scan code for login, take photos or videos for identification and sharing, motion recognition in sports scenes, and face recognition authorized by you in specific scenes after you turn on the camera/camera privilege. When you use this additional function for face recognition, we will collect your facial features and use them strictly within the scope of your authorization and consent, and we will confirm with you again if we intend to use your facial information to provide you with other products and/or service functions in the future.
(3) Additional service for photo/video access and uploading based on photo albums (photo gallery/video gallery): You can use this feature to upload your photos/images/videos after turning on the album privileges to take photos and upload them and other functions. We may use your uploaded photos/images to record or recognize what you need to record.
(4) Additional services related to microphone-based voice technology: You can use the microphone to realize voice interaction with the robot after enabling the microphone privilege, and in these functions we will collect the content of your recordings to recognize your needs. Please know that even if you have agreed to enable the microphone privilege, we will only obtain voice information through the microphone when you actively click on the microphone icon in the client or record a video.
3. Contacting us
When you contact us, make a request for ordering or after-sales service, or make a request for dispute resolution, in order to protect the security of your account, we may need you to provide your necessary personal information to verify your identity.
In order to provide you with better service and contact you, record the progress and results of your problems, we may save your contact information and communication records and content, related order information and other related information you provide.
4. Ensuring security and system stability
In order to improve the security and stability of the system when you use our products and/or services, and to protect the security of your account, we will collect your device information, service log information and other information related to the security and stability of the system, embedded in the SDKs developed by us or provided by our suppliers to collect the above information, and may use and integrate information that you have provided us with in other scenarios and information collected by our affiliates that have obtained your authorization or can be shared in accordance with the law. We may also use and integrate the information you provide to us in other scenarios and the information collected by our affiliates with your authorization, or information that can be shared in accordance with the law, in order for us to comprehensively determine the risk of your account, and to investigate in a timely manner when an abnormality is found.
In order to provide you with a better experience of our products and services, we are continually striving to improve our technology, and as a result, we may from time to time introduce new or optimized features that may require the collection or use of new personal information or change the purpose or manner of use of personal information. In this regard, we will separately explain to you the purpose, scope and use of the corresponding information by updating this policy, pop-up windows, page reminders, etc., and provide you with the means to independently choose to agree to the collection and use of personal information after obtaining your express consent. In this process, if you have any questions, comments or suggestions, you can contact us through the contact information provided in “How to Contact Us”, and we will answer your questions as soon as possible.
(ii) Exceptions to Authorized Consent
According to the laws and regulations and relevant national standards, we may collect and use your personal information without your authorized consent in the following cases.
1. Related to national security, national defense security; and
2. Related to public security, public health, and major public interests; and
3. In connection with the investigation, prosecution, trial and judgment execution of crimes.
4. For the purpose of safeguarding the life, property, and other important legal rights and interests of the subject of personal information or other individuals, but it is difficult to obtain the consent of the individual.
5. The personal information collected is disclosed to the public by the subject of the personal information himself/herself.
6. Your personal information is collected from legitimate public disclosure of information, such as legitimate news reports, government information disclosure and other channels.
7. Necessary for the signing and fulfillment of the contract according to your request; and
8. Necessary to maintain the safe and stable operation of the products and/or services provided by the service or third-party providers commissioned by us, such as the discovery and disposal of product or service failures; and
9. for news organizations and necessary for them to carry out legitimate news reporting; and
10. For academic research institutions to carry out statistical or academic research in the public interest, and when providing the results of academic research or description to the public, the personal information contained in the results will be de-identified; and
11. Other cases stipulated by laws and regulations.
(iii) Rules for the use of personal information
The personal information we collect based on this policy will be used strictly in accordance with the purposes stated in this policy. If we use your personal information beyond the scope of the purpose for which it was collected and which is directly or reasonably related to the purpose for which it was collected, we will inform you again of the purpose for which we are using your personal information and obtain your consent before we use your personal information. We use your personal information for the following purposes:
1. To use your personal information for the specific purposes in the scenarios described in “Personal Information You Provide Directly or Are Automatically Collected”.
2. To provide you with security. In order to protect the security of our products or services we may use your information for identity verification, security prevention, fraud detection, etc., to prevent, detect, and investigate fraud, endangering the security, illegal, or violating the policies or rules of the agreement with us, in order to protect the legitimate rights and interests of you and other users of our services, our or service affiliates, partners, and the public.
3. To communicate with you. We will use the contact information you provide, including your cell phone number, email, social accounts and contact address and other information that can be used to contact you, to communicate or interact directly with you. We may notify you in advance if there will be changes to our products or services.
4. Display and push customized content for you. Based on the personal information collected, we may display and push to you search results, information, advertisements, etc. that are more relevant to you. In order to improve the quality of our products or services for your better experience, we may use the information we collect in one product or service to display and push customized content to you in another product or service, subject to the requirements of laws and regulations.
5. To improve our products or services, conduct internal audits, data analysis and research. We will use the information we collect to improve our products or services, such as evaluating, maintaining and improving the performance of our products and services, developing new products and services, and providing customer support. In addition, we may use the information for internal audits, data analysis and research, and we will not disclose any of your identifying information when used for such purposes.
6. Please be aware that, in accordance with applicable law, if we take technical and other necessary measures to process personal information in such a way that the recipient of the data is unable to re-identify a specific individual and cannot be recovered, or if we may de-identify the information we collect for the purposes of research, statistical analysis and forecasting, for the purpose of improving the content and layout of our products and services, for the purpose of providing product or service support for business decision-making, and for the purpose of improving our products and services (including the use of anonymized data for machine learning or modeling algorithm training), such processed data may be used without further notice to you and without your consent.
7. If we cease to operate our products or services, we will promptly cease activities that continue to collect your personal information, notify you of the cessation of operations by individual delivery or announcement, and delete or anonymize personal information held by us in connection with the ceased operations.
II. How we use cookies and similar technologies
(i) Use of Cookies
In order to ensure the proper functioning of our websites, to make your visit easier, and to recommend content that may be of interest to you, we may store cookies, FlashCookies, or other local storage provided by your browser (or associated application) that typically contain identifiers, site names, and some numbers and characters (collectively, “Cookies”) on your computer or mobile device. “cookies"). With the help of cookies, websites are able to store data such as your preferences or the items in your shopping cart.
If your browser or browser add-on service allows it, you may modify your acceptance of cookies or reject our cookies; for more information, see AboutCookies.org; however, if you do so, in some cases it may interfere with your ability to visit our site securely and may require you to change your user settings each time you visit our site.
(ii) Use of cookie-like technologies
In addition to cookies, we use web beacons, pixel tags, ETags, and other similar technologies on our websites.
For example, the emails we send you may contain a link to an address that links to content on our website, and if you click on the link, we track the click to help us understand your product or service preferences so that we can proactively improve the customer service experience. A web beacon is typically a transparent image embedded on a website or in an email. With the help of pixel tags in emails, we are able to know if an email has been opened. If you do not want your activity tracked in this way, you can unsubscribe from our mailing list at any time.
ETag (Entity Tag) is an HTTP protocol header that is transmitted behind the scenes between an Internet browser and an Internet server in lieu of a cookie.ETag can help us avoid unnecessary server loads, improve service efficiency, and conserve resources, energy, and at the same time, we may use ETag to record your identity so that we can gain a deeper understanding of, and improve, our products or services. Most browsers provide users with the function of clearing browser cache data, and you can perform the corresponding data clearing operation in the browser setting function. Please note, however, that if you deactivate ETag, you may not be able to enjoy a better experience with our products or services, and you will be held responsible for any loss of personal data.
III. How we share, transfer and publicly disclose your personal information
(I) Sharing
In principle, we will not share your personal information with any other companies, organizations and individuals, except in the following cases.
1. Sharing with your explicit consent: After obtaining your explicit consent, we will share your personal information with other parties.
2. We may share your personal information in accordance with laws and regulations or mandatory requirements of governmental authorities.
3. Sharing with our affiliates:Your personal information may be shared with our affiliates. We will only share personal information that is necessary and subject to the purposes stated in this Privacy Policy. Affiliated companies will seek your authorization to change the purposes for which personal information is processed.
4. Sharing with Authorized Partners: Some of our services will be provided by authorized partners only for the purposes stated in this policy. We may share some of your personal information with our partners to provide better customer service and user experience. We will only share your personal information for purposes that are lawful, legitimate, necessary, specific, and clearly identified, and will only share personal information that is necessary to provide the service. Our partners are not authorized to use the shared personal information for any other purpose.
5. Personal information that you disclose to us or that we can obtain from other legal disclosure channels.
6. To the extent required or permitted by law, it is necessary to provide your personal information to a third party (including consumer protection departments and other industry organizations) in order to protect the interests, property or safety of you or the public from damage.
7. It is necessary to share your personal information in order to protect national security, public safety and the significant legitimate rights and interests of you and other individuals.
Currently, our authorized partners include the following two major types.
1) Authorized partners in the category of advertising analysis services. Unless we have your permission, we will not share your personally identifiable information with partners who provide advertising and analytics services. We may provide these partners with information about the reach and effectiveness of their advertisements without providing your personally identifiable information, or we may de-identify this information so that it does not identify you personally. Such partners may combine the above information we provide with other data they have lawfully collected in order to fulfill services such as advertising or analytics that we have commissioned.
2) Vendors, Service Providers and Other Partners. We may send information to vendors, service providers and other partners who support our business on a global basis by providing technical infrastructure services, analyzing how our services are used, measuring the effectiveness of advertisements and services, providing customer service, payment facilitation, or conducting academic research and surveys.
For corporate organizations and individuals with whom we share personal information, we will require them to handle personal information in accordance with our instructions, this Privacy Policy, and any other relevant confidentiality and security measures.
(ii) Transfer
We will not transfer your personal information to any company, organization or individual, except for the following cases.
1. Transfer with explicit consent: we will transfer your personal information to other parties after obtaining your explicit consent; and
2. In the event of a merger, acquisition, or bankruptcy and liquidation of the provider of this product or service, or any other situation involving a merger, acquisition, or bankruptcy and liquidation, if the transfer of personal information is involved, we will require the new company or organization holding your personal information to continue to be bound by this privacy policy, or else we will require that company or organization to seek authorization and consent from you again.
(iii) Public disclosure
We will publicly disclose your personal information only under the following circumstances.
1. after obtaining your explicit consent; and
2. If we determine that you have violated the laws and regulations or serious violations of the rules of the relevant agreements of the product, or to protect the product and its affiliates users or the public's personal and property safety from being infringed upon, we may disclose your personal information about you in accordance with the laws and regulations or the rules of the relevant agreements of the product, including the relevant violations as well as the product has been taken on your measures;
3. Disclosure based on law: In the case of laws and regulations, litigation or mandatory requirements of government authorities, we may publicly disclose your personal information.
(D) Exceptions to sharing, transferring, or publicly disclosing personal information with prior authorized consent
In the following cases, sharing, transferring, or publicly disclosing your personal information does not require your prior authorized consent.
1. Related to national security, national defense security; and
2. Related to public security, public health, and major public interests; and
3. In connection with judicial or administrative law enforcement such as crime investigation and prosecution, trial and judgment execution.
4. For the purpose of safeguarding your or other individuals' life and property and other significant legitimate rights and interests, but it is difficult to obtain my consent.
5. Personal information that you disclose to the public on your own.
6. Personal information collected from legitimate public disclosure of information, such as legitimate news reports, government information disclosure and other channels.
7. Other cases stipulated by laws and regulations.
Please be informed that, according to the current laws and regulations, if we take technical measures and other necessary measures to process personal information so that the recipient cannot re-identify a specific individual and cannot recover it, the sharing, transfer and public disclosure of such processed data will not require separate notification to you and your consent.
IV. How we keep and protect your personal information
(I) Retention of Personal Information
Personal information we collect in the People's Republic of China will in principle be stored in the People's Republic of China.
Such jurisdictions may have different data protection laws, or even no laws at all. In such cases, we will ensure that your personal information receives sufficiently equivalent protection in the People's Republic of China. For example, we may request your consent for cross-border transfers of personal information or implement security measures such as data de-identification prior to cross-border data transfers.
We will retain your personal information for as long as necessary to fulfill the purposes described in this policy, and where specifically required by law or regulation, we will retain your personal information in accordance with the mandatory requirements of the regulation. In determining the retention period, we will base our judgment on the following criteria.
1. To provide you with inquiries, complaints and after-sales service of products or services.
2. To ensure the safety and quality of the products or services we provide to you.
3 Whether you have given special authorization for the retention period.
When your personal information exceeds the retention period, we will delete your personal information or anonymize it in accordance with the requirements of applicable laws and regulations at that time.
(ii) Protection of Personal Information
1. We will protect your personal information in accordance with reasonably practicable security measures that comply with industry standards to prevent unauthorized access to, public disclosure of, or unlawful use of, alteration of, damage to, deletion of, or destruction of your personal information. We will take all reasonably practicable measures to protect your personal information.
2. We have taken the necessary management measures to protect your personal information, including security audits of suppliers to pay for internal staff training, personal information access and use rights management.
3. We have an industry-advanced data security management system that focuses on data and revolves around the data lifecycle, and we enhance the security of the entire system in multiple dimensions from organizational construction, system design, personnel management, product technology and other aspects.
4. The Internet is not an absolutely secure environment, and e-mail, instant messaging, and other applications with the attached communication methods are not encrypted, we strongly recommend that you do not send personal information through such methods. Please use complex passwords to help us keep your account secure.
5. We will take reasonably practicable steps to avoid collecting irrelevant personal information. We will only retain your personal information for as long as is necessary to fulfill the purposes set out in this policy, unless there is a mandatory retention requirement by law. The criteria we use to determine the duration include:
(1) To ensure the security and quality of the services we provide to you;
2) Whether you agree to a longer retention period;
3) Whether there is any other special agreement on the retention period.
6. We will from time to time update and publicize the security risk, personal information security impact assessment report and other related contents, which you can obtain through our announcement.
7. After the unfortunate occurrence of a personal information security incident, we will, in accordance with the requirements of laws and regulations, promptly inform you of: the basic situation of the security incident and its possible impacts, the disposal measures we have taken or will take, the suggestions you can make independently to prevent and minimize the risks, and the remedial measures to be taken against you. We will promptly inform you of the incident by email, letter, phone call, push notification, etc. If it is difficult to inform you one by one, we will take a reasonable and effective way to make a public announcement.
At the same time, we will also take the initiative to report the handling of personal information security incidents in accordance with the requirements of the regulatory authorities.
V. How you manage your personal information
In accordance with applicable laws and regulations, you have the right to access, correct and delete your personal information, manage your authorization and cancel your personal account.
You have the right to obtain a copy of your personal information by contacting us in the manner set forth in Article 9 of this Policy, and we will respond to your request for a copy of your personal information within 30 days by
【email】 We will provide you with a copy of your personal information in the manner described above. If you need to provide a copy of your personal information by other means, you will be responsible for the costs incurred.
(i) Access/Correction of your personal information
You can view and edit your profile in [Personal Center]. 。If you wish to access or correct other personal information that cannot be directly accessed or corrected, you may do so by contacting us using the contact information provided in this Policy.
(ii) Deletion of your personal information
In the following cases, you can make a request to us to delete your personal information.
1. If our handling of personal information violates laws and regulations.
2. If we collect or use your personal information without your consent.
3. If our handling of personal information violates our agreement with you.
4. If you no longer use our systems, products or services, or if you cancel your account.
5. if we no longer provide products or services to you.
If we decide to respond to your deletion request, we will also notify the entities from whom we obtained your personal information and ask them to delete it in a timely manner, unless otherwise required by law or regulation, or if those entities have received independent authorization from you.
When you delete information from our Services, we may not delete the corresponding information from our backup systems immediately, but will delete the information when the backup is updated.
(iii) Changing the scope of your authorized consent
Each business function requires some basic personal information to be completed. For the collection and use of additional personal information, you may give or withdraw your authorized consent at any time, except as otherwise provided by law or regulation.
When you withdraw your consent, we will no longer process the corresponding personal information. However, your decision to withdraw your consent will not affect the processing of personal information previously carried out on the basis of your authorization.
(D) Cancellation of Accounts
If you wish to cancel your account, you need to meet the relevant conditions for cancellation. If you meet the conditions for cancellation, you can cancel your account via the
After cancellation of your account, we will stop providing products or services to you and delete or anonymize your personal information in accordance with the cancellation agreement, unless otherwise provided by law or regulation.
(E) Responding to your request above
In order to protect the safety of your personal information, when you exercise your rights, we may need to verify your identity by various means before responding to your request.
In principle, we will respond to your request within 15 business days after receiving your request and confirming your identity.
In principle, we do not charge you for reasonable requests. However, for requests that are repeated, exceed reasonable limits or incur unreasonable costs, we will charge a fee according to the actual situation. We may refuse requests that cannot be fulfilled, that are too costly to fulfill, or that may pose a risk to others by repeating the request without justification.
After you or we have assisted you in deleting the relevant information, we may not be able to immediately remove the corresponding information from our systems because of applicable laws and security techniques, and we will securely store your personal information and isolate it from any further processing until it can be erased or anonymized.
We will not be able to respond to your request in the following cases as required by laws and regulations.
1. related to national security, national defense security; and
2. Related to public safety, public health, and significant public interests; and
3. Related to crime investigation and prosecution, trial and execution of judgment, etc.; and
4. Where there is sufficient evidence that the subject of the personal information has subjective malice or has abused his/her rights.
5. Responding to your request will lead to serious damage to your legitimate rights and interests or those of other individuals or organizations.
6. Where commercial secrets are involved.
VI. Statement of Liability to Third Parties
When you access third-party services or programs accessed by the system (e.g., following a public account registered by a third party, accepting services and products provided by a third party through a public account, or logging in and using other Internet services through the Platform's authorization), the third party will collect, use, and store your relevant data or information in accordance with their own privacy policies or other agreements. These third party programs may place their own cookies or web beacons, which are not under our control, and their use is not governed by this Privacy Policy. We endeavor to require these entities to take measures to protect your personal information and recommend that you fully understand the terms of service and privacy policies of third parties before accepting or using their products or services. If you find that any third party product or service provider has violated the law, we recommend that you terminate the relevant operation. At the same time, you can give us feedback and we will deal with it after verification. If you do not use the above third-party products or services, you do not need to provide the above information.
How we handle children's personal information
1. When you accept our products or services, we presume that you have the corresponding civil behavioral capacity. Based on the content of the system and the nature of the services, we do not provide services to minors under the age of 18. If you are a minor under the age of 18, please inform your guardian immediately and be accompanied by the guardian to terminate the use of the system immediately, and please do not provide us with any personal information.
2. If we recognize that you are a minor under the age of 18, we will immediately terminate the provision of services to you, notify your parents or other guardians and require your guardian to accompany you to immediately terminate the use of the software, and will attempt to delete the relevant data as soon as possible.
VIII. How to update this policy
Our privacy policy may change, in addition to laws and regulations or regulatory provisions otherwise mandatory, the adjusted or changed content will take effect 7 days after notification or publication. If you continue to use the Platform or the Services after the adjustment or change of the Privacy Policy, we believe that this represents that you have fully read, understood and accepted the revised Privacy Policy and are bound by it.
(1) We will not limit your rights under this Privacy Policy without your express consent. We will post any changes made to the Privacy Policy on a dedicated page.
(2) For material changes, we will also provide a more prominent notice (we will explain the specific changes to the Privacy Policy by means including, but not limited to, email, text message, or special notification on the viewing page).
Material changes referred to in this policy include, but are not limited to:
① A significant change in our service model. (i) Significant changes in our service model, such as the purpose of handling personal information, the type of personal information handled, and how personal information is used;
② A significant change in our control, etc.. For example, a change in ownership due to merger, acquisition, reorganization, bankruptcy, and so on;
③ Changes in the main recipients of your personal information to be shared, transferred, or publicly disclosed;
(iv) Significant changes in your rights to participate in the handling of personal information and the way you exercise them;
⑤ Changes in the department responsible for handling the security of personal information, contact information and complaint channels;
(vi) The security impact assessment report of personal information indicates that there is a high risk.
IX. How to contact us
When you have other complaints, suggestions, or other issues, you can contact us in the following ways, we will review the issues involved as soon as possible and respond within thirty days after verifying your user identity.
2.Contact Address: 2/F, Building 4, Tianyun Plaza, Wuzhong District, Suzhou, Jiangsu, China
3.Other contact information: order@gentlegen.com
If you are not satisfied with our response, especially if you believe that our personal information processing behavior has harmed your legitimate rights and interests, you can also seek a solution by filing a lawsuit with a court of competent jurisdiction in the defendant's domicile.