Page loading,Please wait...

Privacy Policy

[Special Note] Please read the V-Next (Overseas Version) Privacy Policy (especially the part underlined or in bold) carefully and make sure you understand our rules for processing your personal information. If you have any doubts during reading, you can contact us through the contact information provided by us in Part IX "How to contact us". If you do not agree to any terms in this Privacy Policy, you should stop your visit immediately.

Updated on: June 8, 2023

Effective on: June 9, 2023

V-Next overseas website (domain name: www.v-next.cn, hereinafter referred to as “V-Next” or “platform”) is an Internet-based information service platform operated by Shenzhen Securities Information Co., Ltd. ("we", “us” or "company"). Through V-Next, you (or "user") can publish or search for investment and financing project information, or view other market cooperation information. Thank you very much for your trust in us. This Privacy Policy is intended to explain to you how we collect, use, store, share and transfer your personal information when using V-Next, as well as the ways we provide you to access, update, delete and protect such information. Please read carefully and understand this Privacy Policy before using V-Next, and use our products or services after confirming your full understanding and consent. By starting using V-Next, you confirm that you have fully understood and agreed to this Policy and agreed that we collect, use, store and share your relevant information in accordance with this Privacy Policy. If you have any questions, comments or suggestions about the contents of this Policy, please do not hesitate to contact us through the contact information provided in this Privacy Policy.

This Policy will help you understand the following:

I. How we collect and use your personal information

II. How we share, transfer and publicly disclose your personal information

III. How we protect and preserve your personal information

IV. How we protect the personal information of minors

V. How we use Cookies and similar technologies

VI. How you manage your personal information

VII. How your personal information moves around the world

VIII. Privacy Policy update and notification

IX. How to contact us

X. Appendix: Definitions of important terms

I. How we collect and use your personal information

We collect and use your personal information based on the principles of legality, legitimacy and necessity.

Specifically, in order to implement basic service functions, you should provide us with or allow us to collect and use your personal information according to our functional requirements; in addition to the basic service functions, you can decide whether to provide us with relevant personal information to use the extended service functions provided by us. If you provide other people's personal information, please ensure that you have obtained their authorization, and we reserve the right to check the legal source of such personal information at any time. For ease of understanding, the service functions we provide and the personal information we need will be described in this Part.

1. Basic service functions

You need to provide us with personal information for us to implement the basic service functions of V-Next. The information required to implement the basic service functions is necessary personal information. If you refuse to provide such necessary personal information, we will not be able to provide you with the basic service functions and corresponding services; with regard to any information that is not necessary to implement the basic service functions, we will inform you of the purpose of our use and process such information based on your authorization. Your refusal to provide such unnecessary personal information will not affect your use of our basic service functions.

V-Next is designed for three types of users: individual or institutional investors (hereinafter referred to as "investors"), partners, and enterprises with financing needs (hereinafter referred to as "project providers"), and its basic service functions are to provide investment and financing project information services so as to bring investors and project providers together to reach investment and financing project intentions.

1.1 Registration and login

You can browse the public information displayed on V-Next without any registration, but we only provide complete information services for registered and authenticated users.

For project provider users, when you register a V-Next account, we will collect the e-mail and account password information about your authorized registrant, and we will also verify the authenticity of the account by sending an e-mail verification code. The purpose of collecting such necessary information is to help you complete the registration of V-Next account, protect the security of your account and allow us and investors to contact you. If you do not register and complete the identity authentication in clause 1.2 below, you will not be able to publish any project information and use other services and functions of the platform.

For investor users, when you register a V-Next account, we will collect your mobile phone number or e-mail, account password information, and we will also verify the authenticity of the user's identity by sending SMS or e-mail verification code. The purpose of collecting such necessary information is to help you complete the registration of V-Next account, protect the security of your account and allow us and the financing party to contact you. If you do not register and complete the identity authentication in clause 1.2 below, you will not be able to view the complete information about the project and other functions of the platform.

For partner users, when you register a V-Next account, we will collect your e-mail and account password information, and we will also verify the authenticity of the account by sending an e-mail verification code. The purpose of collecting such necessary information is to help you complete the registration of V-Next account, protect the security of your account and allow us and investors to contact you. If you do not register and complete the identity authentication in clause 1.2 below, you will not be able to publish any project information and use other services and functions of the platform.

1.2 Identity authentication

In order to meet the requirements of relevant laws, regulations and policies and relevant competent departments and ensure the authenticity and accuracy of the information on subsequent investment and financing projects, users need to complete identity authentication to continue to use and enjoy investment and financing information services. For investors, we need you to complete identity authentication by providing the investor's avatar, business card, name, e-mail address, mobile phone number, your organization and position, your organization’s location and type, and your investment preference information,so as to view the complete information on the projects. For project provider, we need you to complete the identity authentication by providing the basic information on your project, company information, core team, financing needs, financial indicators, equity structure and relevant information so as to release the project information. If you do not provide the above necessary information, we will not be able to provide you with relevant functions and services. For partners, we need you to complete identity authentication by providing company pictures, organization name, e-mail address, contact person and contact person’s position, your location and organization profile so as to release project information.

1.3 Personal information collected automatically to ensure operation safety

In order to offer V-Next products or services, improve the security of the system when you use our products and/or services, prevent phishing website scam and protect account security more accurately, as well as for the purpose of fulfilling our obligations as network security operator, we may automatically collect information through Cookies or other means. We will also collect such information to analyze the problems of V-Next system, count the traffic and identify possible risks and prevent cheating. Such personal information includes:

(1) Software information, including the configuration information provided by your device, web browser, telecom operator or other programs used to access our services, and your IP address;

(2) Log information: when you use our services, we may automatically collect your detailed usage of our services and save them as relevant network logs, including your login account, IP address, browser type, telecom operator, network environment, language used, registration time, last login time, last modification time, network browsing and operation records;

(3) The information (metadata) contained in the content you upload through our service, including the date, time or place of uploading the picture.

Please note that device information and log information alone cannot identify a specific natural person. If we combine this kind of non-personal information with other information to identify the identity of a specific natural person, or combine such information with personal information for use, during the period of combined use, this kind of non-personal information will be regarded as personal information. Unless authorized by you or otherwise specified in laws and regulations, we will anonymize and de-identify this kind of personal information. During the period of combined use, such information will be treated and protected as your personal information in accordance with this Policy.

1.4 Send system messages

During your use of V-Next service, we will use your account information, mobile phone number, e-mail address and device information, and send you important message notices related to our products and/or services by telephone, e-mail, SMS and Wechat service number when necessary, including:

(1) Announcement of website upgrade or maintenance;

(2) Announcement of changes in the User Agreement or the Privacy Policy;

(3) Announcement on the establishment, update or cancellation of service rules/systems;

(4) Other messages related to system services, including system login welcome message; new service function notification; transaction notice; notification that a service will be suspended due to system maintenance.

Unless you close your account, you cannot cancel the acceptance of these service-related, no-promotional system messages.

1.5 Improve our products/services and conduct internal audit, data analysis and research

We use the information collected to provide internal audit, data analysis and research in order to improve the products and services provided by us and our affiliates and partners, and carry out necessary business operations, including operating products or providing services, evaluating, maintaining and improving the performance of products and services, developing new products and services and providing customer support.

In order to improve the products and services provide by us and our affiliates and partners, we may also make statistics and analysis of usage of products. Moreover, we may share these statistics with the public to show the overall use trend of our services, but these statistics will not include any of your identification information.

We will use the information collected for big data analysis, including that we use the information collected for analysis to form statistical products that do not contain any personal information. We may disclose and share with our partners the big data analysis information that contains no identification content after statistical processing.

2. Extend service functions

In addition to the basic service functions, you can choose to provide us with some personal information for us to implement extended service functions of V-Next, or help us use this information to improve service quality and develop new products or services. Your refusal to provide these extended service function information will not affect your use of our basic service functions.

We will process such personal information based on your authorization and for the purpose of implementing the extended service functions you choose. If you refuse to provide it, we will not be able to provide you with the extended service functions and corresponding services; for non-essential personal information required under the extended service functions, we will process such information based on your authorization. Your refusal to provide such non-essential information will not affect your use of our extended service functions.

The extended service functions of V-Next include:

2.1 Financing matchmaking services

The financing matchmaking services will be provided in the form of roadshow and intelligent matching. In providing these services, we need your registration and authentication information. The financing need information you are required to supplement may involve the personal information about your shareholders or founders, which depends on the information displayed and collected on the page. Such personal information is essential to providing you with financing matchmaking services. If you refuse to provide such information, you will not be able to use such service on V-Next.

2.2 Customer service or other user response functions

When you contact our customer service or use other user response functions (including personal information protection complaints or suggestions, other complaints and needs, and follow-up of third-party enterprise service needs), we may require you to provide necessary personal information to match and verify your user identity, so as to ensure the security of your account and the system. We may also store your contact information (other contact information you use when contacting us or you offer to us), your communication/phone call records and contents with us, and other necessary information related to your needs, so as to contact you or help you solve problems, or record the solutions and results of relevant problems.

2.3 Send commercial messages

During your use of V-Next service, we will use your account information, mobile phone number and e-mail address to send you promotional information related to our products and/or services and our affiliates in the form of private message push, telephone, e-mail and SMS when necessary. If you do not want to receive such information, you can contact us through the contact information in Part IX or reject it by unsubscribing/disabling push service.

2.4 Operational activities

When you participate in the operation activities organized or jointly organized by V-Next from time to time, you may voluntarily provide your name, phone number, contact address or other personal information upon request. For specific activities involving cash withdrawal, prize cashing and tax declaration purposes, we may also need your ID card information. The ID card information is your sensitive personal information, and we will obtain your separate consent during processing.

3. Personal information we obtain indirectly

3.1 The personal information on the shareholders, legal representatives or contact person of the registered enterprise provided by you may not be the personal information of the actual holder of the registered account. You should ensure that you have obtained the consent of the corresponding individual to provide it to us.

3.2 If you are a partner and are likely to provide and publish the basic information about the project provider seeking capital (whether registered separately on the platform or not), including the personal information about the shareholders, legal representatives or contact person. You should ensure that you have obtained the consent of the corresponding individual or have been authorized by the enterprise on behalf of the individual to provide it to us.

3.3 When a specific service is provided to you jointly by V-Next and its affiliates or partners, you agree that according to our actual business and cooperation needs. we can receive, use, summarize and analyze the personal information from affiliates or partners formed in the process of service.

II. How we share, transfer and publicly disclose your personal information

1. Sharing of personal information

1.1 We will not share your personal information with any company, organization or individual other than V-Next’s affiliates, except for the following circumstances:

(1) With your explicit consent or authorization in advance;

(2) Pursuant to the requirements of applicable laws and regulations or legal procedures, or the mandatory administrative or judicial requirements;

(3) For the purposes of protecting V-Next, its affiliates or partners, you or other V-Next users or the public interests, property or safety from damage to the extent permitted by laws and regulations;

(4) For the purpose of handling your disputes with others at your request;

(5) For academic research purpose;

(6) Based on the social and public interests in line with laws and regulations.

1.2 We may share your personal information with our affiliates. However, we will only share necessary personal information and are bound by the purposes stated in this Privacy Policy. If our affiliates want to change the purpose of processing personal information, they will ask for your authorization again.

1.3 We may share some of your personal information with partners or other third parties to provide better customer service or user experience. This includes providing account information, name and mobile phone number information to ensure the smooth completion of the services provided to you. However, we will only share your personal information for lawful, legitimate, necessary, specific and clear purposes, and only share the personal information necessary to provide services. Our partners have no right to use the shared personal information for any other purpose. Our partners include the following types:

(1) Software/hardware/system service providers. We will send the data that may contain your personal information to the third-party service providers or partners 他that support our service. These institutions accept our appointment under a cooperation agreement to provide or jointly decide with us to provide software, hardware or system service support, including the provision of technical infrastructure services (including cloud storage and cloud services), statistical analysis services and customer service systems.

(2) Institutional partners such as parks and trading centers: we will sign cooperation agreements with such institutional partners as parks and trading centers, and the partners will recommend enterprises in their parks or their member enterprises to become the registered and authenticated project providers of V-Next. In order to facilitate the matching of investment and financing information, we will provide the registration and authentication information of individual/institutional investors to such partners, which may contain the personal information of investors.

(3) The partner appointing us to make promotion. Sometimes we will provide commercial information promotion services to users of our products and/or services on behalf of other enterprises. We may use the indirect user portrait formed by your personal information and your non-personal information collection to share with the partners who apppoint us to make promotion ("the client"), but we will only provide these clients with information on the coverage and effectiveness of promotion, not your personal identity information, or we summarize such information so that it does not permit identification of specific individuals. For example, we can tell the client how many people have read their promotion information or purchased the client's goods after viewing such information, or provide them with unidentified statistical information to help them know their audience or customers.

2. Transfer of personal information

We will not transfer your personal information to any firm, organization or individual, except in the following circumstances:

(1) With your explicit consent or authorization in advance;

(2) Pursuant to the requirements of applicable laws and regulations or legal procedures, or the mandatory administrative or judicial requirements;

(3) In the case of merger, acquisition, asset transfer or similar transactions, if personal information transfer is involved, we will require the firm or organization holding your personal information to continue to be bound by this Privacy Policy; otherwise, we will require the firm or organization to seek your authorization again.

3. Public disclosure of information

We will only publicly disclose your personal information under the following circumstances and provided that safety precautions are taken in line with industry standards:

(1) According to your needs, disclose the personal information specified by you in the way you explicitly agree;

(2) If your personal information must be provided according to the requirements of laws and regulations, mandatory administrative law enforcement or judicial requirements, we may publicly disclose such type of your personal information and in such way as required.

III. How we protect and preserve your personal information

1. Our technologies and measures to protect your personal information

We attach great importance to personal information security and take all reasonable and feasible measures to protect your personal information. We have corresponding data security capabilities, have taken personal information security protection measures, and can publicly disclose the compliance certificates related to data security and personal information protection when necessary.

1.1 Technical measures for data security

We will adopt security protection measures in line with industry standards, including establishing reasonable systems, practices and security technologies to prevent unauthorized access, use and modification of your personal information and avoid data damage or loss.

Our network service adopts the encryption technology of transport layer security protocol and provides browsing service through HTTPS to ensure the security of user data in the transmission process.

We adopt encryption technology to encrypt and save users' personal information, and avoid illegal use of data through strict data access control.

When using personal information, including personal information display and personal information correlated calculation, we will use desensitization technology to enhance the security of personal information in use.

1.2 Other security measures we take to protect personal information

We manage and standardize the storage and use of personal information by establishing data classification and grading system, data security management practices and data security development specifications.

We have comprehensive security control over data through confidentiality agreements with information contact, monitoring and the audit mechanism.

We have established a personal information protection organization to promote and ensure the security of personal information.

Enhancing safety awareness. We will also hold security and privacy protection training courses to enhance employees' awareness of the importance of protecting personal information.

1.3 V-Next only allows the employees and partners of V-Next and its affiliated companies who need to know personal information to access such information, and has set up a strict access control and monitoring mechanism for this purpose. At the same time, we require all personnel who may have access to your personal information to fulfil the corresponding confidentiality obligations. If they fail to fulfil these obligations, they may be investigated for legal liability or their cooperation relationship with V-Next will be suspended.

1.4 Handling of safety incidents

Upon the occurence of a personal information security incident, we will, in accordance with the requirements of laws and regulations, timely inform you of the basic situation and possible impact of the security incident, the measures we have taken or will take, the suggestions for you to independently prevent and reduce risks, and the remedial measures for you. At the same time, we will timely inform you of the relevant information about the event by mail, letter, telephone and push notice. If it is difficult to inform all the individuals involved one by one, we will publish an announcement in a reasonable and effective manner. In addition, we will also actively report our handling of the personal information security incident to the regulatory authorities as required.

Please understand that even though we have tried our best to strengthen security measures, due to the limitations of technology and risk prevention, we can not always ensure that the information is 100% secure. You need to know that the system and communication network you use to access the services of V-Next may go wrong due to any situation beyond our control.

Please be sure to properly keep your account number, password and other identity elements. When you use the services of V-Next, we will identify your identity through your account, password and other identity elements. Once you leak the above information, you may suffer losses and adverse effects. If you find that your account number, password and/or other identity elements may or have been leaked, please contact us immediately so that we can take corresponding measures in a timely manner to avoid or reduce relevant losses.

1.5 If you have any questions about our personal information protection, you can contact us through the contact information provided in Part IX of this Policy. If you find that your personal information is leaked, especially your account and password, please contact us immediately through the contact information provided in Part IX of this Policy, so that we can take corresponding measures.

2. Saving of your personal information

2.1 All your personal information will be stored within the territories of the People's Republic of China. If we or our service providers/partners need to transmit your personal information overseas in the process of offering services, we will separately obtain your authorization, and require the receiving party to deal with these personal information in accordance with our instructions, this Privacy Policy and requirements of any other relevant confidentiality and security measures.

2.2 We will keep your personal information for the shortest time required by applicable laws and regulations based on its type and purpose in accordance with the relevant provisions of the laws and regulations of the People's Republic of China. The storage period is from the date of collection to the date when the user cancels/deletes all the information in the account and the limitation of action expires, unless laws and regulations require a longer storage period. After the above-mentioned storage period is exceeded, we will delete or anonymize the personal information.

IV. How we protect the personal information of minors

1. V-next attaches great importance to the protection of minors’ personal information. As a platform serving business entities, we do not accept minors’ creating their own user accounts on V-Next.

2. If we find that minor's parents or guardians provide the minors’ information on their initiative in the use of V-Next or services, or we collect minors’ personal information without the prior consent of verifiable parents or legal guardians, we will try to delete the relevant data as soon as possible.

V. How we use Cookies and similar technologies

1. Use of Cookies and similar technologies

1.1 In order to realize the personalized needs of your online experience and make your access experience easier, we will send one or more small data files or similar technical files called Cookies on your computer or mobile device. The Cookies assigned to you are unique and can only be read by the web server that sends Cookies to your domain. We send Cookies to you to simplify the steps of your repeated login, help judge your login status and account or data security.

1.2 We will not use Cookies for any purpose other than those stated in this Privacy Policy. You can manage or delete Cookies according to your preferences. You can also clear all Cookies saved on your computer. Most web browsers will automatically accept Cookies, but you can usually modify the settings of your browser to reject Cookies according to your own needs; in addition, you can also clear all Cookies saved in the software. However, if you do so, you may need to change the user settings each time you visit V-Next, and the corresponding information you recorded before will be deleted, which may have a certain impact on the security of the services you use. To learn more about how to change browser settings, please visit the relevant settings page of the browser you use.

2. DoNotTrack

Many web browsers have DoNotTrack function, which can send DoNotTrack requests to websites. At present, leading Internet standards organizations have not developed relevnat policies on how websites should respond to such requests. However, if your browser has enabled DoNotTrack, we will respect your choice.

VI. How you manage your personal information

You can access and manage your personal information in the following ways. If you are an individual who registers an account on behalf of an enterprise and you cannot directly access your personal information or exercise other personal information management rights, you can contact us through the contact information in Part IX. We will reply to you within 15 working days.

1. Access your personal information

Unless otherwise specified in laws and regulations, you have the right to access your personal information. You can log in to your personal account and click the avatar to access your personal information.

If you cannot access your personal information through the above path, you can contact us at any time through the contact information in Part IX. We will reply to you within 15 working days.

For other personal information generated in the process of your use of our products or services, we will provide it to you in accordance with the relevant arrangements in clause 8 “Respond to your above request” below in this Part.

2. Correct or supplement your personal information

2.1 When you find that your personal information processed by us is wrong, outdated or incomplete, you should modify or update it through the path listed in clause 1 of this Part. If you are unable to update your personal information through the above methods, you can contact us at any time through the contact information in Part IX, and we will feed back on your application within 15 working days after receiving your notice.

2.2 Special note: please check the personal information you provide as to its authenticity, timeliness, completeness and accuracy, otherwise, we will be unable to contact you effectively and provide you with some services.

2.3 If we have reasonable reasons to suspect that the information you provide is wrong, incomplete or untrue, we have the right to ask you or notify you to correct it, or even suspend or terminate some services to you.

2.4 Although we allow you to access and modify your personal information as much as possible, some of your personal information cannot be accessed and changed, which information mainly includes the account information (including account ID and mobile phone number), mainly due to network transaction security concern and for the sake of determining the target audience of network products and services.

3. Delete your personal information

You can delete some of your personal information through the path listed in clause 1 of this Part or ask us to delete some of your personal information through the contact information in Part IX and to the extent permitted by laws, regulations and normative documents, we will delete your personal information in a time manner.

If we decide to respond to your deletion request, we will also, as far as possible, notify those who obtain your personal information from us and require them to delete your personal information in a time manner, unless otherwise specified in laws and regulations or they have obtained your seperate authorization.

When you delete information from our service, we are unlikely to delete the corresponding information from the backup system immediately, but will delete it when the backup is updated.

4. Change the scope of your authorization

You can change the scope of authorization by changing the device or browser function setting options, or contacting customer service.

In particular, if you don't want to accept the commercial promotion information we send you, you can cancel the push by unsubscribing by the means explictly told you in the commercial promotion website private message, e-mail or SMS.

When you withdraw your consent, we will not continue to collect and use the corresponding personal information. However, your decision to withdraw your consent will not affect the previous processing of personal information based on your authorization.

5. Personal information owner cancels account

You can contact us through the contact information in Part IX to submit the account cancellation application. Once the account is cancelled, you will no longer be able to use or retrieve any content or information you add or link in the cancelled V-Next product (even if you re-register or use V-Next product with the same mobile phone number or your name), including but not limited to your personal data and information. After your account is cancelled, we will stop providing you with all or part of the services and delete or anonymize your personal information, unless otherwise specified in laws and regulations.

6. Copy of personal information

You have the right to request through the contact information in Part IX and to the extent permitted by laws and regulations a copy of your personal information collected by us. We will provide you with a copy of your personal information as long as it meets the requirements of laws and regulations and is technically feasible.

7. Control automatic decision of information system

In some service functions, we may make decisions based on non-manual automatic decision-making mechanisms such as information systems and algorithms. If these decisions significantly affect your personal legitimate rights and interests, you have the right to ask for our explanation and reject our decisions made merely through automated decision-making, and we will also provide appropriate remedies.

8. Respond to your above request

For the sake of security, you may be required to provide a written request or otherwise prove your identity. We may ask you to verify your identity before processing your request.

We will reply within 15 working days. If you are not satisfied, you can also file a complaint through the contact information in Part IX.

In principle, we will not charge for your reasonable request, but we will charge a certain cost for repeated requests that exceed the reasonable limit. We may refuse any requests that are unreasonably repeated and require too many technical means.

Please be informed that we may not respond to your request (depending on circumstances) under the following cases (including but not limited to):

1) Related to the personal information controller's performance of obligations under laws and regulations;

2) Directly related to national security or national defense security;

3) Directly related to public safety, public health or major public interests;

4) Directly related to criminal investigation, prosecution, trial and execution of judgments;

5) The personal information controller has sufficient evidence to show that the personal information owner has malicious intent or abuses its rights;

6) For the purpose of safeguarding the life, property and other major legitimate rights and interests of personal information owners or other individuals, but it is difficult to obtain the required authorization and consent;

7) Responding to the request of the personal information owner will cause serious damage to the legitimate rights and interests of the personal information owner or other individuals or organizations;

8) Involving trade secrets.

VII. How your personal information moves around the world

The personal information collected and generated during our operations in the People's Republic of China is stored within the territories of the People's Republic of China. Without your permission and meeting the relevant national requirements, we will not transmit your personal information across borders.

VIII. Privacy Policy update and notification

8.1 In order to provide you with better services and along with the development of V-Next business, this Privacy Policy will be updated accordingly. However, without your express consent, we will not reduce your rights under this Privacy Policy. We will release the updated version through the relevant pages of V-Next products, and remind you of the update of relevant contents through website announcement or in other appropriate ways before the update takes effect. Please also visit V-Next to keep abreast of the latest Privacy Policy. Your continued use of V-Next products and/or services after we update this Privacy Policy represents your agreement to the updated content of this Privacy Policy and your agreement that we will process your personal information in accordance with this Privacy Policy.

8.2 For material changes, we will also provide more prominent notices (we will explain the specific changes in the Privacy Policy by means including but not limited to e-mail, SMS or special notes on the browsing page).

Material changes as metioned in this Policy include but are not limited to:

(1) Material changes in our service model, including the purpose of processing personal information, the type of personal information processed, and the how personal information is used;

(2) Material changes in our ownership structure and organizational structure, including the change of owner as a result of business adjustment, bankruptcy or merger;

(3) Changes of the main receiving party of the personal information to be shared, transferred or public disclosed;

(4) Material changes in your right to participate in personal information processing and the way in which you exercise it;

(5) Changes of our department responsible for dealing with personal information security issues, the relevant contact information or complaint channels;

(6) The high risk revealed in the personal information security impact assessment report.

IX. How to contact us

We have set up a personal information protection organization. You can contact us in the following ways. We will reply to your request about the rights of personal information owners within 15 working days:

Shenzhen Securities Information Co., Ltd.

Address: [Room 606, Building 203, Hongli West Road, Futian District, Shenzhen, PRC.

Contact Department: [Technology Finance Division]

E-mail: service@cninfo.com.cn

Tel.: 400-0370-012

If you have any questions, comments or suggestions on this Privacy Policy or on any matters related to your personal information, you can also contact us in any of the above ways.

X. Appendix: Definitions of important terms

Personal information: refers to all kinds of information related to identified or identifiable natural persons and recorded electronically or otherwise, excluding anonymized information. Personal information includes the name, date of birth, ID number, personal biometric information, address, communication information, communication records and contents, account password, property information, credit information, movement information, accommodation information, health and physiological information, transaction information, etc.

Personal sensitive information: refers to personal information that, once leaked or illegally used, is likely to infringe upon the human dignity of natural persons or endanger the safety of persons and property, including informaiton on biometrics, religious beliefs, specific identity, medical health, financial accounts, whereabouts and other information, as well as the personal information of minors under the age of 14.

Processing of personal information: including the collection, storage, use, processing, transmission, provision, disclosure and deletion of personal information.

Anonymization: refers to the process in which the personal information is technically processed so that the owner of personal information cannot be identified, and the processed information cannot be restored. The information obtained after anonymization does not belong to personal information.