Welcome to our website. Gzexplorer.com (including services provided by products such as websites, hereinafter referred to as "Products and Services") is developed and operated by GZ Explorer Tech. Co., Ltd. Ensuring user data security and privacy protection is our top priority, and we take your online security seriously.
Please carefully read and confirm that you fully understand all the rules and key points of this privacy policy before continuing to use our products. Once you choose to use it, it is deemed that you agree to all the contents of this privacy policy and agree that we will collect and use your relevant information according to it. If you have any questions about this policy during the reading process, you can contact our customer service for consultation. Please contact us at info@gzexplorer.com Or contact us through feedback methods on the website.
In order to better serve you and let you understand the way your information is used on our website, we explain our privacy policy below.1. How do we collect your personal information
Personal information refers to various types of information recorded in electronic or other ways that can be used alone or in combination with other information to identify a specific natural person or reflect the activities of a specific natural person.
We collect and use your personal information, including but not limited to phone numbers, email addresses, etc., for the purpose of your use of the services and/or products we provide.2. How do we protect your personal information
As a general rule, we only retain your personal information for the time necessary to achieve the purpose of information collection. We will retain your personal information for as long as strictly necessary to manage the relationship with you. For comprehensive consideration of the business and various aspects, we only use this data ourselves and do not share it with any third parties.
We use security measures that meet industry standards to protect the personal information you provide, and encrypt key data therein to prevent unauthorized access, public disclosure, use, modification, damage, or loss. We will take all reasonable and feasible measures to protect your personal information.
We will use encryption technology to ensure the confidentiality of data, and we will use trusted protection mechanisms to prevent malicious attacks on data.