Welcome to the website of GSH Bio Co., Ltd.!
Thank you for visiting the website of GSH Bio Company! GSH Bio takes your privacy seriously, we appreciate your trust on us.
1. Types of Personal Information We Use
This section explains the different types of personal information we will collect from you and how we collect that personal information. If you would like to learn more about specific data types and how we use this data, please see the section "How we use your personal information" below.
The following summarizes the types of personal information we use:
Information you provide to us
2. How we use your personal information
This section details the types of personal information we collect from you and why we collect it.
When you submit an inquiry to us, to be able to contact you and deal with your questions, we will collect your information within the minimum scope by the law and will not use it for other services. The specific information is as follows:
Purpose of use
Information you provide to us.
Inquiry form information:
Message (ask for details)
We use this information to understand the identity of the person who submitted the inquiry and what is relevant to the inquiry and to contact the person who submitted the inquiry.
3. How we store and share your personal information
Your personal information is processed by our servers located in the People's Republic of China. Our web operations and technical teams are located in the People's Republic of China.
We use GSH Biological Cloud to provide information storage services for this service.
We only share your personal information as reasonably necessary. Such situations include:
Regulators, judicial and law enforcement agencies, and other third parties for safety, security, or third parties who comply with the law. There are circumstances in which we are required by law to disclose your information to authorities, such as to comply with legal obligations or procedures, to enforce our terms, to deal with security or fraud-related matters, or to protect our users. We may make these disclosures with or without your consent to comply with the terms of valid legal process, such as a subpoena, court order, or search warrant. Generally, the terms of the legal process prohibit us from notifying you of any such disclosure. If the government entity fails to provide the required subpoena, court order, or search warrant, we may seek your consent to disclose information as required by a government entity. We may also disclose your information for the following purposes:
Enforce our terms and conditions and other agreements, including investigating any possible breach of these documents; detect, prevent or otherwise resolve security, fraud, or technical issues; or as required or permitted by law, protect us, our rights, property, or safety of users, third parties or the public (exchange information with other companies and institutions to prevent fraud and reduce credit risk).
Third parties that acquire us or our business in whole or in part. We may also disclose your personal information to third parties if any of the following occurs: (a) we sell, transfer, merge, integrate or reorganize any part of our business, or merge with, acquire any other business or enter into a joint venture with it, we may disclose your data to any new owner or other third party involved in a change in our business; or (b) We sell or transfer any of our assets, then the information we hold about you may be sold as part of those assets and may be transferred to any new owners or other third parties involved in such sales or transfers.
4. Security of Personal Information
Wherever your personal information is stored, we are committed to maintaining its privacy and integrity. Our Information Security and Access Policy restricts access to our systems and technology, and we protect data through the use of technical safeguards such as encryption.
Unfortunately, although we have implemented and maintained reasonable measures to protect your personal information, the transmission of information over the Internet is not completely secure. In the event of a security incident such as personal information leakage, we will activate an emergency plan to prevent the expansion of the security incident, and notify you in the form of push notifications, announcements, etc.
5. Your rights
You have relevant statutory rights (to the extent permitted by applicable laws and regulations) regarding the personal information we hold about you. You can request access or correction of the data we process about you.
To exercise any of your rights, please contact us through firstname.lastname@example.org.
Please note that this page does not involve any personalized advertising. Any emails are sent only in response to inquiries submitted by you and for service messages only.
6. Contact and Complaints
If you wish to file a complaint about the way we handle personal information, please contact us first through email@example.com and we will endeavor to process your request as quickly as possible.