关闭
原东南汽车网站已迁移
如有需要,请点击此链接前往
EASE YOUR LIFE 全新网站搭建中
ALL NEW SOUEAST 敬请期待
COMING SOON
CONTACT US 联系我们
PRIVACY AGREEMENT 隐私协议
SUBMIT 提交
BUSINESS CONTACT :
业务联系人 :
jingzhi.sun@soueast-motor.com
Submitted successfully!
PRIVACY AGREEMENTS
Party A: SOUTH EAST(FUJIAN)MOTOR CORPORATION LTD. (hereinafter referred to as 'SEM')
Party B: SOUTH EAST MOTOR User (hereinafter referred to as 'User' or 'You')

We attach great importance to your privacy and personal information protection, and hope to help you understand the following contents through the policy:

I. How Do We Collect and Use Your Personal Information
II. How Do We Use Cookies and Similar Technologies
III. How Do We Share, Transfer, and Publicly Disclose Your Personal Information
IV. How Do We Protect Your Personal Information
V. How Do You Manage Your Personal Information
VI. How Do We Handle the Personal Information of Minors

We hope that you will read and confirm that you fully understand the contents of the policy before using our services. After clicking Agree, you are deemed to have accepted the contents of the policy and agreed to authorize us to collect, use, store and share your relevant information in accordance with the privacy policy.

I. How Do We Collect and Use Your Personal Information
We will collect and use your personal information for the following purposes:
(i) User information collection function
When using SEM products or online services, we suggest that you should fill in your personal information. In the process, you are required to provide us with your name, mobile phone number, email address, country and city.
(ii) Safe operation
We may use or integrate your equipment information and log information to comprehensively judge the risks of your personal information, carry out identity verification, detect and prevent security incidents, and take necessary recording, auditing, analysis and disposal measures according to law in order to improve the safety of your online service of SEM, protect the personal and property safety of you or other users or the public from infringement, better prevent security risks such as phishing websites, fraud, network vulnerabilities, computer viruses, network attacks and network intrusions, to identify violations of laws and regulations and SEM related agreements more accurately.
1. Equipment information: We will receive and record the information about the device used (such as the location information and IP address of the device) according to the specific permissions granted during use.
2. Log information: When using the products or online services provided by SEM, we will automatically collect your detailed usage of our services and save them as relevant web logs, such as editing time and generated results.
Please be noted that individual device information and log information are information that cannot identify a specific natural person. If we combine such non-personal information with other information to identify a specific natural person, or use it with personal information, such non-personal information will be regarded as personal information during the combining use.
(iii) Improve the functions necessary for our products or online services
We will record the relevant information provided in order to make our service more in line with your expectations and requirements and improve our service quality.
(iv) Service regulations
We will use the personal information collected in strict accordance with the following regulations:
1. We will use your personal information in strict accordance with laws and regulations and the privacy policy.
2. We will encrypt, de-identify or anonymize your personal information by technical means according to law.
3. When we require to use your personal information for other purposes not specified in the policy, we will ask your consent again.
(v) Exceptions to the situation of obtaining authorization and consent
According to relevant laws and regulations, we do not require your consents to collect your personal information under the following circumstances:
1. Those related to national security and national defense security;
2. Those related to public safety, public health and major public interests;
3. Those related to criminal investigation, prosecution, trial and judgment execution;
4. It is difficult to obtain your consent in order to safeguard the major legitimate rights and interests such as the life and property of personal information subjects or other individuals;
5. The collected personal information is disclosed to the public by yourself;
6. Personal information collected from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels;
7. Those are necessary for signing the contract according to your requirements;
8. Those are necessary to maintain the safe and stable operation of the provided products or online services, such as finding and handling faults of products or services;
9. Those are necessary for legal news reports;
10. When academic research institutions carry out statistics or academic research based on public interests and provide academic research or description results to the outside world, we will de-identify the personal information contained in the results;
11. Other circumstances stipulated by laws and regulations.
Please understand that the functions and services provided by us are constantly updated and developed. If a certain function or service is not included in the above description and your information is collected, we will separately explain the content, scope and purpose of information collection to you through page prompts, interactive processes and announcements in order to obtain your consent.

II. How Do We Use Cookies and Similar Technologies
We will store a small data file named cookie on your mobile and PC devices in order to ensure that the service works properly. Usually, Cookie contains an identifier, a site name, and some numbers and characters. With the help of Cookie, we can store data such as your preferences, which helps you avoid tedious actions such as filling in personal information and entering historical search content. You can manage or delete Cookie according to your preferences, such as clearing all Cookies saved on your computer through browser setting options. However, if you carry out the operation, you need to change the settings every time you visit SEM, and the corresponding information you recorded before will be deleted, which may have a certain impact on the security of the services used.

III. How Do We Share, Transfer, and Publicly Disclose Your Personal Information
(i) Sharing
We will not share your personal information with companies, organizations and individuals other than SEMs, except in the following cases:
1. Share with explicit consent: With your explicit consent, we will share your personal information with other parties.
2. Share under statutory circumstances: We may share your personal information with the outside world according to laws and regulations, the needs of litigation dispute resolution, or the requirements put forward by administrative and judicial organs according to law.
3. Share with authorized partners:
We may entrust the following types of authorized partners to provide relevant services for you or perform functions on our behalf. We will share your information only for the legal, legitimate, necessary, specific and definite purposes stated in the Privacy Policy. The authorized partners have access only to the information they need to perform their duties and may not use the information for any other purpose.
Currently, our authorized partners, including the following types and authorized purposes, are as follows:
Product analysis. We may share statistical data of use with third parties in order to analyze the use of our services and improve the user experience, which is difficult to combine with other information to identify your personal identity.
(ii) Transfer
We will not transfer your personal information to any company, organization or individual except in the following cases:
1. Under the premise of explicitly obtaining your consent, we will transfer your personal information to other parties;
2. In case of merger, acquisition or bankruptcy liquidation, if the transfer of personal information is involved, we will require the new company or organization holding your personal information to continue to be bound by the privacy policy, otherwise we will require the company or organization to re-seek authorization and consent from you.
(iii) Public disclosure
We will only publicly disclose your personal information under the following circumstances:
1. After obtaining your explicit consent;
2. Law-based disclosure: We may disclose your personal information publicly under the mandatory requirements of laws, legal procedures, lawsuits or government authorities.
(vi) Exceptions are made in cases where prior authorization is obtained when sharing, transferring or publicly disclosing personal information
Under the following circumstances, it is not necessary to obtain your prior authorization to share, transfer or publicly disclose your personal information:
1. Those related to national security and national defense security;
2. Those related to public safety, public health and major public interests;
3. Those related to judicial or administrative law enforcement such as criminal investigation, prosecution, trial and judgment enforcement;
4. It is difficult to obtain your consent in order to safeguard the major legitimate rights and interests such as the life and property of you or other individuals;
5. The personal information disclosed to the public by yourself;
6. Personal information collected from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels.

IV. How Do We Protect Your Personal Information
1. We have taken the industry-standard security measures to protect the personal information provided from unauthorized access, public disclosure, use, modification, damage or loss of data. We will take all reasonable and feasible measures to protect your personal information. For example, we will use encryption technology to ensure the confidentiality of data; use a trusted protection mechanism to prevent malicious attacks on data; deploy access control mechanisms to ensure that only authorized personnel can access personal information; and hold security and privacy protection training courses to enhance employee' awareness of the importance of protecting personal information.
2. We will take reasonable and practicable measures to avoid collecting irrelevant personal information, and will only retain your personal information for the period required to achieve the purposes stated in the cost policy or for the statutory period, unless the retention period needs to be extended or permitted by law.
3. We only allow employees and partners who need to know the information to access personal information, and set up strict access rights control, rights approval process and monitoring mechanism for this purpose. We also require all personnel who may have access to your personal information to fulfill the corresponding confidentiality obligations. If a third party fails to fulfill the confidentiality obligation, it may be investigated for legal responsibility and the cooperation will be terminated.
4. In case of any personal information security incident, according to the requirements of laws and regulations, we will inform you of the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, the suggestions that you can prevent and reduce risks independently, and the remedial measures for you. We will inform you of the incident by email or calling. When it is difficult to inform the subjects of personal information one by one, we will issue announcements in a reasonable and effective manner. We will also report the handling of personal information security incidents according to the requirements of the regulatory authorities.

V. How Do You Manage Your Personal Information
We attach great importance to management of your personal information and protect your right to access, correct, withdraw consent and delete your personal information. Your rights include:
(i) Access and correct your personal information
Unless otherwise provided by laws and regulations, you can access and correct the personal information provided during the use of SEM product and its online services. If you cannot achieve the purpose or have any questions, please contact us to get the solutions.
(ii) Delete your personal information
You can request us to delete personal information in the following situations:
1. If our behaviors of handling personal information violate laws and regulations;
2. If we collect and use your personal information without your consent;
3. If our behaviors of handling personal information violate the agreement signed with you;
4. If we terminate service and operation.
If we decide to respond to your deletion request, we will also notify the third party who obtained your personal information from us to delete the information in time, unless otherwise provided by laws and regulations, or these third parties have obtained your authorization. When you delete information from our service, we may not immediately delete the information in the backup system, but we will delete the information when it is backed up and updated.
(iii) Change the scope of your authorization
Each business function needs some basic personal information before it is completed. In addition, if you hope to revoke your consent to our additional collection, use and disclosure of other personal information, you can contact us to withdraw your authorized consent.
When you withdraw your consent, we will not process the corresponding personal information anymore. However, your decision to withdraw the consent will not affect the previous personal information processing based on the authorization.
(iv) Respond to your requests
For security, you may be required to provide a written request or other means to prove your identity. We may require you to verify your identity before processing the request.
In principle, for your reasonable request, we do not charge fees, but for the repeated requests beyond reasonable limits, we will charge a certain cost as appropriate. We may reject requests that are unwarranted, require too many technical means (for example, need to develop new systems or fundamentally change existing practices), put the legitimate rights and interests of others at risk or are very impractical.
Under the following circumstances, according to the requirements of laws and regulations, we will not be able to respond to your request:
1. Those related to the performance of obligations stipulated by laws and regulations by personal information controllers;
2. Those are directly related to national security and national defense security;
3. Those are directly related to public safety, public health and major public interests;
4. Those are directly related to criminal investigation, prosecution, trial and execution of judgments;
5. The personal information controller has sufficient evidence to indicate that the personal information subject has subjective malice or abuse of rights;
6. It is difficult to obtain your consent in order to safeguard the major legitimate rights and interests such as the life and property of personal information subjects or other individuals;
7. Responding to the request of the personal information subject will cause serious damage to the legitimate rights and interests of the personal information subject or other individuals and organizations;
8. Those involve in trade secrets.

VI. How Do We Handle the Personal Information of Minors
(i) Our products, websites and online services are only used by adults. Minors are not allowed to create their own user accounts without the consent of their parents or guardians. If you are a minor, it is recommended that you ask your parents or guardians to read this Privacy Policy carefully and use our services or provide us with information with the consent of your parents or guardians.
(ii) In the case of collecting personal information of minors with the consent of parents or guardians to use our products or services, we will only use, share, transfer or disclose this information when permitted by laws and regulations, explicitly agreed by parents or guardians or necessary for the protection of minors.
(iii) If we find that we have collected personal information of minors without prior verifiable service consent, we will try to delete the relevant data as soon as possible.