Menu

PRIVACY POLICY

Guangzhou Jusen Trading Co., Ltd. (hereinafter referred to as "we") attaches great importance to your privacy protection and the security of personal information. We are committed to regulating the collection, use, storage, sharing, etc. of personal information in accordance with the requirements of laws and regulations to protect your legitimate rights and interests. This Privacy Policy will clearly inform you of how we handle the personal information involved in your use of our services (including product sales, consultation, after-sales, etc.). It is recommended that you read and understand the content of this policy carefully.

I. Scope of Application
This Privacy Policy applies to the personal information of yours that we collect, use, store, transmit, share, and protect during the provision of services when conducting business with you, including but not limited to the information you provide in scenarios such as registering an account, submitting an order, consulting services, and applying for after-sales, as well as the relevant information we legally obtain during the service process.
It does not apply to the information collected by third - party platforms (such as information collected through third - party payment tools, logistics companies, etc.). The processing of such information follows the privacy policies of third parties, and we shall not be liable for it.

II. Collection and Use of Personal Information
We only collect necessary personal information for legitimate business purposes and will not over - collect beyond business needs.
(1) Types and Purposes of Collected Personal Information

  1. Identity Information
    ◦ Collection Content: Name, ID number (when issuing a special VAT invoice or handling specific after - sales business), enterprise name and unified social credit code (for corporate customers).
    ◦ Collection Scenarios: When you fill in the invoicing information when submitting an order or apply for after - sales service involving qualification verification.
    ◦ Use Purpose: To issue legal and valid invoices, verify customer identity to ensure transaction security, and handle business processes in line with regulatory requirements.
  2. Contact and Address Information
    ◦ Collection Content: Mobile phone number, fixed - line phone number, email address, shipping address (including province/city/district, detailed address, postal code), emergency contact and contact information (if necessary).
    ◦ Collection Scenarios: You actively provide it when registering an account, submitting a purchase order, or booking a delivery service; and supplement and improve it during after - sales communication.
    ◦ Use Purpose: For order confirmation and notification (such as shipping reminders, arrival warnings), accurate positioning of the delivery address, follow - up and feedback on after - sales issues, and communication of service requirements.
  3. Transaction and Order Information
    ◦ Collection Content: The name, specifications, quantity, price, order number, payment amount, payment method, payment time, and order status (pending payment/already shipped/completed, etc.) of the products you purchase.
    ◦ Collection Scenarios: Automatically recorded by the system after you complete the order submission and payment operations.
    ◦ Use Purpose: For order processing (such as stockpiling, shipping), archiving of transaction records, bill reconciliation, tracing of after - sales issues (such as confirming order information during returns and exchanges), and providing you with an order query service.
  4. Device and Log Information
    ◦ Collection Content: The device model, operating system version, browser type, IP address, access time, accessed pages, and operation records when you visit our official website or service platform.
    ◦ Collection Scenarios: Automatically collected by the system background without your active provision.
    ◦ Use Purpose: To optimize the performance of the official website/platform (such as fixing access failures), ensure system security (such as identifying abnormal access behaviors), and analyze users' service needs (such as adjusting the page display content), and it is not used for other purposes by associating with personal identity information.
    (2) Collection Methods
  5. You actively provide: Including the information you directly submit through official website forms, customer service communication, offline agreements, etc. when registering, placing an order, consulting, or for after - sales.
  6. System automatic collection: Through our service systems, server logs and other technical means, the device and operation information automatically obtained during your use of the service.
  7. Obtained from legal third parties: With your authorization or as permitted by laws and regulations, obtain necessary information from legally cooperative third parties (such as the delivery address verification information provided by logistics companies, the payment status information provided by payment institutions) to complete the transaction process. The acquisition of such information will strictly follow the privacy policies of third parties and relevant regulations.

III. Storage and Protection of Personal Information
(1) Storage Methods and Periods

  1. Storage Method: Your personal information will be stored in our domestic servers that meet security standards. Measures such as encryption technology (such as data transmission encryption, storage encryption) and access rights control (only authorized staff can access) are adopted to prevent information leakage, tampering, and loss.
  2. Storage Period: We only store your personal information for the necessary period to achieve the purposes described in this policy, as follows:
    ◦ Transaction - related information (such as orders, payment records): Retained for 5 years from the date of transaction completion (in line with tax, financial and other regulatory archiving requirements);
    ◦ Basic information such as identity, contact address, etc.: Stored during the duration of your business relationship with us. After the termination of the business relationship (such as when you apply to cancel your account, or there is no transaction and no service demand for a long time), it will be deleted or anonymized in accordance with the law after the expiration of the shortest necessary period specified by law (after anonymization, the information cannot be associated with personal identity and no longer belongs to personal information);
    ◦ Device and log information: Retained for 1 year from the date of generation, and automatically deleted or anonymized after the expiration of the period.
    (2) Security Protection Measures
  3. Technical Protection: Adopt technologies such as firewalls, intrusion detection systems, and data encryption to ensure the security of information transmission and storage; regularly scan and repair system security vulnerabilities to prevent cyber - attacks.
  4. Management Norms: Establish a personal information security management system, clarify the access rights of staff, and only authorize business - related personnel to access personal information; conduct privacy protection training for staff to strengthen security awareness; formulate an information leakage emergency plan. In case of an information security incident, timely remedial measures will be taken, and you and the regulatory authorities will be notified as required by law.
  5. Third - Party Restraints: If entrusting a third party (such as a server hosting provider, data processing service provider) to process personal information, we will sign a strict confidentiality agreement with the third party, clarify the scope of its information processing and security responsibilities, and supervise the processing behavior of the third party to ensure compliance with this Privacy Policy and regulatory requirements.
Leave your contact information and we will reply to you as soon as possible
Click to upload an image or file
{{ form.fileName }}