Privacy Policy

Welcome to Higen-Bytek!
In order to protect your relevant rights, the "Higen-Bytek Privacy Protection Policy" (hereinafter referred to as "this policy") will explain to you how Higen-Bytek will collect, use and store your personal information and what rights you have. Please be sure to carefully read and understand the entire content of this policy before using Higen-Bytek, and use it only after confirming that you fully understand and agree to all content. Once you start using Higen Bytek, it means that you have fully understood and agreed to this policy.
This policy only applies to the functions and services of Higen-Bytek's own products and does not apply to products or services provided by any other third party.You are choosing to use third-party products /Before servicing, you should fully understand third-party products /Service functions and privacy policy.
This policy will help you understand the following:
1、How we collect and use your personal information
2、How we store this information
3、How we share, transfer and publicly disclose relevant information
4、How we protect this information
5、How you access and manage your personal information
6、how we use Cookie and similar technologies
7、Protection of minors
8、Updates to this policy
9、How to contact us
1. How we collect and use your personal information
In order to provide users with the functions and services of Higen-Bytek, and continue to maintain the normal operation of Higen-Bytek's various functions and services, at the same time, timely identify abnormal account status, ensure the security of your account as much as possible, and continuously improve and optimize Higen-Bytek. Regarding your experience using Higen-Bytek, we will collect and use the information you actively provide when registering and using Higen-Bytek, authorize you to provide it, or provide it based on the requirements of users of your enterprise for the purposes set out below in this policy, as well as your use of Higen-Bytek. Information generated by Baxter:
1.1Help you become a registered user of Higen-Bytek
In order to become a registered user of Higen-Bytek, you can enter Higen-Bytek after completing the identity verification by filling in your mobile phone number and receiving a verification code, or enter your mobile phone number into the organizational structure created by the enterprise user, authorizing you to become a registered user of Higen-Bytek. Higen-Bytek's corporate organization is an end user. During this process, we need to collect your mobile phone number in order to create a Higen-Bytek account for you and provide you with Higen-Bytek's basic functions. /services such as IM Chat (instant messaging), create groups, retrieve passwords, etc.
1.2Use Higen Bytek function /Information collected during the service process
1.2.1Basic information of the device: We will collect basic information about the device you use based on the specific permissions you granted during the installation and use of the software. The specific instructions are as follows:
1.2.1.1After you confirm that you agree to this policy, we will collect the information of the device you are using. IMEI Number, Mac address, Android ID, To uniquely identify and bind the device you are using to ensure that relevant functions can be used normally, while also providing you with effective account security;
1.2.1.2After you confirm that you agree to this policy, we will collect a list of software applications installed on your device and identify the version number of the application so that you can quickly determine whether the relevant software has been installed when you share content to other applications through Higen-Bytek operations. application;
1.2.1.3After you confirm your agreement to this policy, we will collect the model and operating system version information of the device you are using, and based on this we will understand the hardware of your device in order to provide you with compatible interaction design, mobile attendance and other configurations that are suitable for the device you are using.
1.2.2Instant messaging content information: In order to meet the instant communication needs between you and other end users in the organizational structure created by your enterprise users, or other supportable individual users, we will record the chat content information between you and other users so that Realize the transmission and interaction of information, and support the synchronization of information to the local device you are using. Chat content information includes text information, voice information, file and picture information.
1.2.3Log information: When you use the functions or services of the Higen-Bytek client or related websites we provide, we will automatically collect detailed information about your use of related functions and services by saving network logs, which may include your IP Address, browser type, telecom operator, access date and time, visited web page records, call status information, approval log information, attendance log information, etc.
1.2.4Data controlled by enterprise users: Based on the usage needs of enterprise users, it can be set up uniformly by the enterprise user administrator or independently operated by the end user to activate and use the relevant functions of Higen-Bytek /Relevant data generated or involved in the service process may include the following:
1.2.4.1After you become the end user of Higen-Bytek Enterprise Organization, you can further customize basic user information such as name, gender, email address, department, position, etc. according to the actual situation, as well as set a personalized avatar, and can independently modify the aforementioned The information is modified, but if the user of your enterprise is inviting /Except when corresponding restrictions or approval procedures are set when authorizing you to become an end user;
1.2.4.2The position, department, contact information, office email account, office phone number and other information assigned to you by the user of your enterprise, as well as the geographical location and movement generated after you activate attendance, approval, sign-in and other functions in accordance with the daily operation and management requirements of enterprise users Personal information such as track and attendance information, approval records, release log information, schedule information, cloud disk file information, etc.;
1.2.4.3If the user administrator of your enterprise chooses to activate the Higen-Bytek telemarketing version function, after obtaining your consent to enable the device recording permission, the calls you make through Higen-Bytek will be recorded and the recorded data will be saved and uploaded;
1.2.4.4When you use the order management function service provided by Higen-Bytek, the purchase and activation of value-added services and professional version are involved. /Telemarketing version /Purchasing, selling and stocking function /Service order transaction information and invoice information;
1.2.4.5The user administrator of your enterprise chooses to activate the purchase, sale and inventory function of Higen-Bytek. You need to enter suppliers, purchase orders, warehouses, receipt orders, issue orders, inventory transfer orders, inventory reports, etc. according to the requirements of enterprise users. information;
1.2.4.6If you, as an enterprise user administrator, choose to activate the on-hook SMS and marketing SMS functions, you need to upload the enterprise's business license and legal person ID card for filing in accordance with the requirements of the communication operator, otherwise you will not be able to use this function;
1.2.4.7Other data submitted by corporate users may contain personal information, such as Higen-Bytek corporate address book information (which may include the end user’s employment information, contact information, personal identity information, etc.).
You understand and agree that as the controller of the above data, the enterprise user is also the administrator involved and the processor of the personal information related to the end user under the enterprise organization. Higen-Bytek will only act according to the authorization of the enterprise user (including but not The above data is processed accordingly (limited to operations, configurations, etc. by the administrator). Enterprise users should independently control the scope of information they authorize us to process for the purposes of business management, human resources management, internal information security control, etc., and bear their own obligations and legal responsibilities to protect the legitimate rights and interests of the end users they manage.
In particular, if you are an enterprise user administrator, you should ensure that you choose to enable relevant functions /The services and corresponding usage settings are strictly in accordance with the actual needs and effective instructions of your corporate users, and ensure that your corporate users have obtained all authorizations from the corresponding individuals before providing us with all the processing-related personal information required by this policy through you. Valid authorization from the subject.
1.2.5third party SDK Information collected: To ensure the functions of Higen-Bytek /The service is available and running stably, we may access software development kits provided by third parties ( SDK)。 We will fulfill our duty of prudence and treat third parties SDK The collection of information is strictly monitored to protect the security of data information as much as possible.
Third parties we will access SDK and the SDK The personal information involved in the collection is listed in the following directory, and you can view the third party's data use and protection rules through the relevant links.
1.2.5.1Huawei HMS
Function: Push messages to Huawei mobile phone users
Type of information collected: device identification information (including IMEI Number, Android ID)
Privacy statement link: https://www.quanquke.com/privacy-notice.html
1.2.5.2Amap
Function: Help users position their location when setting up location-based functions such as attendance and clocking in.
Type of information collected: Geographical location information ( IP address, GPS/Beidou location information), device information (including mobile phone manufacturer information, system version information, IMEI Number), WI-FI Address information
Privacy Policy Link: https://www.quanquke.com/privacy-notice.html
1.2.5.3Tencent map
Function: Help users position their location when setting up location-based functions such as attendance and clocking in.
Type of information collected: Geographical location information ( IP address, GPS/Beidou location information), device information (including mobile phone manufacturer information, system version information, IMEI Number), WI-FI Address information
Privacy statement link: https://www.quanquke.com/privacy-notice.html
1.2.5.4Tencent WeChat SDK
Function: Send information to WeChat through Higen-Bytek /Content sharing
Type of information collected: None
Privacy Protection Guidelines Link: https://www.quanquke.com/privacy-notice.html1.2.5.5 Tencent QQ interconnected SDK
Function: Through Higen-Bytek to QQ carry out information /Content sharing
Type of information collected: None
Privacy statement link:: https://www.quanquke.com/privacy-notice.html interconnected sdk Privacy statement
1.2.5.6Tencent Bugly SDK
Function: APP Crash analysis and update fixes
Type of information collected: Collect APP Run log information ( APP Crash stack information), device ID( include: androidid as well as idfv)、 Network information, system name, system version information
Privacy statement link: https://www.quanquke.com/privacy-notice.html1.2.5.7 Xiaomi push
Function: Push messages to Xiaomi mobile phone users
Type of information collected: basic identification information of user equipment (including IMEI Number, Android ID)、 and the list of applications installed on the device.
Privacy Policy Link: https://www.quanquke.com/privacy-notice.html
1.2.5.8 OPPO PUSH
Function: to OPPO Mobile phone users push messages
Type of information collected: Device-related information (e.g. IMEI or OAID,Serial Number,IMSI,User ID,Android ID,Google Advertising ID, cell phone Region settings, device model, mobile phone battery, mobile phone operating system version and language), application list information installed on the device, and specific application information using push services (such as APP Package name and version number, running status), push SDK Version number, network related information (such as IP or Domain name connection results, current network type), message sending results, notification bar status (such as notification bar permissions, user click behavior), lock screen status (such as whether to lock the screen, whether to allow lock screen notifications)
Privacy Policy Link: https://www.quanquke.com/privacy-notice.html
1.2.5.9Aurora push
Function: Pass device identification information, such as MAC Address, specify notification push to achieve the purpose of prompting users, including instant messaging content, product information, version update reminders, task and process notification scenarios; by obtaining the software installation list, provide QQ、 Third-party social services such as WeChat submit shared data to WeChat, QQ、 Display on Sina Weibo and other platforms; at the same time, through IP address, optimization SDK Network connection requests with Aurora servers to ensure the stability and continuity of services and realize regional and group instant messaging functions;
Type of information collected: device information (including IMEI Number, MAC Address, software installation list, UDID)、 Geolocation information ( IP address, GPS/Beidou location information)
Privacy Policy Link: https://www.quanquke.com/privacy-notice.html
1.2.4.10Tencent Cloud Cube SDK
Function: Supports multi-person real-time audio and video calls and low-latency online interaction;
Types of information collected: PC Manufacturer information, device model and CPU Information, system version, network type, browser version and type, App Package names, IP address
Privacy Agreement Link: https://www.quanquke.com/privacy-notice.html
1.2.5.11Baidu Mobile Statistics SDK
Function: Help developers count the activity of various mobile applications on user devices in order to analyze and optimize the current APP functions and experience.
Type of information collected: basic information of user equipment (including hardware model, operating system version and system status, configuration, international mobile device identity code IMEI、 International Mobile Subscriber Identity Number IMSI、 Network device hardware address MAC、 advertising identifier IDFA、 Anonymous device identifier OAID、 Device identifiers such as hardware serial number, terminal brand, terminal manufacturer and other basic attribute information, browser type, telecom operator, language used, WIFI information and other device connection information), as well as the application list information installed on the device, and the process information of running applications (including application name, application usage time, application function name and whether it is used and how long it is used);
In addition, Baidu Mobile statistical analysis SDK It will also help application providers distribute applications /Statistical analysis related to promotion situation, based on this demand scenario, SDK Will proactively identify application distribution hits on the user's device clipboard /The content of the parameters attached to the promotion.
Privacy Agreement Link: https://www.quanquke.com/privacy-notice.html1.2.5.12 ZOOM videoconference SDK
Function: Support initiating video conference through Higen-Bytek;
Type of information collected: Basic information related to the user's account (including user name, avatar, and personalized signature), information related to the device used by the user (including mobile device, operating system type and version, Higen-Bytek application version, web browser or used to access Configuration information provided by other programs that enter the video service, IP Address, version and device identification code of the mobile device, screen resolution), information related to the user's operation and use of the video conferencing function (including the name of the meeting set or participated in, meeting time period, screen sharing or clicks and other operation records, meeting recording File storage path, method of joining the meeting and other login information, etc.), the content itself shared or displayed during the video conference initiated by the user, invited participants (displaying user name, avatar, personalized signature).
Privacy Agreement Link: https://www.quanquke.com/privacy-notice.html
1.3Use Higen Bytek function /Permissions that need to be applied for during the service process
In order to provide you with relevant functions and services of Higen-Bytek and ensure the normal operation of functions and services, we will need to apply to you for enabling relevant permissions. The specific instructions are as follows:
Device permissions
Application purpose
How to apply for authorization
Can it be closed
Storage access
Support users to directly send files stored on the device and quickly upload files when using the instant messaging function of Higen-Bytek /Pictures to cloud disk
Opened for the first time by user APP Pop-up window asking
yes
Phone call permission
Support users to directly dial the phone number in the address book through Higen-Bytek
Opened for the first time by user APP Pop-up window asking
yes
Notification push permission
Ensure timely push notification messages to users
Opened for the first time by user APP Pop-up window asking
yes
Wireless network connection permissions
Ensure the normal use of various functions
Opened for the first time by user APP Pop-up window asking
yes
SMS sending permission
Support users to send text messages directly to customers when using the return visit reminder function
A pop-up window will appear when the user uses the relevant function for the first time.
yes
Location permissions
Support users to use attendance, field track recording functions and customer location navigation services
A pop-up window will appear when the user uses the relevant function for the first time.
yes
Address book access
Support users to import customer contact information from the mobile phone address book, or enterprise user administrators to easily invite or import and add end users through the mobile phone address book
A pop-up window will appear when the user uses the relevant function for the first time.
yes
Photo album access
Support users to send photos directly when using Higen-Bytek’s instant messaging function /Image files, and quick photo uploads /Pictures to cloud disk
A pop-up window will appear when the user uses the relevant function for the first time.
yes
Recording permission
If you are listed as an end user who needs to upload mobile phone call records by the enterprise user administrator, in order to support your use of Higen-Bytek's telesales function, you need to apply to enable reading of call records. /System permissions for call status monitoring
A pop-up window will appear when the user uses the relevant function for the first time.
yes
Camera enable permissions
Support users to use photo taking or video conferencing functions
A pop-up window will appear when the user uses the relevant function for the first time.
yes
Microphone enable permission
Support users to use the function of Higen-Bytek to publish voice or initiate calls.
A pop-up window will appear when the user uses the relevant function for the first time.
yes
Explanation on the necessity of the auto-start setting of Higen-Bytek: If you have enabled automatic attendance or sign-in, call recording or automatic uploading of field records while using Higen-Bytek, Higen-Bytek must remain activated to ensure that you can use the function. and other functional requirements; in addition, in order to ensure that users can receive the release of Higen-Bytek in a timely manner /For push notification messages, Higen-Bytek also needs to remain in the activated state. Therefore, Higen-Bytek will regularly detect the startup status in the background and automatically start after the user exits Higen-Bytek or exits abnormally for other reasons to protect users. The demand for the use of Higen-Bytek functions can be met.
1.4Other information you actively provide to us
In the process of using Higen-Bytek's functions and services, you can provide feedback on related experience issues to help us better understand your needs for our products, and then help us continuously improve product functions and user experience. To this end We will record your proactive submission of contact information, feedback questions or suggestions so that we can further contact you and provide feedback on our processing opinions.
1.5Information provided to us by third parties
We may collect information about you when other users perform operations related to you, and may also obtain your personal information from Higen-Bytek affiliates, cooperative third parties, or through other legal channels. For example, in order to prevent fraud, gambling and other risks, maintain the safe and stable operation of Higen-Bytek services and payment-related functions, and fully protect your legitimate rights and interests, we need to obtain the user ID of the payment account you actually use from a third-party payment institution. information.
1.6Information collected for other purposes
You understand and agree that the product functions and services we provide you are constantly iteratively upgraded. If we need to collect and process your personal information beyond the scope of this policy, we will provide you with additional information through page prompts, interactive design, etc. You clearly state the content, scope and purpose of processing of the information involved, and obtain your consent.
1.7Exceptions to authorization for collection and use of personal information
You are fully aware that, in accordance with applicable laws, we do not need to obtain your authorization to collect and use relevant personal information in the following circumstances:
1.7.1Relevant to our performance of obligations under laws and regulations;
1.7.2Directly related to national security and national defense security;
1.7.3Directly related to public safety, public health, and major public interests;
1.7.4Directly related to criminal investigation, prosecution, trial and execution of judgment;
1.7.5To protect your or other individuals' life, property and other major legitimate rights and interests but it is difficult to obtain your authorization and consent;
1.7.6The personal information involved has been disclosed to the public by you;
1.7.7To enter into and perform a contract between you and us /Necessary to the agreement;
1.7.8Collect relevant personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels;
1.7.9Necessary to maintain the safe and stable operation of the products or services we provide, such as discovering and handling product or service failures.
2. How we store this information
2.1Since we provide users with Higen-Bytek services relying on the cloud service solutions provided by Alibaba Cloud (Alibaba Cloud Computing Co., Ltd.), we operate Higen-Bytek related data and the information involved in your use of Higen-Bytek. All information is stored on servers deployed by Alibaba Cloud, which is entrusted by us / Entrust Alibaba Cloud to perform storage and other related necessary processing. In addition, in order to meet the legality control requirements of information content required by legal regulations, we have separately entrusted Qiniu Cloud (Shanghai Qiniu Information Technology Co., Ltd.) to provide the files and picture information in Higen-Bytek instant messaging content. Storage and testing services. Before selecting the aforementioned service providers, we have comprehensively considered and evaluated their service capabilities and data security protection capabilities. We have adopted technical measures for encryption during data storage and transmission to ensure that we can provide users with safe and stable services. Serve.
2.2We process within the territory of the People's Republic of China /The data information entrusted to be processed will be stored on servers within the territory of the People's Republic of China, and will be stored in accordance with relevant legal provisions or the period agreed with the user (to meet the necessary needs to provide products or services to the user).
2.3 If in order to handle cross-border business, it is really necessary to transfer relevant data and information processed within the country to overseas institutions, we will inform you separately and obtain your consent, and implement it in accordance with the provisions of laws, administrative regulations and relevant regulatory agencies. We will ensure that relevant personal information is adequately protected, such as anonymizing personal information and adopting secure encryption measures for storage and transmission.
2.4You understand and agree that for security and backup purposes, we may store the data we process on the servers of affiliated companies.
3. How we share, transfer and publicly disclose relevant information
3.1shared
Except in the following circumstances, we will not process /Personal information entrusted to be processed is shared with third parties:
3.1.1Your express consent has been obtained;
3.1.2We may share relevant personal information externally in accordance with laws and regulations, or in accordance with the mandatory requirements of government authorities;
3.1.3When deemed necessary to provide users with product or service functions, relevant personal information will be shared with third parties including affiliated companies or authorized partners:
We may need to cooperate with third parties to improve the security of products or services and optimize user experience. Based on this, we may share some personal information with third parties. We promise to disclose the specific sharing purposes and methods before sharing. and information scope are clearly informed to you and your consent is sought.
We promise you that we will only share your relevant personal information with our partners to the extent necessary, and de-identify the information as much as possible so that the partners cannot directly identify the relevant individuals. In addition, the partner's processing of the information received will be governed by the contents of this section. We will strictly prohibit third parties from using the shared information for other purposes without the user's authorization and consent.
3.2transfer
we will not process /The personal information entrusted to be processed is transferred to any company, organization and individual, except in the following circumstances:
3.2.1Your express consent has been obtained;
3.2.2 When a merger, acquisition or bankruptcy liquidation is involved, if the transfer of personal information is involved, we will require the new company or organization that holds your personal information to continue to be bound by this privacy protection policy, otherwise we will require the company or organization to re- Ask for your authorization and consent. If the transfer of personal information does not involve we will fully inform you and delete or anonymize the personal information we process.
3.3public disclosure
We will not publicly disclose relevant personal information, except in the following circumstances:
3.3.1We may publicly disclose relevant personal information based on your explicit consent or your active choice;
3.3.2Based on legal provisions /Required disclosure: We may publicly disclose relevant personal information when required by law, legal proceedings, litigation, or when required by competent government authorities;
3.3.3We may disclose relevant personal information if the disclosure is reasonable and necessary for the purpose of safeguarding the public interest.
3.4In the following circumstances, we do not need to obtain your prior authorization to share, transfer, or publicly disclose relevant personal information:
3.4.1For reasons related to national security and national defense security;
3.4.2Based on reasons related to public safety, public health, and major public interests;
3.4.3For reasons related to criminal investigation, prosecution, trial, and enforcement of judgments;
3.4.4To protect the life, property and other major legitimate rights and interests of users or other individuals but it is difficult to obtain your consent;
3.4.5Disclose data collected from legally disclosed information, such as legal news reports, government information disclosure and other channels;
3.4.6Necessary to maintain the safe and stable operation of the products or services provided, such as discovering and handling product or service vulnerabilities or malfunctions.
4. How do we protect this information?
4.1Zhejiang Higen-Bytek Software Development Co., Ltd. attaches great importance to information security. We will use various security technologies, including security encryption, anti-intrusion, anti-virus, etc., to protect information security from unauthorized access, use, disclosure, Misuse, modification, or damage or loss.
4.2Zhejiang Higen-Bytek Software Development Co., Ltd. will establish a user information security management system and work process, strictly control access to user information, conduct permission restrictions and security and confidentiality-related training for staff who come into contact with personal information, and provide regular Conduct personal information security risk assessments and handle relevant risk issues in a timely manner in order to continuously improve the security capabilities of personal information protection.
4.3 The Internet environment is not 100% safe, and we will do our best to ensure the security of the relevant personal information we process. If our physical, technical, or management protection facilities are damaged, resulting in unauthorized access, public disclosure, tampering, or destruction of relevant personal information, resulting in damage to your legitimate rights and interests, we will bear corresponding legal liability.
4.4If an information security incident (leakage, loss, etc.) unfortunately occurs, we will use reasonable means to promptly inform you in accordance with the requirements of laws and regulations, including the basic situation of the security incident, possible impacts, measures we have taken or will take, and what you can do. Suggestions on independent risk prevention and reduction, remedial measures for you, etc. At the same time, we will also proactively report the handling of personal information security incidents in accordance with the requirements of regulatory agencies.
4.5 Although we are willing to do our best to take reasonable measures to protect the security of user information, no security measures can be 100% perfect or impenetrable.Because the products users use /Telling others the service account password or violating the product /The user’s own reasons such as the agreement on the use of the service, or due to hacker attacks /User information leakage due to third-party reasons such as virus intrusion or force majeure factors /Loss and other security incidents, you understand that Zhejiang Higen-Bytek Software Development Co., Ltd. will not be responsible for any direct or indirect losses or liabilities.
5. How you access and manage your personal information
5.1You understand and agree: We will provide you with the basic functions of accessing and managing your personal information. However, because the functional development of Higen-Bytek products and the provision of related services are committed to providing enterprise users with solutions that facilitate business development and profit growth. solution, so when a user of your enterprise invites / When authorizing you to become an end user and setting corresponding restrictions or approval procedures for your use of relevant functions, you need to follow the requirements of enterprise users. Zhejiang Higen-Bytek Software Development Co., Ltd. promises to protect your relevant legitimate rights and interests in your personal information based on the obligations stipulated by law or agreement and business ethics. If you encounter any problems in accessing, correcting relevant personal information or exercising other personal information management rights that are not restricted by the management of your corporate users, you can contact us through the methods disclosed in this policy.
5.2Account cancellation or unbinding
After the user cancels the Higen-Bytek account according to the standard procedures (the enterprise user administrator can log out the Higen-Bytek enterprise user according to the prompts through the [Mobile Terminal - Me - Company Management - Cancellation Company] interface, the enterprise organization end user or Higen-Bytek Individual users of Yubaite can log out of the Higen-Bytek account through the [Mobile Terminal - Me - Company - Unbind Company] interface and follow the prompts to cancel the Higen-Bytek account) or after unbinding the relevant binding relationship, we will stop providing you with Higen-Bytek's information All functions and services, and your personal information will be deleted or anonymized in accordance with the requirements of relevant laws and regulations and relevant agreements with you or your corporate users (if any).
5.3You may also request us to delete relevant personal information under the following circumstances:
5.3.1we process /The entrusted processing of relevant personal information violates relevant laws and regulations;
5.3.2We actively collect and use your personal information without obtaining your explicit consent;
5.3.3we process /The entrusted processing of relevant personal information seriously violates the relevant agreements.
5.4Respond to your request to exercise management rights
5.4.1You understand and agree: Based on the foregoing, we will process / Description of the purpose of entrusted processing of personal information. Your management of information may conflict with your normal registration and use of products or services. We will not be responsible for the impairment of the use of products or services or the losses suffered due to your independent exercise of the right to manage data information.
5.4.2 In principle, we do not charge fees for your reasonable requests, but for repeated requests that exceed reasonable limits, we will charge a certain cost depending on the situation. For unreasonable duplication, or requiring excessive technical investment (for example, the need to develop a new system or fundamentally change the current practice), or may bring risks to the legitimate rights and interests of others, or is very impractical (for example, involving information stored on backup tapes) request, we may deny it.
5.4.3 For security reasons, you may be required to provide a written request or otherwise prove your identity. We may ask you to verify your identity before processing your request.
5.4.4We will not be able to respond to your request under the following circumstances:
5.4.4.1Relevant to your performance of obligations stipulated in laws and regulations;
5.4.4.2Directly related to national security and national defense security;
5.4.4.3Directly related to public safety, public health, and major public interests;
5.4.4.4Directly related to criminal investigation, prosecution, trial and execution of judgments;
5.4.4.5There is sufficient evidence that you have subjective malice or abused your rights;
5.4.4.6Unable to respond due to safeguarding personal life, property and other major legitimate rights and interests;
5.4.4.7Responding to your request will cause serious damage to other legitimate rights and interests of relevant individuals and organizations;
5.4.4.8Involving trade secrets.
6. How we use Cookie and similar technologies
6.1In order to give you an easier access experience, when you use Higen-Bytek products /When serving, we may collect and store your access to Higen-Bytek products through various technologies. /Service-related data so that when you visit or revisit Higen-Bytek products / When providing services, it helps you save the need to repeatedly enter account information, and also helps us quickly identify you, help determine the security status of your account, and provide you with more and better services by analyzing data.These technologies for collecting and storing relevant data may be Cookie、Flash Cookie, or other locally stored files provided by your browser or associated applications (collectively, " Cookie”)。
6.2Web pages often contain electronic images called "single-pixel GIF File" or "Network beacon”, It helps a website count users browsing a web page or visiting certain cookie。 We may also use the Internet beacon Collect information related to your web browsing activities through Higen-Bytek, such as the address of the page you visited, the address of the referring page you visited previously, the time you stayed on the page, your browsing environment and display settings, etc.
6.3You understand and agree that some of our services are only available through the use of Cookie can be realized, we will not Cookie For any purpose other than those stated in this policy.You can modify the Cookie Acceptance or rejection of Higen-Bytek Cookie, But reject Higen-Bytek's Cookie In some cases, you may not be able to use some dependencies Cookie functions or services.
7. Protection of minors
7.1In digital office / During learning, communication and collaboration activities, we assume that you have the appropriate capacity for civil conduct.We attach great importance to the protection of minors’ personal information. If you are a minor, we ask that you ask your parents or other guardians to read this privacy policy carefully and obtain their consent. use our products /Services or provide information to us.
7.2If you are the guardian of our minor users or an enterprise user or administrator with administrative rights for minor users, please pay attention to whether the minor user is using our products with the authorization and consent of the guardian. /service and handle with caution /Entrust us to process the personal information related to the minor user; when you process it for us /If you have any questions about the processing of personal information of minors under your custody, please contact us through the contact information in Section 9.
8. Updates to this policy
8.1We base our products on /Due to service updates or business practice needs, the content of this policy may be revised and updated from time to time, and the updated policy content will be presented to you in an appropriate manner.
8.2 For major revisions, we will provide prominent notices (for example, we may notify you through push messages or website announcements to explain the specific changes to this policy), and notify you of the changes through feasible channels and methods as much as possible. You can also check the latest updated version of this policy by visiting our website or through Higen-Bytek.
8.3Major changes referred to in this policy include but are not limited to:
8.3.1 We have undergone significant changes in terms of control, organizational structure, etc. Such as changes in owners caused by mergers, acquisitions, reorganizations, business adjustments, etc.;
8.3.2Our product features /Significant changes in the service model resulting in processing /Major changes in the purpose of entrusted processing of user information, information types, processing methods, etc.;
8.3.3The main recipients of user information sharing, transfer or public disclosure change;
8.3.4There are significant changes in your rights to participate in the processing of user information and how you exercise them;
8.3.5Our responsible departments, contact information and complaint channels responsible for handling user information security have changed;
8.3.6The user information security impact assessment report indicates a high risk.
9. How to contact us
In the process of using Zhejiang Higen-Bytek Company's products, users can contact us through [Mobile - Me - Help and Feedback - Feedback] or [via email at the following address] to obtain technical support or conduct personal information compliance Handle inquiries, complaints, and reports regarding security protection. Our communication information is as follows:
Dongguan Higen-Bytek Intelligent Equipment Co.,Ltd.
Contact department: Higen-Bytek
Address: Block B, Building 21, Shuibian Industrial Park, No. 32 Yucai Road, Hengli Town, Dongguan City
E-mail: hl@hybt.net
Under normal circumstances, we will respond with comments or processing results within 7 days after receiving the information and verifying your identity.

CONTACT US
If you have any queries, get in touch today! Don't hesitate. We try to take the extra step for our customer satisfaction.
FirstName *
LastName *
Email *
Message *