Privacy Policy for Winner Technology Website and Business Contacts

Update date:2023-06-01 Effective date:2023-06-01

Thank you for visiting the website of Winner Technology Co., Ltd.


Winner Technology Co., Ltd. (hereinafter referred to as "Winner Technology" or "we") attaches great importance to your personal information. To help you understand how we collect, process, and protect your personal information when you visit our website (domain: "") and submit inquiries/leads through this website, we have formulated this policy. Please read and understand this policy carefully before submitting your personal information to us through this website. If you have any questions, comments, or suggestions regarding this policy, please contact us using the contact information provided in this policy.


In addition, please note that this policy does not apply to the handling of personal information by Winner Technology in specific product or service scenarios. For specific personal information handling practices in such product or service scenarios, please read the applicable privacy policy or similar legal documents provided by our customers or the services we provide to end customers.


This policy will help you understand the followings:

        1. How We Collect and Use Your Personal Information

        2. How We Use Cookies and Similar Technologies

        3. How We Share, Transfer, and Disclose Your Personal Information

        4. How We Store and Protect Your Personal Information

        5. How We Process Children’s Personal Information

            6. Personal Information Subjects’ Rights

        7. How to Contact Us

        8. Updates to This Policy


The following is the main content:


            1. How We Collect and Use Your Personal Information

        We will adhere to the principles of legality, legitimacy, and necessity as required by law to collect and use the information generated during your visit to this website and the information you voluntarily provide to us for the purposes described in this policy.

        We may collect and use your information for the following three purposes:

        1.1 Business Consultation

        When you apply for business cooperation with us, request industry materials (such as industry reports and business research) published on the website, or submit offline consultation requests to us, we will collect your contact phone number, company name, your preferred form of address, and the message describing your relevant needs in order to contact you in a timely manner.

        In addition, we may use the above information to provide you or your organization with information about products and services that may be of interest, or seek your or your organization's feedback through surveys and questionnaires, etc. If you or your organization do not wish to receive information about related products and services or provide feedback, you can refuse or request us to delete your personal information at any time during the contact process.

        1.2 Job Application

        When you apply for a position with us through our website, you will be directed to the Winner Technology job application service page provided by a third party (Shanghai Dayi Cloud Computing Co., Ltd.). Before submitting your application, you need to register and create an account on that third-party service platform. Please note that the information you provide on that page is not controlled by Winner Technology. You need to carefully read and understand the privacy policy or similar documents provided by the third-party service platform to ensure that you are aware of how the third-party platform handles your personal information.

        Based on your authorization to the third-party service platform, the third-party platform will share your resume information with us. The scope and type of resume information we receive depend on the resume content you submit to the third party, such as your name, date of birth, gender and place of origin, education, work experience, and contact information.

        1.3 Security Measures

        During your visit to this website, in order to identify network and account abnormal states, ensure the security, quality, and efficiency of website services, we may automatically collect your usage information and store it as network log information, including:

        a) to ensure the security, quality, and efficiency of website services, we may collect your IP address, browser version number, and operation logs within the website;

        b) we may use your device information, service log information, IP address, etc., to assess the security of your browsing behavior, detect and prevent security incidents.


        2. How We Use Cookies and Similar Technologies

        We use cookies to enhance your browsing experience on our website. Cookies are text files that, when placed on your device, allow us to provide specific features and functionality.

        You have the right to choose whether to accept or decline cookies. You can modify your browser settings to decline cookies, but we would like to remind you that by refusing cookies, you may not be able to use certain functions of our website that rely on cookies.

        For more information about our Cookie Policy, please click here.


        3. How We Share, Transfer, And Disclose Your Personal Information

        3.1 Sharing

        We only share your personal information with trusted third parties in the following four circumstances:

        a) sharing with explicit consent: we will share with other parties only after obtaining your explicit consent;

        b) sharing with affiliated companies: in order to provide you with better services, after obtaining your inquiry or lead information, we may share the information you provide to this website with Winner Technology's affiliated companies according to your needs. We will only share necessary information and it will be subject to the purposes stated in this policy. If an affiliated company wants to change the purpose of information processing, they will seek your authorization again, and you can also inform them of your refusal to continue processing your personal information when contacted by their staff;

        c) sharing with authorized partners: only for the purposes stated in this policy, we may share certain information with trusted third-party suppliers, consultants, or other service providers (referred to as "partners") to provide better customer service and user experience. We will only share information for legitimate, lawful, necessary, specific, and explicit purposes. Authorized partners can only access the information necessary to provide services or fulfill their responsibilities and are not allowed to use this information for any other purposes. We explicitly require authorized partners to protect your personal information in accordance with the requirements stated in this policy and prohibit them from further outsourcing.

        For the above three circumstances, we will sign strict confidentiality agreements and other agreements with companies and organizations that share information with us. We require them to handle shared information in accordance with our instructions, the purposes or uses stated in this policy, and confidentiality and security measures (at least not lower than the requirements stated in this policy).

        d) Sharing in statutory circumstances: We may share information with external parties in accordance with the provisions of laws and regulations or mandatory requirements from judicial institutions or government authorities.

        3.2 Transfer

        We will not transfer your personal information to any company, organization, or individual, except in the following circumstances:

        a) transfer with explicit consent: After obtaining your explicit consent, we will transfer to other parties;

        b) mergers, bankruptcy, or reorganization: In the event of mergers, acquisitions, or bankruptcy liquidation that involves the transfer of your personal information, we will require the new company or organization holding your personal information to continue to be bound by this policy. Otherwise, we will require the company or organization to seek your authorization again.

        3.3 Disclosure to Third Parties

        We will only disclose your personal information in the following circumstances:

        a) with your explicit consent or request;

        b) based on legal and regulatory requirements: we may disclose information in accordance with legal provisions, legal procedures, litigation, or mandatory requirements from government authorities.

        3.4 Exceptions to Obtaining Authorization for Sharing, Transfer, and Public Disclosure of Information

        Please understand that according to laws and regulations, we do not need to obtain your authorization for sharing, transfer, and public disclosure of your personal information in the following circumstances:

        a) related to national security and national defense security;

        b) related to public safety, public health, or significant public interests;

        c) related to criminal investigations, prosecutions, trials, and judgments executions, or administrative law enforcement activities;

        d) necessary to protect your or other individuals' vital interests such as life and property, but it is difficult to obtain your personal consent;

        e) personal information that you voluntarily disclose to the public;

        f) personal information collected from lawful public disclosures, such as lawful news reports, government information disclosure channels, etc.;

        g) other circumstances as stipulated by laws and regulations.

        In addition to the above provisions, please understand that according to relevant laws, if we take technical measures and other necessary security measures to process personal information, making it impossible for the data recipient to re-identify specific individuals and cannot be restored, the sharing, transfer, and public disclosure of such processed data do not require separate notification and obtaining your consent.


        4. How We Store and Protect Your Personal Information

        4.1 Storage and Protection of Your Personal Information

        In accordance with laws and regulations, we will store user information collected within China's territory. If we need to transfer your personal information overseas, we will inform you explicitly and obtain your consent.

        We promise to store your personal information in accordance with legal requirements or for a reasonable and necessary period. For personal information beyond the retention period, we will immediately delete or anonymize it. If we terminate our services or operations, we will immediately cease collecting your personal information and delete or anonymize your personal information after the termination of services and operations.

        To prevent unauthorized access, copying, modification, transmission, loss, destruction, processing, or use of your personal information in accidental and unauthorized circumstances, we have implemented and will continue to take measures to protect your personal information, including but not limited to the following:

        a) our network services adopt transmission security protocols and encryption technologies, providing secure transmission services through methods such as HTTPS to ensure the security of user data during transmission;

        b) when necessary, we encrypt user information and isolate it using isolation technologies;

        c) when using personal information, such as personal information display, we employ various data anonymization techniques, including content replacement and encryption, to enhance the security of personal information during use;

        d) we have established strict data usage and access systems, implemented strict data access control and multi-factor authentication technologies to protect user information, and prevent unauthorized use of data. We only allow authorized personnel to access user information and require them to fulfill corresponding confidentiality obligations;

        e) when sharing your personal information with third parties, our network services adopt transmission security protocols and encryption technologies.

        4.2 Potential Risks

        We will make every effort to ensure the security of your personal information. However, please understand that due to technological limitations and various malicious activities that may exist in the internet industry, we cannot guarantee the absolute security of information at all times. You need to understand that the systems and communication networks you use to access our services may encounter problems beyond our control. To prevent personal information security incidents, we advise you to protect your personal information, only provide it to others when necessary, and we will also establish appropriate security alert mechanisms and emergency plans.

        In the event of a personal information security incident, we will promptly inform you in accordance with legal requirements, including the basic situation and potential impact of the security incident, the measures we have taken or will take to address it, suggestions for you to prevent and reduce risks, and remedial measures for you. We will inform you of the incident-related information in a timely manner through methods such as telephone calls and push notifications. If it is difficult to notify individuals one by one, we will publish announcements or warnings in a reasonable and effective manner.

        At the same time, we will proactively report the handling of personal information security incidents to regulatory authorities and closely cooperate with their work as required.


        5. How We Process Children’s Personal Information

        You understand that our website is not intended to provide services to minors. The online consultation, and job recruitment services provided on this website are not intended for minors. We will make every effort to avoid collecting information from minors. If we still inadvertently collect information from minors, the guardian of the minor can contact us to provide feedback, and we will delete the relevant information within five working days after verification.


        6. Personal Information Subjects’ Rights

        You have the statutory rights regarding your personal information held by us (within the scope permitted by applicable laws and regulations). You can request access, correction, or deletion of the personal information we process about you.

        To exercise any of your rights, you can contact us using the contact information provided in Section 7 of this policy.


        7. How to Contact Us

        If you have any questions, opinions, or suggestions regarding this policy or our personal information handling practices, you can contact us using the following contact information:

        Contact email:

        Email subject: Winner Technology Website - Personal Information Protection Policy - User Feedback/Complaints

        To ensure security, we may require you to provide a written request and provide proof of your identity. We will respond to your request within 15 days after receiving your feedback and verifying your identity, or within the time limit prescribed by laws and regulations. For reasonable requests, we generally do not charge a fee. However, for repeated or excessive requests beyond reasonable limits, we may charge a certain cost. We may also refuse requests that are groundless, require the development of new systems or fundamentally change current practices, pose risks to the legitimate rights and interests of others, or are excessively impractical.

        In accordance with legal requirements, we will be unable to respond to your request under the following circumstances:

        a) related to national security or defense security;

        b) related to public safety, public health, or significant public interests;

        c) related to criminal investigations, prosecutions, trials, and enforcement of judgments;

        d) there is sufficient evidence to indicate the data subject's subjective malice or abuse of rights;

        e) responding to your request would cause serious harm to your or other individuals’ legitimate rights and interests;

        f) involving trade secrets.


        8. Updates to This Policy

        We will update this policy in a timely manner in the following significant circumstances:

        a) changes in our basic situation, such as changes in ownership caused by mergers, acquisitions, or restructuring;

        b) changes in the scope, purpose, or rules of collecting, storing, and using personal information;

        c) changes in the objects, scope, or purposes of providing personal information to third parties;

        d) changes in the methods by which you access and manage personal information;

        e) changes in data security capabilities and information security risks;

        f) changes in the channels and mechanisms for user inquiries and complaints, as well as external dispute resolution organizations and contact methods;

        g) other changes that may have a significant impact on your personal information rights and interests.

        If this policy is updated, we will notify you by posting an announcement on our website. By continuing to use the services provided on this website after the updated policy takes effect, you indicate that you have read, understood, and accepted the updated policy and are willing to be bound by it.

We use cookies to improve your browsing experience and provide better services. In addition to necessary cookies that are essential for the proper functioning of our website (disabling such cookies will affect the basic functionality and service provision), we also use optional cookies to better understand how you use our website and enhance your browsing experience. For more information, please refer to our 'Cookie Policy.' By clicking 'Accept Optional Cookies,' you indicate your acceptance of our Cookie Policy and choose to accept optional cookies. Please note that if you decline optional cookies, it may affect your use of certain features on the website and you may not have a more convenient browsing experience.

Choose Winner and Create Development Power with Data

Choose Winner and Create Development Power with Data

Your address*
Your company name*
Your phone number*
leave a message*

Free download

our address*
Your phone number*
leave a message*

Free application for trial

Free application for trial

We will contact you as soon as possible, please ensure that your contact information is correct and the signal is unobstructed.

Your address*
Your company name*
Your phone number*
Contact Us
Service hotline:


Learn more