SCC系统隐私政策

 最新更新日期:2022年11月1日

生效日期:2022年11月1日

本隐私政策(以下简称“本政策”)仅适用于中兴通讯股份有限公司SCC系统(及其接入的所有第三方应用或服务)。如第三方应用或服务有单独的隐私政策,则该应用或服务的隐私政策将优先适用。该应用或服务隐私政策未涵盖的内容,以本隐私政策内容为准。

如果您有任何疑问、意见或建议,请通过以下联系方式与我们联系:

电子邮件:Privacy@zte.com.cn

公司名称:中兴通讯股份有限公司

注册地址:深圳市南山区科技南路55号

中兴通讯深知个人信息对您的重要性,并会尽全力保护您的个人信息安全可靠。我们致力于维持您对我们的信任,恪守以下原则,保护您的个人信息:权责一致原则、目的明确原则选择同意原则、最少够用原则、确保安全原则、主体参与原则、公开透明原则等。同时,中兴通讯承诺,我们将按业界成熟的安全标准,采取适当的安全保护措施来保护您的个人信息。

请在使用我们的产品(或服务)前,仔细阅读并了解本隐私政策。

本政策将帮助您了解以下内容:

一、我们如何收集和使用您的个人信息

二、我们如何使用Cookie和同类技术

三、我们如何共享、转让、公开披露您的个人信息

四、我们如何保护您的个人信息

五、您的权利

六、我们如何处理儿童的个人信息

七、我们如何存储您的个人信息

八、本政策如何更新

九、如何联系我们

 

一、我们如何收集和使用您的个人信息

个人信息是指以电子或者其他方式记录的与已识别或者可识别的自然人有关的各种信息,不包括匿名化处理后的信息。敏感个人信息是指一旦泄露或者非法使用,容易导致自然人的人格尊严受到侵害或者人身、财产安全收到危害的个人信息,包括生物识别、宗教信仰、特定身份、医疗健康、金融账户、行踪轨迹等信息,以及不满一定年龄的未成年人的个人信息。(我们将在本政策中对涉及到的敏感个人信息以粗体进行显著标识)。中兴通讯仅会出于本政策所述的目的,收集和使用您的个人信息。

(一)您需要授权我们处理您个人信息的情形

为实现向您提供我们产品及/或服务的基本功能,您须授权我们收集、使用的必要的信息。如您拒绝提供相应信息,您将无法正常使用我们的产品及/或服务。

1. 账号登录验证 

当您选择打开使用SCC系统时,为了验证您是否为我们的权限用户,我们会要求您输入账号、密码。用户登录验证的作用是证明使用产品操作行为是用户本人发起,保障产品用户的账户安全,保护用户使用产品时的个人信息不被偷窥与盗取。

2. 账号注册

当您注册SCC网站账号时,需要提供用于身份验证的姓名(中文名、英文名)、手机号码、邮箱。

3. 供应商认证

如果您想成为或已成为我们的合作伙伴或供应商,基于业务活动开展的需要,我们会收集贵公司的联系人、手机、联系电话、邮箱、高管身份信息。

4. 商务招投标

为保证招投标过程公平公正,我们可能会收集当前用户的IP地址。

5. 合同交付信息

为推动双方合同的履行,可能需要收集贵公司的业务人员、业务人员电话、业务人员邮箱。

 

(二)您可自主选择提供个人信息的情形

为提升您使用我们产品及/或服务的体验,我们的以下扩展功能可能会收集和使用您的个人信息。如果您不提供这些个人信息,您依然可以使用我们的产品及/或服务,但您可能无法享受到这些扩展功能给您带来的额外乐趣和便捷。这些扩展功能包括:

1. 产品开发和服务优化

为了确保服务的安全或为了分析故障原因,帮助我们更好地了解我们应用程序的运行情况,我们可能记录您使用应用程序的频率、故障信息、总体使用情况、性能数据。

当我们要将信息用于本政策未载明的其它用途时,会事先征求您的同意。当我们要将基于特定目的收集而来的信息用于其他目的时,会事先征求您的同意。

如果我们需要处理您的敏感个人信息,我们将依照适用法律法规的要求,就处理该信息的必要性及对您个人权益的影响等事项进行具体说明,并在必要情况下取得您的单独同意。

 

二、我们如何使用Cookie和同类技术

为使您获得更轻松的访问体验,您使用统一权限的产品或服务时,我们可能会通过采用各种技术收集和存储您访问统一权限服务的相关数据(如登录时间,操作记录等),在您访问或再次访问统一权限服务时,我们能识别您的身份,并通过分析数据为您提供更好更多的服务。包括使用小型数据文件识别您的身份,以便了解您的使用习惯,帮您省去重复输入账户信息的步骤,或者帮助判断您的账户安全。这些文件可能是Cookie\Flash Cookie,或您的浏览器或关联应用程序提供的其他本地存储(统称“Cookie”)。      

您可以清除计算机上保存的所有 Cookie,或者直接删除存储在您的设备上的Cookie,但如果您这么做,则需要在每一次访问我们的网站时更改设置。大部分浏览器都有阻止Cookie的功能,如果您希望通过浏览器对Cookie进行管理,可以参考浏览器开发商的介绍或从互联网上进行查询。

 

三、我们如何共享、转让、公开披露您的个人信息

为了保证您的个人信息安全,我们遵照最小化原则,在遵守适用的法律要求下,共享、转让或披露您的个人信息。

对我们与之共享个人信息的公司、组织和个人,我们会按照当地国家的法律要求采取组织和技术措施,要求他们按照我们的安全标准、本政策的要求及相关的保密和安全措施来处理个人信息。

(一)共享

我们不会与中兴通讯股份及子公司以外的任何公司、组织和个人分享您的个人信息,但以下情况除外:

1、在获取明确同意的情况下共享:获得您单独同意后,我们会与其他方共享您的个人信息。

2、我们可能会根据法律法规规定,或按政府主管部门的强制性要求,对外共享您的个人信息。

(二)转让

我们不会将您的个人信息转让给任何公司、组织和个人,但以下情况除外:

1、在获取您单独同意的情况下转让:获得您的单独同意后,我们会向其他方转让您的个人信息;

2、在涉及合并、分立、解散或被宣告破产时,如涉及到个人信息转让,我们会及时向您告知接收方的名称或者姓名和联系方式,同时要求该接收方继续受此隐私政策的约束,否则我们将要求该接收方重新向您征求授权同意。

(三)公开披露

我们仅会在以下情况下,公开披露您的个人信息:

1、获得您单独同意后;

2、基于法律的披露:在法律、法律程序、诉讼或政府主管部门强制性要求的情况下,我们可能会公开披露您的个人信息。

 

四、我们如何保护您的个人信息

(一)我们已使用符合业界标准的安全防护措施保护您提供的个人信息,防止个人信息遭到未经授权的访问以及个人信息泄露、篡改、丢失。我们会采取一切合理可行的措施,保护您的个人信息。

(二)我们的数据安全能力:

我们一直致力于保护您的个人信息安全。

我们通过采取各种安全保障措施,比如门禁系统、监控系统、加密、匿名或假名化、员工培训等,保护您的个人信息不被未经授权的访问以及个人信息泄露、篡改或丢失及其它的形式的非法处理。

我们制定了业务连续性计划,以保证可以连续地提供服务;我们的信息安全政策和程序严格按照国际标准进行设计,定期进行审核和更新,通过定期的第三方安全审计,确保安全管理架构和措施的有效性。中兴通讯股份有限公司及部分子公司已经通过了ISO 27001信息安全认证,可以有效保护您的个人信息。如发生个人信息泄露事件,我们会启动应急预案,采取有效措施防止事态扩大,并及时通知相关监管机构和您。

(三)我们会采取一切合理可行的措施,确保未收集无关的个人信息。我们只会在达成本政策所述目的所需的期限内保留您的个人信息,除非需要延长保留期或受到法律的允许。

(四)互联网并非绝对安全的环境,而且多数电子邮件、即时通讯等交流方式并未加密,我们强烈建议您不要通过此类方式发送个人信息。请使用复杂密码,协助我们保证您的账号安全。

(五)我们将定期更新并公开安全风险、个人信息保护影响评估等报告的有关内容。如果我们在个人信息保护影响评估报告中影响你的个人信息相关权利,我们会主动公开安全风险。如果您希望获得详细的报告内容,您可通过以下方式获得:

电子邮件:Privacy@zte.com.cn

(六)我们将尽力确保或担保您发送给我们的任何信息的安全性。如果我们的物理、技术、或管理防护设施遭到破坏,导致个人信息被未经授权的访问以及个人信息泄露、篡改、丢失,使您的合法权益受损,我们将承担相应的法律责任。

(七)如果发生个人信息安全事件,我们将按照法律法规的要求,及时向您告知:安全事件的基本情况和可能的影响、我们已采取或将要采取的补救措施、您可自主采取的减轻危害的措施、对您的补救措施以及我们的联系方式等。我们将及时将事件相关情况以邮件、信函、电话、推送通知等方式告知您,难以逐一告知个人信息主体时,我们会采取合理、有效的方式发布公告。

同时,我们还将按照监管部门要求,主动上报个人信息安全事件的处置情况。

 

 

五、您的权利

按照个人信息保护相关的法律、法规、标准,以及其他国家、地区的通行做法,我们保障您对自己的个人信息行使以下权利:

(一)查阅您的个人信息

您有权查阅您的个人信息,法律法规规定的例外情况除外。如果您想行使数据查阅权,可以通过以下方式自行查阅:您可以使在【系统管理】的目录下用户管理的菜单获取到您的个人信息。

(二)更正、补充您的个人信息

当您发现我们处理的关于您的个人信息有错误时,您有权进行更正或补充。您可以通过“(一)查阅您的个人信息”中罗列的方式进行更正、补充。

(三)删除您的个人信息

在以下情形中,您可以删除您的个人信息:

1、如果我们处理个人信息的行为违反法律法规;

2、如果我们处理个人信息的行为违反了本政策的规定;

3、如果本政策规定的个人信息处理目的已实现、无法实现或者相关个人信息对于实现处理目的不再必要;

4、如果您不再使用我们的产品或服务,或您注销了账号;

5、如果您改变了授权同意的范围导致我们不再有权处理您的信息;

6、如果我们不再为您提供产品或服务,或保存期限已届满。

您可以通过以下方式操作删除您的个人信息:请联系贵公司管理员进行操作。

一旦您成功删除了您的个人信息,我们还将同时通知从我们获得您的个人信息的实体,要求其及时删除,除非法律法规另有规定,或这些实体获得您的独立授权。当您或我们协助您删除信息后,由于适用法律法规和安全技术的限制,我们可能不会立即备份系统中删除相应的信息,我们将安全地存储您的个人信息,限制对其的进一步处理,并在备份更新时删除这些信息。

(四)改变您授权同意的范围

每个业务功能均需要您的个人基本信息才能得以实现(见本政策第一部分),对于您的个人信息收集和使用,您可以随时给予或者收回您的授权同意,您可以通过以下方式自行操作:登录后在【与我有关】的目录下个人隐私的菜单中可以对已经签署的隐私政策撤销同意

请您理解,每个业务功能需要一些基本的个人信息才能得以完成,当您撤回同意或授权后,我们无法继续为您提供撤回同意或授权所对应的服务,如果该信息为我们履行法律法规规定的义务所必须或者我们提供主要服务所必须,我们可能没有办法响应您的请求或者将会影响您正常使用我们的服务。当您撤回同意后,我们将不再处理相应的个人信息。但您收回同意的决定,不会影响此前基于您的授权同意而开展的个人信息处理。

(五)注销您的账户

您随时可注销此前注册的账户,您可以通过以下方式自操作:请联系贵公司管理员进行操作。

在注销账户之后,我们将停止为您提供产品或服务,并依据您的要求,删除您的个人信息,法律法规另有规定的除外。

(七)约束信息系统自动化决策

在某些业务功能中,我们可能仅依据信息系统、算法等在内的非人工自动决策机制做出决定。如果这些决定显著影响您的合法权益,您有权要求我们做出解释,我们也将提供适当的救济方式。

(八)响应您的上述请求

如果您的请求无法通过上述链接/方式实现,您可以发送电子邮件至privacy@zte.com.cn,或者通过数据主体权利响应系统申请权利响应(路径:pdsr.zte.com.cn)。我们将在30天内回复您的请求。

为保障安全,您可能需要提供书面请求,或以其他方式证明您的身份。我们可能会先要求您验证自己的身份,然后再处理您的请求,我们会在三十天内做出答复。

对于您合理的请求,我们原则上不收取费用,但对多次重复、超出合理限度的请求,我们将视情收取一定成本费用。对于那些无端重复、需要过多技术手段(例如,需要开发新系统或从根本上改变现行惯例)、给他人合法权益带来风险或者非常不切实际(例如,涉及备份磁带上存放的信息)的请求,我们可能会予以拒绝。

在以下情形中,按照法律法规要求,我们将无法响应您的请求:

1、与国家安全、国防安全直接相关的;

2、与公共安全、公共卫生、重大公共利益直接相关的;

3、与犯罪侦查、起诉、审判和判决执行等直接相关的;

4、有充分证据表明您存在主观恶意或滥用权利的;

5、响应您的请求将导致您或其他个人、组织的合法权益受到严重损害的。

6、涉及商业秘密的。

 

六、我们如何处理未成年人的个人信息

我们的产品、网站和服务主要面向成人,面向公司内部的员工,不涉及处理儿童个人信息的情况。

 

七、我们如何存储您的个人信息

(一)个人信息的存储地点以及跨境转移情况

原则上,我们在中华人民共和国境内收集和产生的个人信息,将存储在中华人民共和国境内。由于我们通过遍布全球的资源和服务器提供产品或服务,这意味着,在适用法律法规允许范围以及为您提供服务所必须的限度内,您的个人信息可能会被转移到您使用产品或服务所在国家/地区的境外管辖区,或者受到来自这些管辖区的访问。在此情形下,我们会单独征得您的授权同意、告知您境外接收方的相关信息并根据相关法律法规完成跨境传输的前提条件。

此类管辖区可能设有不同的数据保护法,甚至未设立相关法律。在此类情况下,我们会确保您的个人信息得到与中华人民共和国境内足够同等保护。例如,我们会在跨境数据转移之前实施数据去标识化等安全举措。

(二)个人信息存储期限

如果本政策没有特别说明,我们将会在达成本政策所述目的所需的期限内保留您的个人信息,除非按照法律要求或许可需要延长保留期或受到法律的允许。因为基于不同的场景和产品及服务的不同,数据的存储期可能会有所不同,我们用于确定存留期的标准(以其中较长者为准)包括:完成该业务目的需要留存个人信息的时间,包括提供产品和服务,维护相应的交易及业务记录,管控并提升产品与服务性能与质量,保证系统、产品和服务的安全,应对可能的用户查询或投诉,问题定位等;用户是否同意更长的留存期间;法律、合同等是否有保留数据的特殊要求等。

在超出存储期限后,我们会根据适用法律法规的要求删除您的个人信息,或对其进行匿名化处理。

 

八、本政策如何更新

我们的隐私政策会不时更新。

未经您明确同意,我们不会削减您按照本隐私政策所应享有的权利。

我们会在本页面上发布对本政策所做的任何变更。对于重大变更,我们还会提供更为显著的通知(包括对于某些服务,我们会通过电子邮件发送通知,说明隐私政策的具体变更内容),并根据适用法律法规的要求重新征得您的同意。

本政策所指的重大变更包括但不限于:

1、我们的服务模式发生重大变化。如处理个人信息的目的、处理的个人信息类型、个人信息的处理方式等;

2、我们在所有权结构、组织架构等方面发生重大变化。如业务调整、破产并购等引起的所有者变更等;

3、个人信息共享、转让或公开披露的主要对象发生变化;

4、您参与个人信息处理方面的权利及其行使方式发生重大变化;

5、我们负责处理个人信息安全的责任部门、联络方式及投诉渠道发生变化时;

6、个人信息安全影响评估报告表明存在高风险时。

我们还会将本政策的旧版本存档,供您查阅。

 

九、如何联系我们

我们设立了个人信息保护专职部门——数据保护合规部,如果您对本隐私政策有任何疑问、意见或建议,您可以通过邮箱与我们联系,发送邮件至Privacy@zte.com.cn和我们联系,我们将在30天内答复。

除此之外,您也可以发送信件至中兴通讯总部数据保护合规部

收件人:中兴通讯数据保护合规部
地址:中国深圳市科技南路55号中兴通讯研发楼26楼
邮编:518057

如果您对我们的回复不满意,特别是我们的个人信息处理行为损害了您的合法权益,您还可以联系当地法定数据保护机构寻求解决方案。

 

 

SCC Privacy Policy

Updated:November 1, 2022

Effective Date: November 1, 2022

This privacy policy(hereinafter referred to as “this policy”) applies only to ZTE Corporation(hereinafter referred to as ”ZTE” or “we”) Supply Chain Collaboration products (and all third-party applications or services accessed by them). If a third-party application or service has a separate privacy policy, the privacy policy of the application or service is applied preferentially. For the contents that are not covered by the application or service privacy policy, refer to this privacy policy.

If you have any questions, comments, or suggestions, please contact us through the following means:

E-mail: Privacy@zte.com.cn

    Company Name: ZTE Corporation

Registered Address: No. 55, Keji South Road, Nanshan District, Shenzhen

ZTE understands the importance of personal information to you, and will make every effort to ensure the security and reliability of your personal information. ZTE promises to take appropriate security measures to protect your personal information in accordance with well-established security standards in the industry.

Please read and understand this Privacy Policy carefully before using our products or services.

This policy helps you understand the following:

1. How we collect and use your personal information
2. How use cookies and similar technologies
3. How we share, transfer, and disclose your personal information
4. How we protect your personal information.
5. Your Rights
6. How we process the personal information of children
7. How do we store your personal information
8. How to update this policy
9. Contact us

 

I. How we collect and use your personal information

Personal information refers to the information that is recorded electronically or in other ways related to identified or identifiable natural persons, excluding the information after anonymization.. Sensitive personal information refers to the personal information that may cause violation of personal dignity or damage to personal and property safety once it is disclosed or illegally used. It includes information such as biological identification, religious belief, specific identity, health care, financial accounts, traces, and personal information of minors under a certain age.(In this Policy, sensitive personal information involved will be highlighted in bold.) ZTE will collect and use your personal information only for the following purposes described in this policy:

i.Your personal information that we need to process .

To provide you with the basic functions of our products and/or services, you need to authorize us to collect and use necessary information. If you refuse to provide the information, you cannot use our products and/or services properly.

1. Account login verification

When you choose to use SCC system, in order to verify whether you are our authorized user, we will ask you to enter your account number and password. The function of user login verification is to prove that the operation of using the product is initiated by the user, to ensure the security of the product user's account, and to protect the user's personal information from being peeped and stolen when using the product.

2. Account Registration

When you register an SCC website account, you need to provide the your name, mobile phone number, and email address for identity verification.

3. Supplier certification

If you want to become or have become our partners or suppliers, based on the needs of business activities, we collect company contacts, mobile phones, phone numbers, email addresses, and identity information of executive.

4. Commercial bidding

To ensure that the bidding process is fair and just, we may collect the IP address of the current user.

5. Contract delivery information

In order to promote the performance of the contract between us,we will collect the business personnel, telephone number of the business personnel, and email addresses of the business personnel.

ii.Your personal information that you can decide whether we can process.

To improve your experience with our products and/or services, our extended functions may collect and use your personal information. If you do not provide these personal information, you can still use our products and/or services, but you may not enjoy the extra fun and convenience brought by these extended functions. These extended functions include:

1. Product development and service optimization

In order to ensure the security of the service or to analyze the cause of failure and help us better understand the operation of our application, we may record the frequency of your use of the application, failure information, overall usage, and performance data.

If we want to use the information for other purposes not specified in this policy, we will seek your approval in advance. If we want to use the information collected for specific purposes for other purposes, we will seek your approval in advance.

If we need to process your sensitive personal information, we will elaborate on the necessity of processing the information and the impact on your rights and interests in accordance with the requirements of applicable laws and regulations, and obtain your separate consent if necessary.

 

II. How we use Cookies and similar technologies

In order to provide you with an easier access experience, when you use products or services of the unified authority, we may use various technologies to collect and store the data related to your access to the unified authority service (such as login time, operation records, etc.), in the When you visit or revisit the unified authority service, we can identify your identity and provide you with better and more services by analyzing data. Including the use of small data files to identify you, in order to understand your usage habits, to save you the step of repeatedly entering account information, or to help determine the security of your account. These files may be Cookies\Flash Cookies, or other local storage provided by your browser or associated application (collectively, "Cookies").

You can clear all cookies saved on your computer, or simply delete cookies stored on your device, but if you do, you will need to change your settings each time you visit our website. Most browsers have the function of blocking cookies. If you want to manage cookies through your browser, you can refer to the introduction of the browser developer or inquire from the Internet.

 

III. How we share, transfer and disclose your personal information

To ensure the security of your personal information, we shall follow the minimization principle and share, transfer, or disclose your personal information in accordance with applicable laws and requirements.

For the companies, organizations, and individuals that share personal information with us, we will take organizational and technical measures in accordance with the local laws and regulations, and require them to process personal information in accordance with our security standards, this policy, and related confidentiality and security measures.

1. Sharing

We will not share your personal information with any company, organization, or individuals other than ZTE Corporation and its subsidiaries, except in the following cases:

(1) After obtaining your separate consent, we will share your personal information with other parties.

(2) We may share your personal information in accordance with laws and regulations or mandatory requirements of government authorities.

2. Transfer

We will not transfer your personal information to any company, organization or individual except in the following cases:

(1) Transfer with separate consent: After obtaining your separate consent, we will transfer your personal information to other parties.

(2) If personal information transfer is involved in a merger, division, dissolution, or bankruptcy, we will inform you of the name and contact information of the receiving party in a timely manner, and require the receiving party that hold your personal information to continue to be subject to this privacy policy. Otherwise, we will require the receiving party to re-request authorization from you.

3. Public Disclosure

We will disclose your personal information only in the following cases:

(1) With your separate consent.

(2) Disclosure based on law: We may disclose your personal information in case of law, legal procedure, litigation, or mandatory requirements of government authorities.

IV. How we protect your personal information

1. We have taken the security protection measures that comply with industry standards to protect the personal information provided by you against unauthorized access, disclosure, tampering and loss. We will take all reasonable and feasible measures to protect your personal information.

2. Our data security capabilities:

We have been committed to protecting your personal information security.

We have taken various security measures, such as access control system, monitoring system, encryption, anonymization or pseudonymisation, employee training and so forth, to protect your personal information from unauthorized access , disclosure, tampering  or loss and other forms of illegal processing.

We have developed a business continuity plan to ensure that services can be provided continuously. Our information security policies and procedures are designed in strict accordance with international standards, and reviewed and updated regularly, and the effectiveness of the security management architecture and measures is ensured through regular third party security audits. ZTE Corporation and some of its subsidiaries have passed the ISO 27001 information security certification, and can effectively protect your personal information. In case of personal information leakage, we will initiate an emergency plan, take effective measures to prevent the situation from getting worse, and notify the relevant supervisory authority and you in a timely manner.

4. We will take all reasonable and feasible measures to ensure that irrelevant personal information is not collected. We will retain your personal information only for the period required to achieve the objectives specified in this policy, unless the retention period needs to be extended or is permitted by law.

5. The Internet is not absolutely secure, and most communications, such as emails and instant messaging, are not encrypted. We strongly recommend that you do not send personal information through such means. Please use a complicated password to help us ensure the security of your account.

6. We shall regularly update and publicize the contents related to reporting such as security risks , personal information protection impact assessments and so forth . If we affect your personal information rights in protection impaction assessment reports, we will actively disclose security risks. You can obtain detailed report contents in the following way:

E-mail: Privacy@zte.com.cn

7. The Internet environment is not 100 percent secure. We will do our best to ensure or guarantee the security of any information you send us. If our physical, technical or management protection facilities are damaged, which results in unauthorized access, disclosure, tampering or loss of your personal information that affects your legal rights and interests, we shall assume the corresponding legal responsibilities.

8. If personal information security incident occurs, we will inform you of the basic situation and possible impact of the security incident in a timely manner, the remedial measures we have taken or will take, measures that you can take to mitigate risks., remedial measures for you and our contact methods. We will inform you of the incident by email, letter, telephone or notification in a timely manner. If it is difficult to inform the subjects of personal information one by one, we will release the notice in a reasonable and effective manner.

In addition, we will actively report the handling of personal information security incidents in accordance with the requirements of the regulatory department.

V. Your rights

In accordance with personal information protection laws, regulations, standards, and common practices in other countries and regions, we guarantee that you have the following rights over your personal information:

1. Access to your personal information

You have the right to access your personal information, except for exceptions as required by laws and regulations. If you want to exercise data access rights, you can access the data by yourself in the following ways: You can obtain your personal information from the user management menu under the System Management

2. Correct and supplement your personal information

When you find that your personal information processed by us is incorrect, you have the right to correct and supplement your personal information. You can correct or supplement your personal information through the methods listed in "(1) Access to your personal information".

3. Delete your personal information

You can delete your personal information in the following cases:

(1) we violated laws and regulations.

(2) we violated this policy.

(3) The purposes for which the personal information is processed as stipulated in this policy are achieved or cannot be achieved, or the personal information is no longer necessary for the purposes..

(4) you will not use our products or services any longer, or your account is canceled.

(5)You changed the scope of authorization that we have no right to process your personal information.

(6) we do not provide products or services for you, or the storage period expires.

You can delete your personal information as follows: Please contact your company administrator.

Once you have deleted your personal information, we will also notify the entities that obtain your personal information from us and require them to delete your personal information in a timely manner, unless required by other laws and regulations, or these entities obtain your independent authorization. After your personal information is deleted , due to the limitations of applicable laws and regulations and safety technologies, we may not immediately delete the corresponding information in the backup system, but we will securely store your personal information, restrict further processing of it, and delete it during the backup update.

4. Change the scope of your authorization

You can change the scope of your authorization by performing the following operations by yourself: After logging in to the system, you can cancel the signed privacy policy on the Personal Privacy menu under My Desktop.

Please understand that each business function can be implemented only after some basic personal information is obtained. When you withdraw your permission or authorization, we cannot provide you with the corresponding service. If the information is necessary for us to fulfill our obligations under laws and regulations or to provide major services, we may not be able to respond to your request or the normal use of our services will be affected.After you withdraw your consent, we will not process the corresponding personal information. However, your decision to withdraw your consent will not affect the previous processing of personal information based on your authorization.

5. Cancel your accounts.

You can cancel your previous account at any time. You can perform the following operations by yourself: Please contact your company administrator.

After your account is canceled, we will stop providing you with products or services and delete your personal information as required by you, unless otherwise specified by laws and regulations.

6. Restrain automatic decision-making of the information system

In some business functions, we may make decisions only based on non-manual automatic decision-making mechanisms such as information systems and algorithms.If these decisions have a significant impact on your legal rights and interests, you have the right to ask us for an explanation, and we will provide appropriate relief methods.

8. Respond to your above requests

If your request cannot be implemented through these links/methods, you can send an e-mail to Privacy@zte.com.cn, or submit the request by login the data subject right response system: pdsr.zte.com.cn, We will respond to your access request within 30 days.

To ensure security, you may need to provide a written request or prove your identity in other ways. We may ask you to verify your identity before processing your request, and we will respond within 30 days.

In principle, we do not charge for your reasonable requests, but we will charge for repeated requests that exceed a reasonable limit. We may reject requests that repeat unreasonably, require excessive technical means (for example, development of a new system or a fundamental change of current practice), and bring risks to other people's legitimate rights and interests or that are extremely impractical (for example, involving information stored on the backup tape).

We will not be able to respond to your request in accordance with laws and regulations if:

(1) The case is directly related to national security and national defense security.

(2) The case is directly related to public safety, public health, and major public interests.

(3) The case is directly related to any criminal investigation, prosecution, trial, and execution of a judgment .

(4) There is sufficient evidence that you have subjective malice or abuse of rights.

(5) Responding to your request will cause serious damage to the legal rights and interests of yours or other individuals' and organizations'.

(6) Business secrets are involved.

VI. How we process the personal information of minors

Our products, websites, and services are mainly for adults, for employees inside the company, and do not involve the processing of personal information of children.

VII. How do we store your personal information

1.Storage location and cross-border transfer of personal information

In principle, the personal information we collect and generate in the People's Republic of China will be stored within the territory of the People's Republic of China.Because we provide products or services through resources and servers around the world, this means that, to the extent permitted by applicable laws and regulations and required for providing services,, your personal information may be transferred to an overseas jurisdiction of the country or area in which the products or services used by you are, or may be accessed from these jurisdictions. In this case, we will obtain your authorization and approval, inform you of the related information of the overseas recipient, and complete the cross-border transmission in accordance with the relevant laws and regulations on personal information protection.

There may be different data protection laws or even no laws in such jurisdictions. In such cases, we will ensure that your personal information is protected properly as it is protected in the People's Republic of China. For example, we will ask you to agree the cross-border transfer of personal information, or implement security measures such as data de-identification before cross-border data transfer.

2.Personal Information Storage Period

Unless otherwise specified in this Policy, we will retain your personal information within the period required to achieve the purposes described in this policy, unless as required by law that retention period need to be extended or be permitted by law. The data storage period may vary with different scenarios and products and services. The criteria for determining the retention period (the longer one prevails) include: the time when personal information needs to be retained for the purpose of the service which including the provision of products and services, maintenance of corresponding transaction and service records, control and improvement of product and service performance and quality, the guarantee of system, product and service security and respond to possible user queries or complaints; whether users agree to a longer retention period; and whether there are special requirements for keeping information such as laws and contracts.

After the storage period expires, we will delete your personal information or anonymize it according to the requirements of applicable laws and regulations.

VIII. How to update this policy

Our privacy policy may changes from time to time .

Without your express consent, we will not reduce your rights under this privacy policy.

We will release any changes to this policy on this page. For major changes, we will also provide more noticeable notifications (including notifications for some services, which will be sent via email to describe the specific changes in the privacy policy), and get your approval again in accordance with the requirements of applicable laws and regulations.

Major changes mentioned in this policy include but are not limited to the following situations:

1. Our service model has significantly changed. For example, the purpose of processing personal information, the type of processed personal information, and the mode of using the personal information.

2. Major changes have taken place in the ownership structure and organizational structure. Such as changes in owners caused by business adjustment or bankruptcy or mergers and acquisitions.

3. The major objects of personal information sharing, transfer, or public disclosure are changed.

4. Your right to participate in the processing of personal information and the way you exercise it have changed significantly.

5. Our responsible department for personal information security, contact method, or complaint channel have changed.

6. The personal information security impact assessment report indicates a high risk.

We will also archive the old version of this policy for your reference.

IX. Contact us

We have established a special personal information protection department – Data Protection Compliance Dept.. If you have any questions, comments, or suggestions on this privacy policy, please feel free to send an email to us at Privacy @zte.com.cn, which will be replied within 30 days.

In addition, you can send letters to the Data Protection Compliance Dept. of ZTE headquarters

To: Data Protection Compliance Dept. of ZTE Corporation
 Address: 26/F, R&D Building, No. 55, Hi-Tech Road South, Shenzhen, China (Post Code: 518017)
If you are unsatisfied with our response, especially when our personal information processing activities have damaged your legal rights and interests, you can seek solutions through the local data protection agency.