DAMI Privacy Policy
(Last updated: March 22, 2024)
We understand the importance of your store information and strive to safeguard its security and confidentiality. We are committed to maintaining your trust by adhering to the principles of corresponding responsibility, clear purpose, choice and consent, data minimization, security assurance, user participation, and transparency. At the same time, we apply advanced industry security standards to protect your store information.
Please read and fully understand this Privacy Policy before using our products or services. When you confirm that you have read and agree, or when you click agree/confirm, or begin using DAMI’s products/services, it means you have accepted all the contents of this Policy.
I. How We Use Your Store Information
DAMI only uses your store information for the following purposes:
· Exporting KOC invitation history / message history with KOC.
· Displaying store–creator/KOC connection data when using the creator management feature.
· Executing functions such as sending collaboration invitations, messaging, messaging buyers of an order, clearing invalid plans, etc.
· Your store information is stored only on your local device.
II. How We Use Cookies and Similar Technologies
1. Cookies
To ensure the proper functioning of our software, we store small data files (cookies) on your device. Cookies contain identifiers, site names, and certain characters used to store your ID, token, etc., for validating your store login session.
You may manage or delete Cookies. However, deleting cookies may cause certain cookie-dependent features or services to stop working.
2. Web Beacons and Pixel Tags
In addition to cookies, we also use beacons and pixel tags. For example, emails we send may contain click-tracking links to help us improve our services. Pixel tags may let us know whether an email has been opened.
If you do not want to be tracked, you may unsubscribe from our emails at any time.
3. “Do Not Track”
If your browser enables “Do Not Track,” all of our websites will respect this preference.
III. How We Protect Your Store Information
We apply industry-standard measures such as SSL encryption, HTTPS security, data encryption, access control mechanisms, and security training for employees to prevent unauthorized access, leakage, modification, or loss of data.
DAMI has passed the China Cybersecurity Protection Level 3 assessment and file-recording requirements.
Our data platform has also passed the Level 3 cybersecurity inspection.
We collect only the minimum necessary information and retain it only for the required duration outlined in this Policy, unless otherwise required by law.
Please note that the Internet is not entirely secure. Emails, messages, and online communication are not encrypted—avoid sending store information through these channels. Use strong passwords.
Although we do our best, we cannot guarantee absolute security of data transmitted over the Internet.
IV. Your Rights
In accordance with applicable laws and international practices, you may exercise the following rights:
1. Request Deletion of Store Information
You may request deletion if:
(1) We process data unlawfully;
(2) We collect/use data without your consent;
(3) We violate the agreements made with you;
(4) We stop providing services.
Deleted data in backups will be removed in subsequent update cycles.
2. Change the Scope of Consent
You may grant or withdraw consent at any time. After withdrawal, we will stop processing the corresponding information (but previous processing remains unaffected).
3. Right to Object to Automated Decisions
If an automated system makes a decision that significantly affects your legitimate rights, you may request an explanation and ask for supplemental measures.
4. How We Respond to Your Requests
– You must verify your identity before we process your request.
– We will respond within 15 business days.
– Reasonable requests are handled free of charge.
– Excessive, repetitive, unreasonable requests, or requests requiring major system changes may be rejected.
We may not process requests under the following circumstances:
(1) Related to legal obligations;
(2) Related to national security;
(3) Related to public interest;
(4) Related to investigations/prosecution/court actions;
(5) Requests that severely harm your own or others’ legitimate rights;
(6) Related to trade secrets.
V. How This Policy Is Updated
We may update this Privacy Policy.
We will never reduce your rights without your consent.
When changes occur, we will notify you via pop-up, system message, or similar method. For major changes, we will use more prominent notifications.
Major changes include but are not limited to:
· Significant changes to service models.
· Major adjustments to organizational structure or ownership (e.g., mergers, bankruptcy).
· Changes to the parties with whom store information is shared/transferred.
· Significant updates to your rights or how you exercise them.