How We Collect and Use Your Personal Information
Personal information refers to various information recorded in electronic or other forms that can identify a specific natural person's identity or reflect a specific natural person's activities, either alone or in combination with other information. In accordance with the requirements of relevant laws and regulations in the region where the CertOne technical team is located, and strictly following the principles of legitimacy, legality, and necessity, we collect and use your personal information in the process of you using the services and/or products we provide, including but not limited to email addresses, passwords, etc. To receive our comprehensive product services, you should first register a user account, through which we will record relevant data. All information you provide comes from the data you provide during registration. We may verify the validity of your identity by sending emails for the account name and password you are about to use.
How We Store and Protect Your Personal Information
As a general rule, we only retain your personal information for the time necessary to achieve the purpose of information collection. We will retain your personal information for the time strictly necessary to manage our relationship with you (for example, when you open an account and obtain services from our products). For the purpose of complying with legal obligations or proving certain rights or contracts to meet applicable statute of limitations requirements, we may need to retain your archived personal information after the expiration of the above period and cannot delete it at your request. When your personal information is no longer necessary for our legal obligations or the purposes or archives corresponding to legal time limits, we ensure that it is completely deleted or anonymized. If you confirm that you will no longer use our products and services and actively cancel your account as required, all information will be completely deleted. We use security protection measures that meet industry standards to protect the personal information you provide and encrypt key data to prevent unauthorized access, public disclosure, use, modification, damage, or loss. We will take all reasonably feasible measures to protect your personal information. We use encryption technology to ensure data confidentiality; we use trusted protection mechanisms to prevent data from malicious attacks.
How We Share, Transfer, and Publicly Disclose Your Personal Information
When necessary for managing our daily business activities, to pursue legitimate interests to better serve customers, we will use your personal information in compliance and appropriately. After comprehensive consideration of business and various aspects, we only use this data ourselves and do not share it with any third parties. We may share your personal information externally in accordance with legal and regulatory provisions or mandatory requirements from government authorities. Under the premise of compliance with laws and regulations, when we receive requests for the above disclosure of information, we will require the issuance of corresponding legal documents, such as subpoenas or investigation letters. We firmly believe that for information we are required to provide, we should maintain transparency as much as possible within the scope permitted by law. In the following circumstances, sharing, transferring, or publicly disclosing your personal information does not require prior authorization and consent:
- Directly related to national security and defense security
- Directly related to criminal investigation, prosecution, trial, and judgment execution
- For maintaining major legitimate rights and interests such as your life and property or those of other individuals, but it is difficult to obtain consent from the person
- Personal information you voluntarily disclose to the public
- Personal information collected from legally publicly disclosed information, such as legal news reports, government information disclosure, and other channels
- Necessary for signing and performing contracts as required by the personal information subject
- Necessary for maintaining the safe and stable operation of the products or services provided, such as discovering and handling failures of products or services
- Other circumstances provided by laws and regulations
How We Use Cookies and Other Tracking Technologies
To ensure normal operation of products, we will store small data files named Cookies on your computer or mobile device. Cookies usually contain identifiers, product names, and some numbers and characters. With the help of Cookies, we can store your preferences or product data and use them to determine whether registered users have logged in, improve service and product quality, and optimize user experience. We use various Cookies for different purposes, including strictly necessary Cookies, performance Cookies, marketing Cookies, and functional Cookies. Some Cookies may be provided by external third parties to provide other functions for our products. We will not use Cookies for any purpose other than those described in this policy. You can manage or delete Cookies according to your preferences. You can clear all Cookies saved on your computer or mobile phone. Most web browsers have functions to block or disable Cookies, and you can configure your browser. After blocking or disabling Cookie functions, it may affect your use or prevent you from fully using our products and services.