Privacy Policy

[Summary of Privacy Policy] Visinse Technology Co., Ltd. and Chengdu CALF Technology Co., Ltd. ("we" or "us") have always made a solemn commitment to protecting the personal information and privacy security of users who use Tarsier Camera (hereinafter collectively referred to as "users" or "you"). Through the "Tarsier Camera Privacy Policy" ("this Privacy Policy"), we hope to explain to you how we collect, use, store, share, and transfer your information when you use our products and services, as well as the ways we provide for you to access, update, delete, and protect this information.

 

This policy will help you understand the following:

 

  1. How We Collect and Use Personal Information
  2. Personal Information We May Share, Transfer, or Disclose
  3. How We Store and Protect Personal Information
  4. How to Manage Your Personal Information
  5. Third-Party Services
  6. Protection of Minors
  7. Notifications and Revisions
  8. How to Contact Us

 

  1. How We Collect and Use Personal Information

 

We collect your personal information primarily to enable you and other users to use Tarsier Camera more easily and with greater satisfaction. Our goal is to provide all users with a safe, enjoyable, and beneficial experience, and this information helps us achieve that goal.

 

(A) We will collect and obtain your personal information through the following channels:

 

1Information you provide:

(1) Information you provide to us when registering for a Tarsier Camera account or using Tarsier Camera.

 

(2) Shared information you provide to third parties through Tarsier, as well as information stored when you use Tarsier Camera.

 

2Information about you shared by third parties. This refers to shared information about you provided by third parties when they use Tarsier Camera.

3Information we obtain about you. Information we collect, aggregate, and record when you use Tarsier Camera, including log information, location information, and device information.

(B) We will collect and use the following types of your personal information for the following purposes:

 

1Helping you complete registration and login

To provide you with continuous and stable services and ensure the security of your use of Tarsier Camera, we need you to provide basic registration or login information, including your phone number, verification code matching results, and create your account, username, and password. If you only need to use basic services such as browsing and searching, you do not need to register as a Tarsier user or provide the above information.

 

After registration and login, you can also fill out or supplement your additional information (including your nickname, gender, date of birth, avatar, and personalized signature information), which will help us provide you with a better service experience. However, if you do not provide this information, it will not affect your use of the basic functions of the camera.

 

2Umeng+ SDK statistical analysis information

Our products integrate Umeng+ SDK, which collects your device's Mac address, unique device identifier (IMEI/android ID/IDFA/OPENUDID/GUID/IP address/SIM card IMSI information) to provide statistical analysis services and improve data accuracy through location calibration. It also provides basic anti-fraud capabilities. Privacy Policy Link: 

 

3Identity authentication

In accordance with relevant laws, regulations, and regulatory requirements, or to meet the needs of user identity verification and system and service security, you may need to undergo real-name authentication before using certain features and services. We will collect your identity authentication information. If you do not provide this information, we will not be able to provide you with related features and services.

 

For the purpose of identity authentication, you agree and authorize us to provide, query, and verify your aforementioned identity information to relevant identity authentication agencies (such as personal credit reporting agencies, government departments, etc.) on our own or through third parties.

 

Please note that your ID number, real name, and other information are sensitive personal information. Please provide them carefully. If you refuse to provide them, you may not be able to obtain related services, but it will not affect the normal use of other functions and services.

 

4Implementing photo taking, video recording, and live streaming services

 

When you use Tarsier Camera for photography, video recording, or live streaming, we need to collect your usage traces during the process.

 

If you need to save the pictures, audio, or video captured by Tarsier Camera or achieve certain functions through caching, we will request access to your device's storage permissions. If you refuse to provide storage permissions, it will prevent you from using the save function.

 

5Microphone and Recording Permissions

When you use video recording or live streaming functions, we need you to authorize us to access your microphone/recording permissions. If you use video recording-related functions, you also need to authorize us to access your device's camera permissions, storage permissions, and collect the video information you provide after uploading the recorded video.

 

6Maintaining the Normal Operation of Basic Functions

Device Information: When you use our services (including background operation status), we may receive and record information related to the device you are using. This includes, for example, device model, operating system and version, client version, device resolution, package name, device settings, process and software list, device identifiers (such as device MAC address, IMEI, Android ID, IDFA, OpenUDID, GUID, SIM card IMSI information), hardware and software characteristic information, and information related to the device's location (such as IP address, GPS location, and WLAN access points, Bluetooth, and base station sensor information that can provide relevant information).

 

To collect the above basic personal device information, we will request access to your device information permissions. We collect this information to provide you with our basic services and functions. If you refuse to provide these permissions, it may result in your inability to use our products and services.

 

Please note that individual device information and log information are unable to identify the identity of a specific natural person. If we combine such non-personal information with other information to identify a specific natural person's identity or use it together with personal information, such non-personal information will be treated as personal information during the combined use. Except with your authorization or as otherwise stipulated by laws and regulations, we will anonymize and de-identify such personal information. During the combined use, this information will be treated and protected as your personal information in accordance with this policy.

 

7Providing You with Security Protection

To improve the security of the services provided by us and our partners, protect you or other users or the public from harm to personal and property safety, better prevent risks such as phishing websites, fraud, network vulnerabilities, computer viruses, network attacks, and network intrusions, and more accurately identify violations of laws, regulations, or Tarsier's relevant agreement rules, we may collect, use, or integrate your account information, transaction information, login IP address, product version number, language mode, browsing history, network usage habits, service fault information, device information, log information, real-name authentication information, and information obtained from our affiliated companies and partners with your authorization or in accordance with the law. This information is used to comprehensively assess your account and transaction risks, perform identity verification, customer service, detect and prevent security incidents, fraud monitoring, archiving, and backup purposes. We will also take necessary recording, auditing, analysis, and disposal measures in accordance with the law.

 

8Regarding Registered Broadcast Listeners and Auto-Start Permissions

Due to the use of OTC functionality when connecting Android apps to head-mounted displays, it is necessary to listen to the ACTION_USB_DEVICE_ATTACHED broadcast to obtain the USB insertion status and acquire auto-start permissions. If you need to disable certain function permissions that you have enabled for specific services, most devices will support this request. Please refer to or contact your mobile device's service provider or manufacturer for specific methods. Please note that enabling any permission represents your authorization for us to collect and use relevant information to provide you with corresponding services. Once you disable any permission, it represents that you have revoked your authorization, and we will no longer collect and use relevant information based on that permission. We will also be unable to provide you with the corresponding service associated with that permission. However, your decision to disable permissions will not affect the collection and use of information based on your previous authorization.

 

9Reminders Regarding Specific Function Permissions

To provide you with the services you have chosen or to ensure the quality and experience of the services, Tarsier may require you to authorize the activation of device system permissions. If you need to disable certain function permissions that you have enabled for specific services, most devices will support this request. Please refer to or contact your mobile device's service provider or manufacturer for specific methods. Please note that enabling any permission represents your authorization for us to collect and use relevant information to provide you with corresponding services. Once you disable any permission, it represents that you have revoked your authorization, and we will no longer collect and use relevant information based on that permission.

 

10. Exceptions to Obtaining Authorization and Consent

 

According to relevant laws and regulations, your information may be collected without obtaining your authorization and consent in the following scenarios:

 

(1) Related to fulfilling obligations stipulated by laws and regulations;

 

(2) Directly related to national security and defense security;

 

(3) Directly related to public safety, public health, and significant public interests;

 

(4) Related to criminal investigation, prosecution, trial, and judgment execution;

 

(5) For the purpose of safeguarding your or other individuals' significant legitimate rights and interests such as life and property, but it is difficult to obtain your consent;

 

(6) The information collected is publicly disclosed by you to the public;

 

(7) Information collected from legally publicly disclosed information, such as legitimate news reports, government information disclosure, and other channels;

 

(8) Necessary for maintaining the secure and stable operation of Tarsier, such as detecting and handling product or service failures;

 

(9) Necessary for conducting legitimate news reporting;

 

(10) Necessary for conducting statistical or academic research in the public interest, and when providing the results of academic research or descriptions to the outside, the information contained in the results is subject to de-identification processing;

 

(11) Other scenarios stipulated by laws and regulations.

 

11. Reminder Regarding Sensitive Personal Information

 

Sensitive personal information refers to personal information that, once leaked, illegally provided, or misused, may endanger personal safety and property, and is highly likely to cause harm to personal reputation, physical and mental health, or lead to discriminatory treatment. The information you provide or we collect from you may contain your sensitive personal information, such as ID card numbers, personal biometric information (including facial recognition features), bank account numbers, communication records and content, property information (including virtual currency, virtual transactions, and other virtual property information), travel轨迹, location information, web browsing records, and transaction information. Please be cautious and pay attention to sensitive personal information. You agree that we may process your sensitive personal information in accordance with the purposes and methods described in this policy.

 

  1. Personal Information We May Share, Transfer, or Disclose

 

(A) Sharing

 

We attach great importance to protecting your personal information. Except for the following scenarios, we will not share your personal information with any third party other than ourselves:

 

1Sharing necessary for realizing our services/functions. In some cases, we need to share your information with third parties to realize the functions of our products/services and enable you to use the services you need, including: (1) Sharing transaction order information and payment amount information with third-party payment institutions providing payment services; (2) Sharing information required for real-name authentication with real-name authentication service providers; (3) Other necessary sharing with suppliers, service providers, and business partners related to our services/functions.

2Necessary sharing with some of our partners. For the purpose of carrying out necessary/reasonable business smoothly, satisfying your requirements, fulfilling our obligations and exercising our rights under relevant user agreements or this privacy policy, or complying with legal provisions, we may need to share your information with some partners, including: (1) Sharing log information and device information with partners providing data services (including online advertising monitoring, data statistics, data analysis, etc.); (2) Sharing statistical data on your product usage (such as crashes, flashes) with partners providing product analysis services (including app crash analysis, network performance analysis, domain name resolution optimization); (3) Sharing your relevant information (including device information, phone numbers) with partners providing marketing services (including advertising placement, marketing); (4) Sharing with partners who entrust us with promotion the number of people who have viewed their promotional information or purchased products after seeing these information, or providing them with statistical information that cannot identify personal identities to help them understand their audience or customers; (5) Other necessary sharing with some of our partners.

3Necessary sharing with our affiliates. To facilitate us providing consistent services to you based on a unified account system and facilitating your unified management, system and account security, your personal information may be shared between us and our affiliates, including: (1) To help you save time and simplify operation procedures, you can log in to the Tarsier camera using our mobile phone account without registration, and your account-related information will be shared within our products and those of our affiliates; (2) To enable you to have a consistent experience with our and our affiliates' products/services, you acknowledge and agree that your account information, device information, relevant browsing data, and other information reflecting your usage habits may be shared with our affiliates.

4Sharing with third-party SDKs or other similar applications. To ensure the stable operation and function realization of the Tarsier camera, we may access SDKs

 

5Other situations

(1) To fulfill our obligations and exercise our rights under this Policy or other agreements reached between us and you;

 

(2) Within the scope permitted by laws and regulations, in order to comply with the law, safeguard the interests, property or safety of us, our affiliates or partners, you or other Tarsier users, or the public, such as preventing fraudulent and other illegal activities and reducing credit risks, we may exchange information with other companies and organizations. However, this does not include selling, leasing, sharing, or otherwise disclosing information for profit-making purposes in violation of the commitments made in this Policy;

 

(3) Responding to your legitimate needs or with your authorization and consent;

 

(4) Providing your information in response to the legitimate request of your guardian;

 

(5) Providing information in accordance with the individual service agreement (including electronic agreements signed online and corresponding rules) or other legal documents signed with you;

 

(6) Providing information for academic research purposes;

 

(7) Providing information based on the social and public interests that comply with laws and regulations.

 

We will only share your personal information for legitimate, just, necessary, specific, and clear purposes. We will sign strict confidentiality agreements with the companies, organizations, and individuals with whom we share personal information, requiring them to handle the information in accordance with our instructions, this Policy, and any other relevant confidentiality and security measures.

 

(II) Transfer

 

With the continuous development of our business, we may undergo mergers, acquisitions, asset transfers, or similar transactions, and your information may be transferred as part of such transactions. We will require the new company or organization that holds your personal information to continue to be bound by this Policy. Otherwise, we will require the company or organization to re-obtain your authorization and consent.

After obtaining your explicit consent, we will transfer your personal information to third parties.

 

(III) Disclosure

 

We will only disclose your personal information under the following circumstances and with industry-standard security measures in place:

 

Disclose the information you specify in the manner you explicitly agree to based on your needs;

If the disclosure of your information is necessary in accordance with the requirements of laws, regulations, mandatory administrative law enforcement, or judicial requirements, we may disclose your information based on the required information type and disclosure method. Under the premise of compliance with laws and regulations, when we receive such requests for disclosure of information, we will require the recipient to provide corresponding legal documents, such as subpoenas or investigation letters. We firmly believe that the information we are required to provide should be kept as transparent as possible within the scope allowed by law. We carefully review all requests to ensure that they have a legal basis and are limited to data that law enforcement agencies have the legal right to access for specific investigation purposes.

 

(IV) Exceptions to obtaining authorization and consent before sharing, transferring, or disclosing information

 

In the following cases, it is not necessary to obtain your authorization and consent before sharing, transferring, or disclosing your information:

 

1Directly related to national security and national defense security;

2Directly related to public safety, public health, and significant public interests;

3Directly related to criminal investigation, prosecution, trial, and execution of judgments and other judicial or administrative law enforcement;

4To safeguard your or other individuals' significant legitimate rights and interests such as life and property, but it is difficult to obtain the consent of the individual;

5Information you have publicly disclosed to the general public;

6Collecting information from legally publicly disclosed information, such as legitimate news reports, government information disclosure, and other channels.

7Related to our performance of obligations prescribed by laws and regulations.

According to legal provisions, the sharing, transfer, and disclosure of de-identified personal information that ensures that the data recipient cannot restore and re-identify the information subject does not constitute external sharing, transfer, and public disclosure of personal information. Therefore, you will not be notified separately or required to obtain your consent for the storage and processing of such data.

 

  1. How We Store and Protect Personal Information

 

(I) Storage of Personal Information

 

Except as otherwise provided by laws, regulations, or regulatory authorities, we will only store your personal information for the purposes stated in this policy and for the shortest necessary period. If we terminate our services or operations, we will promptly stop collecting your personal information and comply with relevant laws and regulations to notify you in advance. After termination, we will delete or anonymize your personal information, except where laws, regulations, or regulatory authorities provide otherwise.

 

Personal information collected and generated during our operations in the People's Republic of China is stored within China. However, exceptions apply in the following scenarios:

 

1Where there are explicit provisions in laws and regulations;

2With your authorized consent;

3When the products or services you use involve cross-border activities, and we need to provide your personal information overseas.

 

In the above scenarios, we will ensure compliance with national laws, regulations, and the requirements of relevant regulatory authorities, and provide adequate protection for your personal information.

 

(II) Protection of Personal Information

 

We take information security very seriously. We have established a dedicated security team and adopted all reasonable and feasible measures to protect your personal information:

 

1Technical Measures for Data Security

 

We employ industry-standard security measures, including establishing reasonable policies and technical safeguards, to prevent unauthorized access, use, modification, damage, or loss of your personal information.

Our services utilize various encryption techniques, such as SSL, to encrypt and securely store your personal information. We also employ isolation techniques to further protect your personal information.

When using personal information, such as for information display or associated calculations, we utilize various data desensitization techniques to enhance the security of information usage.

We also adopt strict data access control and multi-factor authentication techniques to protect personal information and prevent unauthorized use.

 

2Other Security Measures for Protecting Personal Information

We have an industry-leading data-centric security management system that covers the entire data lifecycle. We enhance the overall system security from multiple dimensions, including organizational development, system design, personnel management, and product technology. We manage and regulate the storage and usage of personal information through the establishment of data classification and grading systems, data security management regulations, and data security development standards.

 

We implement comprehensive security controls through confidentiality agreements for information accessors, as well as monitoring and auditing mechanisms.

 

We also organize security and privacy protection training sessions to enhance employees' awareness of information security and their understanding of personal information protection policies and related procedures.

 

3We only allow employees and partners who need to know this information to access your personal information, and have implemented strict access control and monitoring mechanisms. We also require all personnel who may have access to your personal information to fulfill their confidentiality obligations. Failure to do so may result in legal liability or termination of their cooperation with our company.

 

4While the internet environment is not 100% secure, we will make every effort to ensure or guarantee the security of the personal information you send us. If our physical, technical, or management safeguards are breached, resulting in unauthorized access, disclosure, alteration, or destruction of personal information, and causing damage to your legitimate rights and interests, we will bear corresponding legal liability.

 

5Security Incident Response

 

To address potential risks such as personal information leaks, damage, and loss, we have established various systems to clarify the classification and grading standards for security incidents and vulnerabilities, as well as corresponding handling procedures. We have also established a dedicated emergency response team for security incidents. Based on the requirements of the security incident response plan, we initiate security measures for different security incidents, including loss mitigation, analysis, localization, development of remedial measures, and joint efforts with relevant departments for traceback and mitigation. We also regularly organize internal training and emergency drills to enable our staff to master the corresponding emergency response strategies and procedures.

 

After a security incident occurs, we will promptly notify you in accordance with legal and regulatory requirements, providing information on the basic situation of the incident, possible impacts, the measures we have taken or will take, suggestions for you to independently prevent and reduce risks, and remedial measures for you. We will also promptly inform you of the incident details through email, letters, phone calls, push notifications, etc. When it is difficult to notify individual information subjects one by one, we will adopt reasonable and effective methods to issue a public announcement. At the same time, we will actively report the handling of information security incidents to the regulatory authorities as required.

 

Please understand that due to technological limitations and the scope of risk prevention, even with our best efforts to strengthen security measures, we cannot guarantee 100% security of information. You should be aware that the systems and communication networks you use to access Tarsier may experience issues beyond our control.

 

Please ensure that you properly safeguard your account, password, and other identity credentials. When you use the Tarsier camera, we will identify you through your account, password, and other identity credentials. Once you disclose any of the aforementioned information, you may suffer losses and it may have adverse effects on you. If you discover that your account, password, and/or other identity credentials may have been or have been leaked, please contact us immediately so that we can take appropriate measures in a timely manner to avoid or minimize related losses.

 

  1. Managing Your Personal Information

 

(I) Access, Update, and Deletion

 

We encourage you to update and modify your personal information to ensure its accuracy and effectiveness.

 

You can access and modify your username, login information, and other details through [Settings] - [Account].

 

You can directly request us to delete your personal information in the following situations:

 

1Our collection and use of your personal information violate relevant laws and regulations;

2We collect and use your personal information without your consent;

3Our collection and use of your personal information violate the agreement with you;

4Other situations stipulated by laws and regulations.

 

You can also contact us through the feedback channels listed in the "How to Contact Us" section of this policy for assistance. We will adopt appropriate technical means or contact channels to ensure that you can access, update, and delete your personal information or other information provided when using the Tarsier camera. Unless otherwise specified by laws and regulations, after you correct or delete your personal information, we may not immediately delete the corresponding information from the backup system, but we will correct or delete such information during backup updates.

 

(II) Account Deletion

 

After deleting your account, you will no longer be able to log in and use our products and services with that account. Any remaining rights and benefits generated during the use of our products and services under that account will be voided. The content, information, data, records, etc., under that account will be deleted or anonymized, except as otherwise required by law or regulatory authorities. Once your account deletion is complete, it cannot be recovered.

 

You can also contact us through the feedback channels listed in the "How to Contact Us" section of this policy for assistance. We will adopt appropriate technical means or contact channels to ensure that you can access, update, and delete your personal information or other information provided when using the Tarsier camera. Unless otherwise specified by laws and regulations, after you correct or delete your personal information, we may not immediately delete the corresponding information from the backup system, but we will correct or delete such information during backup updates.

 

If you decide to delete your account after careful consideration, you can submit an account deletion request through [Settings] - [Account] - [Delete Account]. Select to delete the account if the conditions for account deletion are met. Once the deletion is successful, we will immediately stop providing you with products or services. If you fail to apply successfully, you can also contact our platform customer service or use the feedback channels listed in the "How to Contact Us" section of this policy. We will respond to your request within 15 working days. After you delete your account, we will stop providing you with products or services.

 

(III) Changing the Scope of Your Authorization and Consent

 

You always have the option to disclose your personal information to us or not. Some personal information is necessary for using the Tarsier camera, but most other information is up to your discretion. You can change the scope of your authorization for us to continue collecting information or withdraw your authorization by deleting information, turning off device functions, deleting your account, etc.

 

After withdrawing your authorization, we will no longer be able to provide you with the services corresponding to the withdrawn authorization and will no longer process your relevant information. However, your decision to withdraw your authorization will not affect the previous information processing based on your authorization.

 

(IV) Obtaining Copies of Personal Information

 

If you need a copy of your personal data, you can contact us through the feedback channels listed in the "How to Contact Us" section of this policy. After verifying your identity, we will provide you with a copy of your personal information in our services (including basic information and identity information), except as otherwise specified by laws and regulations or stipulated in this policy.

 

(V) Restricting Automatic Decision-Making by Information Systems

 

In some business functions, we may make decisions solely based on non-human automatic decision-making mechanisms such as information systems and algorithms. If these decisions significantly affect your legitimate rights and interests, you have the right to request an explanation from us, and we will provide appropriate remedies.

 

(VI) Responding to Your Requests

 

To ensure security, you may need to provide a written request or otherwise prove your identity. We may first require you to verify your identity before processing your request. For your reasonable requests, we do not charge a fee in principle, but for repeated requests that exceed reasonable limits, we may charge a certain cost as appropriate. We may reject requests that are unreasonably repetitive, require excessive technical means (e.g., developing a new system or fundamentally changing existing practices), pose risks to the legitimate rights and interests of others, or are highly impractical (e.g., involving information stored on backup tapes).

 

In the following situations, we will not be able to respond to your request:

 

1Related to our fulfillment of obligations stipulated by laws and regulations;

2Directly related to national security and defense security;

3Directly related to public safety, public health, and significant public interests;

4Directly related to criminal investigations, prosecutions, trials, and judgment execution;

5We have sufficient evidence that you have subjective malice or abuse of rights;

6For the purpose of safeguarding your or other individuals' significant legitimate rights and interests such as life and property, but it is difficult to obtain your consent;

7Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals and organizations;

8It involves commercial secrets.

 

  1. Third-Party Services

Tarsier camera may access or link to social media or other services provided by third parties (including websites or other forms of services). Including:

 

1You can use the "Share" button to share some contents of Tarsier camera to third-party services, or you can share contents of third-party services to the live broadcasting platform. These functions may collect your information (including your log information) and may install COOKIES on your device to ensure the normal operation of the above functions;

2We provide links to you through advertisements or other ways of our services so that you can link to the services or websites of third parties;

3Other situations of accessing or linking to third-party services.

 

Such third-party social media or other services are operated by relevant third parties. Your use of such third-party social media services or other services (including any information you provide to such third parties) shall be subject to the third party's own service terms and information protection policies (not this policy). You need to carefully read their terms. This policy only applies to the personal information we collect and does not apply to the services provided by any third party or the rules for the use of third-party information. If you find that these third-party social media or other services pose risks, we recommend that you terminate the relevant operations to protect your legitimate rights and interests and contact us promptly.

 

  1. Protection of Minors

 

We recommend that any minors should obtain the consent of their parents or other guardians (hereinafter referred to as "guardians") before participating in online activities. We will protect the relevant information of minors in accordance with the relevant laws and regulations.

 

We encourage guardians to guide minors in using Tarsier camera.

 

  1. Revision and Notification

To provide you with better services, we may modify the terms of this policy in due course based on the updates of products or services and the relevant requirements of laws and regulations. Such modifications constitute a part of this policy. We will announce any changes made to this policy on this page. For major changes, we will also provide more prominent notifications (including website announcements, push notifications, pop-up prompts, or other methods). The major changes referred to in this policy include but are not limited to:

 

1There are significant changes in our service model. Such as the purpose of handling personal information, the types of personal information processed, the way of using personal information, etc.;

2There are significant changes in our ownership structure. Such as changes in ownership caused by business adjustments, bankruptcies, mergers and acquisitions, etc.;

3There are significant changes in the main targets of personal information sharing, transfer, or public disclosure;

4There are significant changes in your rights and the way you exercise them in terms of participating in the processing of personal information;

5There are significant changes in our responsible departments for handling personal information security, contact information, and complaint channels;

6Other important situations or situations that may seriously affect your personal rights and interests occur.

 

If you disagree with such changes, you can choose to stop using Tarsier camera; if you continue to use Tarsier camera, it means that you have fully read, understood, and agreed to be bound by the revised policy.

 

We will always put your satisfaction first in any of our modifications. We encourage you to review our privacy policy every time you use Tarsier camera.

 

  1. How to Contact Us

Visinse Technology Co., Ltd. and Chengdu CALF Technology Co., Ltd. will protect your information in accordance with this policy. We have set up a dedicated department for personal information protection. If you have any complaints or reports about network information security, or if you have any questions, opinions, or suggestions regarding this policy, your information, or issues related to this policy or the privacy measures of Tarsier camera, please contact our coordinator. You can send an email to global@calfglobal.com; market@visinse.cn.