Effective Date: October 9, 2023
Special Note
1. Welcome to use the services provided by T-Key (hereinafter referred to as "T-Key" or "Key") under Beijing U-Tiger Network Technology Co.,Ltd. (hereinafter referred to as "Tiger" or "we"). We are fully aware of the importance of personal information to users (hereinafter referred to as "users" or "you") and will take appropriate security protection measures to protect the security of your personal information to the best of one's ability in accordance with the requirements of laws and regulations. In view of this, we have developed this "Privacy Policy" (hereinafter referred to as "this Policy").
2. This Policy is used to help you fully understand how we collect, use, store, share, transfer and protect your personal information and how you can exercise your rights during your use of our services, so that you can make appropriate choice better. This Policy is closely related to your use of our services. Before using our services, please read this Policy carefully, especially the terms highlighted in bold/bold underline, and you shall use the related services after you have confirmed that you fully understand and agree to this Policy. Once you start to use our services, it means that you have fully understood and agreed to this Policy and agree that we will process your relevant personal information in accordance with the terms of this Policy. If you have any objection to this Policy, please refuse to use the service.
3. To provide you with a more intuitive and concise understanding of how we process your personal information, please click Summary of Privacy Policy and Personal Information Collection List for details.
4. To ensure normal operation of the service, we may access third-party software tools. Please click Third-party SDK List for details.
5. Unless otherwise specified by the law applicable in your area, "personal information" under this Policy refers to: various information related to identified or identifiable natural persons recorded in electronic or by other means, excluding information after anonymization.
Table of contents
I. How we collect and use your personal information
II. How we store your personal information
III. How to exercise your rights
IV. How we share, transfer, and publicly disclose your personal information
V. How we protect your personal information
VI. Our special protection for minors
VII. How personal information is transferred globally
VIII. How this Policy is updated
IX. How to contact us
I. How we collect and use your personal information
A. Personal Information we collect and use
1. When you sign the agreement, we will collect your IP address to determine the content of the service provided to you and the agreement you need to sign.
2. When you activate the T-Key, 老虎国际 APP will share your encrypted uuid, desensitized mobile phone number or email address to the T-Key to generate a dynamic password in the T-Key. At the same time, in order to distinguish your T-Key, we may display the desensitized mobile phone number or email address on the T-Key interface.
B. Permissions you need to enable
1. You can activate the T-Key by enabling the camera permission and scanning the QR code; you can also activate the T-Key by enabling the photo album permission and reading the QR code picture.
2. You can save the dynamic password by enabling the clipboard permission.
3. You can view the help center and related agreements by enabling network permission.
II. How we store your personal information
A. In accordance with relevant laws and regulations, we will store your personal information collected within the territory of the People's Republic of China (hereinafter referred to as "the PRC"), and keep such personal information strictly confidential. If it is necessary to transfer the relevant personal information collected in the PRC to overseas institutions in some cases, we will comply with laws, administrative regulations and regulations of relevant regulatory authorities, and require overseas institutions to keep your personal information confidential through effective measures such as signing agreements and on-site inspections.
B. In general, we will only retain your personal information for the shortest time necessary to achieve the purpose. However, in the following cases, we may change the storage time of personal information to meet legal requirements:
1. To comply with applicable laws and regulations, etc.
2. To comply with court judgments, decisions, or other legal procedures.
3. To comply with the requirements of relevant government authorities or legally authorized organizations.
4. For purposes that are reasonable and necessary to enforce the relevant service agreement or this Policy, to protect the public interest, to protect the personal and property safety or other legitimate rights and interests of our customers, us or our affiliates, other users or employees.
III. How to exercise your rights
During your use of the service, to make it easier for you to exercise your rights, we provide you with corresponding operation settings, you can refer to the following guidelines to operate.
A. Set a gesture password
You can change your gesture password through: T-Key - Settings - Modify Gesture Password. Your gesture password is recognized by your device and stored encrypted on your local device. We do not collect, store, or upload your gesture password to the server.
B. System permission management
You can view, enable, or disable camera, photo album, clipboard, network and other device permissions through: T-Key - Settings - System Permission Management.
C. View related agreements
You can view the Summary of Privacy Policy, Personal Information Collection List and Third-Party SDK List through: T-Key - Settings - About T-Key.
IV. How we share, transfer, and publicly disclose your personal information
A. Share
We do not share your personal information with companies, organizations, and individuals outside of us, except in the following cases, namely:
1. Sharing in legal situations: We may share your personal information externally as required by laws and regulations, to resolve litigation disputes, or as required by administrative and judicial authorities.
2. Sharing with your consent: After obtaining your express consent, we may share your personal information with other parties.
3. To ensure the proper functioning of the service, after obtaining your express consent, we have embedded the use of a third-party software tool development kit (SDK). For information on the third-party SDK, please refer to Third-Party SDK List.
B. Transfer
We will not transfer your personal information to third parties except in the following cases, namely:
1. The relevant operations have obtained your express consent in advance.
2. When it comes to merger, acquisition or bankruptcy liquidation, if it involves the transfer of personal information, we will require the new company or organization that holds your personal information to continue to be bound by this Policy, otherwise we will require that company or organization to seek your authorized consent again.
3. Any other transfer of your personal information that is required by laws or regulations or at the request of the competent authorities.
C. Public disclosure
We will not disclose your personal information publicly except in the following cases, namely:
1. Obtaining your express consent.
2. Applying relevant laws and regulations or implementing court judgments, decisions or other legal procedures, or complying with legal and mandatory requirements of competent authorities (including other legally authorized organizations).
3. For purposes that are reasonable and necessary to enforce the relevant service agreement or this Policy, to protect the public interest, to protect the personal and property safety or other legitimate rights and interests of our customers, us or our affiliates, other users or employees.
V. How we protect your personal information
We have implemented reasonable security measures to safeguard the confidentiality, security, and integrity of your personal information and to prevent unauthorized access and use of personal information in violation of this Policy. In order to ensure the security of your personal information, we have established strict personal information security regulations and procedures and set up a dedicated personal information security team to enforce the above measures within the company strictly.
VI. Our special protection for minors
Minors should not access our services, and we will not collect personal information of minors; if you think that we may have unknowingly collected the personal information of your children under the age of 18 or guardians, please refer to contact us in section XI of this Policy and we will delete such personal information.
VII. How personal information is transferred globally
In principle, personal information we collected and generated within the PRC will be stored within the PRC, except where cross-border transmission is permitted under the provisions of applicable law. Since we provide products or services through resources and servers located all over the world, this means that, after obtaining your authorization and consent, your personal information may be transferred to the country/region where you use the products or services, or receive information from these jurisdiction access. Such jurisdictions may have different data protection laws or even no relevant laws. In such cases, we will ensure that your personal information is protected in the same way as it is in the PRC. For example, we may request your consent to transfer personal information across borders, or implement security measures such as de-identification of personal information prior to cross-border transfer of personal information.
VIII. How this Policy is updated
We will update this Policy timely in accordance with the requirements of relevant laws and regulations, business changes or other necessary circumstances. Without your express consent, we will not reduce your rights in accordance with this Policy. We will post changes to this Policy on this page and inform you of the modified policy via pop-up prompts or other means that may be appropriate for you to receive notifications. In such cases, by continuing to use our services, you agree to be bound by the modified and updated policy.
XI. How to contact us
A. If you have any enquiries about this Policy or other related matters, please contact us by calling the customer service number [400-603-7555] or sending an email to [service@tigerbrokers.com].
B. We will normally respond to your comments within 15 working days of receipt. If you are not satisfied with our response, especially if you believe that our processing of personal information has harmed your legitimate rights and interests, you may also file a complaint or report to the regulatory authorities such as Cyberspace Administration of China, Ministry of Industry and Information Technology, Public Security and Market Regulation, etc.
C. Our Contact address in China: 18/F, Grandyvic Building, NO.1 building, NO. 16 Tai Yang Gong Middle Road, Chaoyang District, Beijing, China.