Camelot Privacy Policy

Welcome to our products. Camelot (including services provided by the website and other products, hereinafter referred to as "Products and Services") is developed and operated by Camelot INC. (hereinafter referred to as "we"). Ensuring the security of user data and privacy protection is our top priority. This privacy policy outlines the data collected and its processing when you visit and use our products and services.

Please carefully read and fully understand all the rules and key points of this privacy policy before continuing to use our products. Once you choose to use them, you are deemed to agree to the entire content of this privacy policy and consent to us collecting and using your relevant information. If you have any questions about this policy during the reading process, you can contact our customer service for consultation. Please contact us at camelot.chain@gmail.com or through the feedback method in the product. If you do not agree with any part of the agreement or any terms therein, you should stop using our products and services.

This privacy policy helps you understand the following:

  1. How we collect and use your personal information;
  1. How we store and protect your personal information;
  1. How we share, transfer, and publicly disclose your personal information;
  1. How we use Cookies and other tracking technologies.

1. How we collect and use your personal information

Personal information refers to various information recorded electronically or in other ways that can identify a specific natural person's identity or reflect a specific natural person's activities. We collect and use your personal information based on the requirements of the "People’s Republic of China Cybersecurity Law," the "Information Security Technology - Personal Information Security Specification" (GB/T 35273-2017), and other relevant laws and regulations. We strictly adhere to the principles of legitimacy, necessity, and fairness when collecting and using your personal information in the process of using our services and/or products, including but not limited to preferences and interests.

To receive our full product services, you should first register a user account through which we will record relevant data. All information you provide comes from the data you provided during registration. Your account name, password, and your contact information may be used to verify your identity through SMS or email.

2. How we store and protect your personal information

As a general rule, we retain your personal information only for the time required to achieve the purpose of information collection. We will retain your personal information for a strictly necessary period for managing our relationship with you (e.g., when you open an account or access services from our products). For compliance with legal obligations or for the purpose of proving a right or contract in accordance with applicable statutory limitation periods, we may need to retain your archived personal information beyond the mentioned period, and we will not be able to delete it upon your request. When your personal information is no longer necessary for our legal obligations or the purposes it corresponds to under legal limitations or archives, we ensure complete deletion or anonymization.

We use industry-standard security measures to protect the personal information you provide and encrypt critical data to prevent unauthorized access, disclosure, use, modification, damage, or loss. We take all reasonable measures to protect your personal information. We use encryption technology to ensure data confidentiality and trusted protective mechanisms to prevent data from malicious attacks.

3. How we share, transfer, and publicly disclose your personal information

When necessary for managing our daily business activities and serving customers better for legitimate interests, we will use your personal information compliantly and appropriately. We only use this data for our own purposes and do not share it with any third parties.

We may share your personal information externally in accordance with legal regulations or mandatory requirements from government authorities. When we receive requests for the above-disclosed information in compliance with legal regulations, we will require corresponding legal documents such as subpoenas or investigation letters. We believe that information requested from us should be kept as transparent as possible within the limits allowed by law.

In the following situations, sharing, transferring, or publicly disclosing your personal information does not require your prior authorization:

  1. Directly related to national security and defense security;
  1. Directly related to criminal investigation, prosecution, trial, and execution of judgments;
  1. Necessary to protect significant legitimate rights and interests of yourself or others but difficult to obtain your consent;
  1. Personal information you voluntarily disclose to the public;
  1. Collecting personal information from legally disclosed information, such as lawful news reports, government information disclosures, etc.
  1. Necessary for signing and fulfilling contracts as requested by the data subject;
  1. Necessary for maintaining the security and stable operation of the provided products or services, such as discovering and handling faults in products or services;
  1. Other circumstances stipulated by laws and regulations.

4. How we use Cookies and other tracking technologies

To ensure the normal operation of the product, we store small data files called Cookies on your computer or mobile device.Cookies typically contain identifiers, product names, and various numbers and characters. With the help of Cookies, we can store your preferences, product data, and use them to determine if registered users are logged in, enhancing service and product quality, and optimizing user experience.

We use Cookies to store identifiers, product names, and some numbers and characters. With Cookies, we can store your preferences or product data and determine if registered users are logged in, enhancing service and product quality and optimizing user experience.