This policy only applies to the “GOODWILL” products or services of Goodwill(Tanzania)Ceramic Company Limited.Last updated date:2025/1/22,This policy is effective from the date of update.
the “GOODWILL” products or services of Goodwill(Tanzania)Ceramic Company Limited,The mall platform respects and protects the personal privacy of all users using the service. The App will use and disclose your personal information in accordance with the provisions of this Privacy Policy. However, the App will treat such information with a high degree of diligence and prudence. Except as otherwise provided in this Privacy Policy, the App will not disclose such information to the outside world or provide it to third parties without your prior permission. The App will update this Privacy policy from time to time. When you agree to this application Service Usage Agreement, it is deemed that you have agreed to all contents of this Privacy policy. This Privacy Policy is an integral part of this Application Service Usage Agreement.
This policy will help you understand the following:
1, how we collect and use your user information
2, how we use cookies and similar technologies
3, how we share, transfer, and publicly disclose your user information
4, how we protect your user information
5, Your rights
6. How your user information is stored and transferred around the world
7. How to update this policy
8. How to contact us
We understand the importance of user information to you, and will do our best to protect your user information safe and secure. We are committed to maintaining your trust in us and protecting your user information by adhering to the following principles: the principle of consistency of authority and responsibility, the principle of clear purpose, the principle of opt-in consent, the principle of minimum sufficient, the principle of ensuring security, the principle of subject participation, the principle of openness and transparency. At the same time, we promise that we will take appropriate security protection measures to protect your user information according to the industry's mature security standards.
Please read and understand this Privacy Policy carefully before using our products (or services).
How we collect and use your User Information
(a) Information we collect and use when you use our products or services
We will only collect and use your user information for the business functions described in this policy, the purpose of collecting user information is to provide you with products or services, You have the right to choose whether or not to provide this information, but in most cases, if you do not provide it, we may not be able to provide the appropriate service to you, and may not be able to respond to your questions:
1, registration and login account
When you register an account, you at least need to provide us with your account name, password, your own mobile phone number, we will send SMS verification code to verify your identity is valid, through the SIM card information to identify and display the corresponding operator. Your account name is your default nickname, you can change and supplement your nickname, gender, birthday, interests, and your real name authentication related information. However, if you do not provide these supplementary information, you can still use the basic functions of the APP normally.
After you have successfully registered, you will need to provide us with your account information when you log in. If you do not provide such information, you will not be able to log in and purchase additional products, at this time you can use the browsing and search function, we will not collect your personal information.
2, product/service information display and search
In order to let you quickly find the goods you need, We may collect information about the devices you use our products and / or services (including hardware and software characteristics such as device name, device model, MAC address and IMEI, device identification number, mobile application list, operating system and application version, language Settings, resolution, service provider network ID (PL MN), device location information (including your authorized GPS location information and WLAN access point, Bluetooth and base station sensor information), browser type to provide you with the best way to display product information. We will also use your personal information in order to continuously improve and optimize the above functions.
You can also search to find exactly the goods or services you need. We may retain your search content so that you can re-enter it or show you the goods or services associated with your search.
Please note that individual device information, browser type or search keyword information alone cannot individually identify you, is not your personal information, we have the right to use it for any purpose; Only when your individual device information, browser type or search keyword information is used in combination with other information about you and can identify you, during the combined use, we will treat your device information, browser type or search keyword information as your personal information, which will be processed and protected in accordance with this Privacy Policy.
3, In order to provide you with better services, we need to collect your equipment identification, operation logs and other information for analysis and optimization of application performance .
4, During the operation of the application, it is necessary to obtain the permission to read and write the storage of the mobile phone and the permission to use the camera, which is embodied in accessing photos, media content, files on the device, taking photos, modifying the user's profile picture, submitting evaluation, etc.
5, In order to identify your device ID and prevent malicious programs, improve service security, and ensure the quality and efficiency of operations, we will collect your device information (IMEI, MAC, AndroidID, IDFA, OpenUDID, GUID, IMSI, geographical location, etc.), your installed applications or running process information.
6. Functions necessary to ensure the security of transactions
In order to improve the security of your use of the services provided by us and our affiliates and partners, and to protect the personal and property safety of you or other users or the public from infringement, To better prevent phishing websites, fraud, network vulnerabilities, computer viruses, network attacks, network intrusion and other security risks, we will collect the necessary information for the realization of security functions. We may use or integrate your account information, transaction information, equipment information, service log information, as well as the information authorized by our affiliates and partners or shared by you in accordance with the law, to comprehensively determine the transaction risk of your account, conduct identity verification, detect and prevent security incidents, and take necessary recording, audit, analysis and disposal measures.
(1) To ensure the safe operation of the Software and services, We will collect your end user's device attribute information [SDK version, device information, device manufacturer, device model, device language, device name, application list information, hardware serial number, operating system and application version and type, language setting, resolution, IP address, GPS location, system platform, system version, application package name and version, individual device Logo, iOS Advertising Identifier (IDFA), network card (MAC) address, International Mobile Equipment Identification Number (IMEI), Anonymous Device Identifier (OAID), International Mobile User Identification Number (IMSI) base station information, sensor information, Bluetooth information, WIFI status information, CPU information, memory information, device information, battery usage 】, network access mode and type, type, status, network quality data, operation logs and other information.
(2) In order to prevent malicious programs and as necessary for secure operations, we collect installed application information or running process information, the overall operation of the application, usage and frequency, application crashes, overall installation usage, performance data, application sources.
(3) We may use your account information, transaction information, device information, service log information, and information that our affiliates and partners can share when authorized by you or in accordance with the law, to determine account security, conduct identity verification, detect and prevent security incidents.
The above information you provide will continue to authorize us to use the Service during your use. When you stop using the Push Service, we will stop using and delete the above information.
We guarantee that we will de-identify or anonymize the collected user information in accordance with the law. For information that cannot identify a natural person individually or in combination with other information, it does not belong to the legal sense of personal information. If we combine non-personal information with other information to identify you personally, or use it in combination with your personal information, we will treat and protect such information as your personal information in accordance with this Privacy Policy during the period of combined use.
In order to better operate and improve our technology and services, or due to changes in business strategy, when we provide products or services required by the collection, use, processing of user information beyond the above scope, or to use the collected user information for other purposes not specified in this privacy policy, Or when we want to use the information collected for a specific purpose for another purpose, we will notify you within a reasonable period of time after obtaining the user's information or before processing the user's information and obtain your authorized consent.
Please understand that according to laws and regulations and relevant national standards, we do not need to obtain your authorization and consent to collect and use your user information in the following circumstances:
1, directly related to national security and national defense security;
2, directly related to public safety, public health, major public interests;
3, directly related to criminal investigation, prosecution, trial and execution of sentences;
4, for the protection of your or other individuals' life, property and other major legitimate rights and interests, but it is difficult to get my consent;
5, your user information collected is disclosed to the public by you;
6, your user information collected from legally publicly disclosed information, such as legal news reports, government information disclosure channels;
7, according to your requirements to sign or perform the contract necessary;
8, necessary for maintaining the safe and stable operation of the software and related services, such as discovering and handling faults of the software and related services;
9, the personal information controller is a news unit and it is necessary to carry out legitimate news reports;
10. When an academic research institution conducts statistics or academic research in the public interest and provides the results of academic research or descriptions to the outside world, it de-identifies the personal information contained in the results.
11. Other circumstances provided by laws and regulations.
How We use Cookies and similar technologies
(a) Cookies
To ensure the proper functioning of the Website, we store small data files called cookies on your computer or mobile device. Cookies typically contain an identifier, a site name, and some numbers and characters. With the help of cookies, websites are able to store data about your visit preferences.
We do not use cookies for any purpose other than those described in this Policy. You can manage or delete cookies according to your preferences. You can clear all cookies saved on your computer, and most web browsers have a feature to block cookies. However, if you do this, you will need to personally change the user Settings each time you visit our website.
(2) Website beacons and pixel tags
In addition to cookies, we also use other similar technologies such as website beacons and pixel tags on our websites. For example, emails we send to you may contain click urls that link to content on our website.
If you click on the link, we track the click to help us understand your product or service preferences and improve customer service. A website beacon is usually a transparent image embedded in a website or email. With the help of the pixel tags in the email, we can tell if the email has been opened. If you do not want your activity to be tracked in this way, you can unsubscribe from our mailing list at any time.
(3) DoNotTrack
Many web browsers have a DoNotTrack feature that posts DoNotTrack requests to websites. Currently, major Internet standards organizations have not established policies governing how websites should respond to such requests. But if your browser has DoNotTrack enabled, then all of our sites will respect your choice.
How we share, transfer and publicly disclose your user information
(a) Sharing
We will not share your user information with any other company, organization and individual, except for the following circumstances:
1, in the case of obtaining explicit consent to share: With your express consent, we will share your user information with other parties.
2, we may share your user information according to laws and regulations, or according to the mandatory requirements of the competent government departments.
3, Sharing with our affiliates: Your user information may be shared with our affiliates. We will only share necessary user information, subject to the purposes stated in this Privacy Policy. If the affiliated company wants to change the purpose of processing user information, it will seek your authorization consent again.
4, Sharing with Authorized partners: Only for the purposes stated in this policy, some of our services will be provided by authorized partners. We may share some of your user information with our partners in order to provide better customer service and user experience. We will only share your user information for legal, legitimate, necessary, specific and explicit purposes, and will only share user information necessary to provide services. In order to better operate and improve technology and services, you agree that we and authorized partners may use the collected information for other services and purposes in accordance with relevant laws and regulations.
We may entrust partners to provide certain services, and we need to share your user information with partners to ensure the smooth completion of the services provided for you. However, we will only share your personal information for legal, legitimate, necessary, specific and clear purposes, and will only share personal information necessary to provide services. Our partners have no right to use the shared personal information for any other purpose. Our current partners include: suppliers, service providers and other partners. We send information to suppliers, service providers and other partners who support our business, including the provision of basic technical services, the provision of consulting, analysis and other professional services.
In order to enable you to use the above professional services, Our client (GOODWILLAPP) may be embedded in the authorized partner's software tool development kit (" SDK ") or other similar applications.
involved in third party APP SDK situation is as follows:
SDK name:DCloud develops universal tool library, digital paradise
Function types:System management
Third party subject:Daily Interactive Inc
Application time:Provides statistical analysis services to improve performance and user experience by analyzing application startup data and exception error logs
Type of personal information involved:OAID
Third party privacy policy or website link:https://tongji.dcloud.net.cn/
Mobile Security Alliance OAID Privacy Policy:http://www.msa-alliance.cn/
SDK name:MSA Mobile Security Alliance
Function types:System management
Third party subject:Daily Interactive Inc
Application time:Get oaid
Type of personal information involved:equipment information
Third party privacy policy or website link:http://www.msa-alliance.cn/col.jsp?id=122
SDK name:Taobao weex SDK
Function types:Application management
Third party subject:Alibaba Group
Application time:The uni-app base module is integrated by default and is used to render uniapp's nvue page engine
Type of personal information involved:Store personal files
Third party privacy policy or website link:https://weexapp.com/zh/
We will sign strict confidentiality agreements with the companies, organizations and individuals with whom we share user information, requiring them to handle user information in accordance with our instructions, this Privacy Policy, and any other relevant confidentiality and security measures.
(2) Transfer
We will not transfer your user information to any company, organization or individual, except in the following cases:
1, Transfer with express consent: After obtaining your express consent, we will transfer your user information to other parties;
2, in the case of merger, acquisition or bankruptcy liquidation, such as the transfer of user information, we will require the new company and organization holding your user information to continue to be bound by this privacy policy, otherwise we will require the company and organization to ask you for authorization again.
(3) Public disclosure
We will only publicly disclose your user information in the following circumstances:
1, after obtaining your express consent;
2, based on the law of disclosure: in the case of law, legal process, litigation or mandatory requirements of the government authorities, we may publicly disclose your user information.
(4) Exceptions to obtaining prior authorization for the sharing, transfer and public disclosure of information
Please understand that according to laws and regulations and relevant national standards, we do not need to obtain your authorization and consent to share, transfer and publicly disclose your user information under the following circumstances:
1, directly related to national security and national defense security;
2, directly related to public safety, public health, major public interests;
3, directly related to criminal investigation, prosecution, trial and execution of sentences;
4, for the protection of your or other individuals' life, property and other major legitimate rights and interests, but it is difficult to get my consent;
5. Information that you disclose to the public on your own;
6, collected from legally publicly disclosed information, such as legitimate news reports, government information disclosure and other channels.
Four, how we protect your user information
(a) We have used industry-standard security measures to protect the User information you provide against unauthorized access, public disclosure, use, modification, damage or loss of the data. We will take all reasonably practicable measures to protect your user information. For example, the exchange of data between your browser and the Service is protected by SSL encryption; We also provide https secure browsing of the website; We will use encryption technology to ensure the confidentiality of data; We use trusted protection mechanisms to protect data from malicious attacks; We will deploy access control mechanisms to ensure that only authorized personnel have access to user information; And we will conduct security and privacy protection training courses to enhance employees' awareness of the importance of protecting user information.
(b) We will take all reasonably practicable measures to ensure that irrelevant user information is not collected. We will only retain your User information for as long as necessary to achieve the purposes described in the Cost Policy, unless it is necessary to extend the retention period or is permitted by law.
(c) The Internet is not an absolutely secure environment, and E-mail, instant messaging, and communication with other users are not encrypted, we strongly recommend that you do not send user information by such means.
(d) The Internet environment is not 100% secure and we will do our best to ensure the security of any information you send us. Even if we have made great efforts and taken all reasonable and necessary measures, we still may not be able to prevent your user information from being illegally accessed, illegally stolen, illegally tampered with or destroyed, resulting in damage to your legitimate rights and interests. Please understand the above risks of the information network and bear them voluntarily.
(E) In the event of an unfortunate user information security incident, we will inform you in a timely manner in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, the suggestions that you can independently prevent and reduce risks, and the remedial measures for you. We will timely inform you of the relevant information of the event by email, letter, telephone, push notification, etc. When it is difficult to inform the user information subject one by one, we will take a reasonable and effective way to release the announcement. At the same time, we will also take the initiative to report the disposal of user information security incidents in accordance with the requirements of regulatory authorities.
Five, your rights
In accordance with the relevant laws, regulations and standards of China, as well as the common practices of other countries and regions, we guarantee that you exercise the following rights to your user information:
(a) Access to your user information
You have the right to access your user information, except for the exceptions provided by laws and regulations. If you want to exercise the right to access your data, you can do so by yourself: click "My" in the bottom menu bar of the app to switch to the "My" page, and then click the avatar/nickname to enter the personal information page and view your personal information.
If you are unable to access such user information through the above links, you may at any time send an email to goodwillceramics.tz@gmail.com. We will respond to your request for access within 15 days.
For other user information generated by you in the process of using our products or services, as long as we do not need to invest too much, we will provide you. If you would like to exercise your data access rights, please send an email to goodwillceramics.tz@gmail.com.
(2) Correct your user information
When you find that there is an error in the user information we process about you, you have the right to ask us to make a correction. You can request correction by using the methods listed in "(a) Access to your User Information". If you are unable to correct this user information via the above link, you may at any time send an email to goodwillceramics.tz@gmail.com. We will respond to your request for correction within 15 days.
(3) Delete your user information
In the following circumstances, you can make a request to us to delete user information:
1, if we process user information in violation of laws and regulations;
2, if we collect and use your user information without your consent;
3, if we process user information in violation of the agreement with you;
4, if you no longer use our products or services, or you cancel the account;
5, if we no longer provide you with products or services.
We will evaluate your request for removal and if it meets the requirements, we will take appropriate steps to deal with it. When you make a deletion request to us, we may ask you to verify your identity in order to protect the security of your account. When you delete information from our services, because of applicable laws and security technologies, we may not immediately delete the corresponding information from the backup system, we will securely store your information until the backup can be erased or anonymized.
(4) Change the scope of your authorized consent
Each business function requires some basic user information to be completed (see "Part I" of this Policy). For the collection and use of user information, you can give or withdraw your authorized consent at any time. You can do this yourself by opening the App landing page and unchecking Agree to the Privacy Policy and Service Agreement.
After you withdraw your consent, we will no longer process the corresponding user information. At the same time, please note that your withdrawal of authorization consent may lead to certain consequences, such as we may not be able to continue to provide you with corresponding services or specific functions, but your decision to withdraw consent will not affect the user information processing previously carried out based on your authorization.
(5) Constraint information system automatic decision-making
In some business functions, we may make decisions based solely on non-human automatic decision mechanisms, including information systems, algorithms, etc. If these decisions significantly affect your legitimate rights and interests, you have the right to ask us for an explanation and we will provide appropriate remedies.
(6) unsubscribe
do you have the right to cancel GOODWILL account. We provide you with the way to cancel the account, you can through the APP information interface - my & Help Center - Frequently Asked Questions - Click on "How do I log out?" Get customer service contact information or call customer service +255 748-569-999 to make a request. You can also apply to cancel your account by sending an email to goodwillceramics.tz@gmail.com or any other method we publish. After you cancel your account, we will stop providing you with products and/or services, and you will no longer be able to log in and use our products and services with this account; And the content, information, data, records, etc. under the account will be deleted or anonymized (except as otherwise provided by laws and regulations or required by regulatory authorities, such as according to the provisions of the People's Republic of China Network Security Law, your network operation logs will be retained for at least six months);GOODWILL The account cannot be restored after logout.
If you decide to cancel your account after careful consideration, you can submit a cancellation application to us.
We will respond to you as soon as we receive your deregistration request and within 15 working days after verifying your user identity. If you have any questions about the disposal of your personal information, you can communicate with us through the contact information published in Article 8 "Contact Us" of this Privacy Policy.
(7) response to your request above
& have spent
For security purposes, you may need to provide a written request or otherwise prove your identity. We may ask you to verify your identity before processing your request.
For your reasonable request, we do not charge fees in principle, but for repeated requests that exceed reasonable limits, we will charge a certain cost fee depending on the situation. We may reject requests that are unnecessarily repetitive, require too much technology (for example, the development of new systems or fundamental changes to existing practices), pose a risk to the legitimate interests of others, or are highly impractical. Please also understand that due to security considerations, requirements of relevant laws and regulations or technical limitations, we may not be able to respond to some of your requests, such as the following:
1, related to the performance of the user information controller's obligations under laws and regulations;
2, directly related to national security, national defense security;
3, directly related to public safety, public health, major public interests;
4, directly related to criminal investigation, prosecution, trial and enforcement of judgments;
5, the user information controller has sufficient evidence that the user information subject exists subjective malicious intent or abuse of rights;
6, in order to protect the life, property and other major legitimate rights and interests of the user's information subject or other individuals, but it is difficult to get my consent;
7. Responding to the request of the user information subject will cause serious damage to the legitimate rights and interests of the user information subject or other individuals and organizations;
8, involving trade secrets.
6. How your user information is stored and transferred around the world
In principle, the user information we collect and generate in the People's Republic of China will be stored in the People's Republic of China. We will only retain your user information for the period necessary for the purposes and uses described in this Policy and for the shortest period stipulated by laws and regulations, beyond the above retention period, we will delete your user information or anonymize it according to the requirements of applicable laws and regulations. We may retain the relevant data for a longer period of time unless otherwise required by law or regulations, or for purposes of public interest, scientific and historical research, etc., or with your consent.
Because we provide products or services through resources and servers around the world, this means that, with your authorized consent, your user information may be transferred to, or accessed from, jurisdictions outside the country in which you use the products or Services.
Such jurisdictions may have different data protection laws or even no relevant laws. In such cases, we will ensure that your user information is adequately and equally protected within the PRC. For example, we may ask for your consent to the cross-border transfer of user information or to implement security measures such as data de-identification prior to cross-border data transfers.
Seven, how to update this policy
Our Privacy Policy is subject to change. We will not reduce your rights under this Privacy Policy without your express consent. We will post any changes we make to this policy on this page.
We also provide more prominent notice for significant changes. Significant changes referred to in this Policy include, but are not limited to:
1, our service model has changed significantly. Such as the purpose of processing user information, the type of user information processed, the use of user information, etc.;
2, we have made major changes in the ownership structure, organizational structure, etc. Such as business adjustment, bankruptcy merger and acquisition caused by the owner change;
3, the main object of user information sharing, transfer or public disclosure has changed;
4, your rights to participate in the processing of user information and the way they are exercised have changed significantly;
5, we are responsible for handling the user information security department, contact information and complaint channels change;
6, the user information security impact assessment report indicates that there is a high risk.
We will also archive older versions of this policy for your review.
If you have any questions, comments or suggestions about this Privacy Policy, contact us through the following ways:
company name: Goodwill(Tanzania)Ceramic Company Limited
registered address: Nyerere Road, Sido Dar Es Salaam
office address: Nyerere Road, Sido Dar Es Salaam
email: goodwillceramics.tz@gmail.com
phone: +255 748-569-999
Responsible person for information protection: Viking Ren
Under normal circumstances, we will reply within fifteen working days.