Here is your updated Privacy Policy:
As the developer of Bilin, SUCCESS LINK OVERSEAS HK LIMITED, we fully understand the importance of personal information to you. We will protect your personal information and privacy in accordance with the provisions of laws and regulations. We have formulated this "Privacy Policy" and hereby specifically remind you: We hope that you will carefully read and understand this Privacy Policy before using Bilin and related services so that you can make appropriate choices.
This Privacy Policy will help you understand:
We will collect and use your information in accordance with the Privacy Policy, but we will not collect personal information through mandatory bundling solely because you agree to this Privacy Policy.
To provide you with the basic function of network acceleration, you need to authorize us to use the virtual network function of your device. When you use the network channel we provide, we will not collect or store any of your private information. Unless it is necessary information required to realize basic business functions or according to laws and regulations, you can refuse to provide it without affecting other functions or services. We will explain which information is necessary item by item in the Privacy Policy.
When you contact customer service and need to send screenshots, you need to authorize access to the device's photo album and media content. If you refuse to provide this permission, you will not be able to use the relevant additional function (sending screenshots to customer service, etc.) normally, but this will not affect your normal use of the basic functions of our products and/or services.
When you use the voice sending function, you need to access the microphone permission. If you refuse to provide this permission, you will not be able to use the relevant additional function normally, but this will not affect your normal use of the basic functions of our products and/or services.
When you update the application version, you need to obtain your storage permission. If you refuse to provide this permission, you will not be able to use the relevant additional function normally, but this will not affect your normal use of the basic functions of our products and/or services. We provide a guest account function. After the App is launched, it will obtain your MAC address information to identify whether you are a new user and issue rewards to you.
Automatic route selection function: In order to recommend the optimal route for you, we provide an automatic route selection function and obtain your geographical location to recommend the optimal route information to you by combining your network conditions.
This Privacy Policy applies to your access and use of our products and services through the Bilin application and the Bilin official website.
The following will help you understand in detail how we collect, use, store, transmit, share, transfer (if applicable), and protect personal information; and help you understand how to query, access, delete, correct, and withdraw authorization for personal information. Among them, the important contents of the clauses concerning your personal information rights have been highlighted in bold. Please pay special attention to them.
1. How We Collect and Use Your Information
We collect information to provide and improve our services. This includes information you provide and information generated automatically when you use the service.
1.1 Service Access and Anonymous Identifiers
To provide a seamless user experience, our Service does not require you to create a traditional account using personal information such as your email or mobile phone number.Instead, when you first launch the application, we automatically generate a unique, anonymous identifier associated with your device. This identifier functions as a "guest account" to enable us to provide and manage our services for you.The primary purposes of using this anonymous identifier are:
To recognize you as a unique user without knowing your real-world identity.
To ensure the continuity of the service you have purchased.
Please note: This identifier is not linked to personal data like your name, email address, or phone number. This approach is designed to maximize your privacy by minimizing the data we collect.
1.2 Connection Acceleration
The core of our service is to provide accelerated links for dedicated and secure data transmission, which means that we do not collect any information transmitted over the network except for the limited exceptions below. When you use the accelerated link, we do not collect any information about the websites you visit or the IP addresses assigned to you, and for our network acceleration services, we do not collect any data stored or transmitted on your device, including any data that applications on your device may transmit over our network.
In certain exceptional circumstances, we may need to collect or monitor traffic over the network: We will record your total bandwidth usage for billing, network operations, and support; there may be temporary maintenance usage data to help debug service issues. This usage data may include information such as login date and time and the IP address you accessed. This personal information will not be retained after troubleshooting is resolved; we may collect and disclose your personal information (including your usage data) or information required to be disclosed by law to government authorities or agencies (including law enforcement agencies) in accordance with court orders, subpoenas, or other legal processes; we implement rule-based automated traffic management to maintain and improve our services. Applying these rules may require real-time analysis of Internet and data traffic, including destination websites or IP addresses, and originating IP addresses. However, as this information is a real-time process, logs about this information are not retained. As we manage a global network, your Internet traffic may be routed through one or more different countries/regions.
1.4 Contact Customer Service
If you choose to send your screenshots and photos to customer service, you need to authorize access to the device's photos and media content. If you refuse to provide this permission, you will not be able to use the relevant additional function (sending screenshots to customer service, etc.) normally, but this will not affect your normal use of the basic functions of our products and/or services.
1.5 Safe Operation
1.5.1 Security Features
We are committed to providing you with safe and trustworthy products and a secure usage environment. Providing high-quality and reliable services and information is our core goal. The information collected to achieve security features is necessary information.
1.5.2 Device Information and Log Information
a. To ensure the safe operation of the software and services, we will collect your hardware model, operating system version number, International Mobile Equipment Identity (IMEI), unique device identifier, network device hardware address, IP address, WLAN access point, Bluetooth, base station, software version number, network access method, type, status, network quality data, operation, usage, service logs IMEI/Mac/android ID/IDFA/OPENUDID/GUID/SIM card IMSI.
b. To prevent malicious programs and for necessary security operations, we will collect information about installed applications or running processes, overall operation and usage of applications, frequency, application crashes, overall installation and usage, performance data, and application sources.
c. We may use your account information, device information, service log information, and information that our affiliates and partners obtain with your authorization or can legally share to judge account security, perform identity verification, and detect and prevent security incidents.
d. We will automatically collect logs when you use Bilin services. These logs may be obtained through cookies, log files, or other means. If you want to learn more about how we use cookies and other similar technologies, please read the Cookie Policy.
1.6 Changes in the Purpose of Collecting and Using Personal Information
Please understand that with the development of our business, there may be adjustments and changes to the functions and services provided by Bilin. In principle, when new functions or services are related to the functions or services we currently provide, the personal information collected and used will have a direct or reasonable connection to the original processing purpose. In scenarios where there is no direct or reasonable connection to the original processing purpose, we will inform you again and obtain your consent before collecting and using your personal information.
1.7 Personal Information Collected and Used Without Consent Under Legal Exemptions
Please understand that in the following situations, according to laws and regulations and relevant national standards, we can collect and use your personal information without obtaining your authorized consent:
a. Directly related to national security and defense security;
b. Directly related to public safety, public health, and major public interests;
c. Directly related to criminal investigation, prosecution, trial, and judgment execution;
d. For the purpose of safeguarding the life, property, and other major legitimate rights and interests of the personal information subject or other individuals, but it is difficult to obtain the consent of the individual;
e. The personal information collected is disclosed to the public by yourself;
f. Collecting your personal information from legally publicly disclosed information, such as legitimate news reports and government information disclosure channels;
g. Necessary for signing or fulfilling a contract according to your requirements;
h. Necessary for maintaining the safe and stable operation of the software and related services, such as discovering and handling faults in the software and related services;
i. Necessary for legitimate news reporting;
j. Necessary for academic research institutions to conduct statistics or academic research based on public interests, and when providing the results of academic research or descriptions externally, to de-identify the personal information contained in the results;
k. Other situations stipulated by laws and regulations.
Please be particularly reminded that if information cannot identify your personal identity alone or in combination with other information, it does not belong to your personal information in the legal sense; when your information can identify your personal identity alone or in combination with other information, or when we combine data that cannot establish contact with any specific personal information with other personal information of yours, during the period of such combination, this information will be treated and protected as your personal information in accordance with this Privacy Policy.
2. How We Use Cookies and Similar Technologies
Cookies and similar technologies such as device information identifiers are common technologies used on the Internet. When you use Bilin and related services, we may use relevant technologies to send one or more cookies or anonymous identifiers to your device to collect and identify information about your access and use of this product. We promise that we will not use cookies for any purpose other than those stated in this Privacy Policy. We mainly use cookies and similar technologies to achieve the following functions or services:
2.1 Ensuring the Safe and Efficient Operation of Products and Services
We may set authentication and security cookies or anonymous identifiers to confirm whether you have securely logged in to the service or whether you have encountered theft, fraud, or other illegal activities. These technologies also help us improve service efficiency and speed up login and response times.
2.2 Helping You Obtain an Easier Access Experience
Using such technologies can help you avoid repeating the steps and processes of filling in your personal information (example: form filling).
2.3 Clearing Cookies
Most browsers provide users with the function of clearing browser cache data. You can perform the corresponding data clearing operation in the browser settings function. If you clear it, you may not be able to use the services or corresponding functions provided by us that rely on cookies.
3. How We Share, Transfer, and Publicly Disclose Personal Information
3.1 Sharing
3.1.1 Sharing Principles
a. Principle of Authorized Consent: We will not share your personal information without your consent. If a third party uses the information for purposes beyond the scope of the original authorized consent, they need to obtain your consent again.
3.2 Transfer
a. We will not transfer your personal information to any other third party unless we obtain your explicit consent.
b. With the continuous development of our business, we may undergo mergers, acquisitions, and asset transfers, and your personal information may be transferred as a result. In the event of the aforementioned changes, we will require the transferee to continue to protect your personal information in accordance with laws and regulations and no less than the security standards stated in this Privacy Policy, otherwise, we will require the transferee to re-obtain your authorized consent.
3.3 Public Disclosure
a. We will not publicly disclose your information unless we comply with national laws and regulations or obtain your consent. We will adopt security protection measures that meet industry standards for the public disclosure of your personal information.
3.4 Personal Information Shared, Transferred, and Publicly Disclosed Without Consent Under Legal Exemptions
Please understand that in the following situations, according to laws and regulations and national standards, we can share, transfer, and publicly disclose your personal information without obtaining your authorized consent:
a. Directly related to national security and defense security;
b. Directly related to public safety, public health, and major public interests;
c. Directly related to criminal investigation, prosecution, trial, and judgment execution;
d. For the purpose of safeguarding the life, property, and other major legitimate rights and interests of you or other individuals, but it is difficult to obtain the consent of the individual;
e. Personal information that you disclose to the public on your own;
f. Collecting personal information from legally publicly disclosed information, such as legitimate news reports and government information disclosure channels.
3.5 List of Third-Party SDKs
To provide the core functionalities of our service, we may need to embed third-party Software Development Kits (SDKs) in the Bilin application. The following is a list of these third-party SDKs, the information they may collect, and their respective privacy policies.
Application Framework SDKs
Third-Party SDK: com.alibaba:arouter-api (ARouter)
Personal Information Type: Application navigation data.
Personal Information Fields: Does not actively collect personal data. Processes internal application navigation paths and parameters for component communication.
Application Scenarios: Manages internal app navigation and communication between different modules to ensure app functionality.
Third-Party Organization Name: Alibaba Group
Third-Party Related Privacy Policy: https://github.com/alibaba/ARouter
Whether Data is Transmitted After De-identification: Yes
Third-Party SDK: EventBus
Personal Information Type: Application event data.
Personal Information Fields: Does not actively collect personal data. Transmits event data between components within the application.
Application Scenarios: Used for decoupled communication between different parts of the application via a publish-subscribe model.
Third-Party Organization Name: greenrobot
Third-Party Related Privacy Policy: https://github.com/greenrobot/EventBus
Whether Data is Transmitted After De-identification: Yes
Advertising Service SDK
Third-Party SDK: Google Mobile Ads SDK
Personal Information Type: User device and network information.
Personal Information Fields: Device identifiers (e.g., Advertising ID), IP address, operating system version, network information (Wi-Fi, 4G, 5G), application crash logs, user interaction data (ad clicks, ad views, etc.).
Application Scenarios: Ad display and management, user ad preference analysis, ad click tracking, ad revenue settlement.
Third-Party Organization Name: Google LLC
Third-Party Related Privacy Policy: https://policies.google.com/privacy
Whether Data is Transmitted After De-identification: Yes
Analytics Service SDK
Third-Party SDK: Firebase Analytics
Personal Information Type: Device information, user behavior data, application usage data.
Personal Information Fields: Device identifiers (e.g., Advertising ID, Android ID), IP address, operating system version, device model, network status information, in-app user behavior (page visits, clicks, event triggers, session duration, etc.), application version information.
Application Scenarios: User behavior analysis, application usage tracking, event statistics, data-driven product optimization.
Third-Party Organization Name: Google LLC
Third-Party Related Privacy Policy: https://firebase.google.com/support/privacy
Whether Data is Transmitted After De-identification: Yes
Crash Reporting SDK
Third-Party SDK: Firebase Crashlytics (formerly Crash Reporting)
Personal Information Type: Device and application crash-related information.
Personal Information Fields: Device identifiers (e.g., Android ID), operating system version, device model, IP address, application crash logs, application version information, network status information.
Application Scenarios: Application crash data collection and analysis, application performance optimization, error log reporting.
Third-Party Organization Name: Google LLC
Third-Party Related Privacy Policy: https://firebase.google.com/support/privacy
Whether Data is Transmitted After De-identification: Yes
User Authentication SDKs
Third-Party SDK: Firebase Authentication
Personal Information Type: User authentication information, device information.
Personal Information Fields: User identity identifiers (e.g., UID), user email, phone number, device identifiers (e.g., Android ID), IP address, user authentication methods (e.g., email, phone, Google account, Facebook, etc.).
Application Scenarios: User registration, login, account management, third-party identity authentication.
Third-Party Organization Name: Google LLC
Third-Party Related Privacy Policy: https://firebase.google.com/support/privacy
Whether Data is Transmitted After De-identification: Yes
Third-Party SDK: Google Account Login
Personal Information Type: User authentication information, device information.
Personal Information Fields: User Google account information (username, email), device identifiers (e.g., Android ID), IP address, operating system version, device model, application permission information.
Application Scenarios: Google account login, user authentication and authorization, cross-platform account synchronization.
Third-Party Organization Name: Google LLC
Third-Party Related Privacy Policy: https://policies.google.com/privacy
Whether Data is Transmitted After De-identification: Yes
Payment Service SDKs
Third-Party SDK: Google Play Billing Library
Personal Information Type: User payment information, device information.
Personal Information Fields: User payment account information (Google Play account), device identifiers (e.g., Android ID), order information (product ID, purchase time, purchase status), IP address.
Application Scenarios: In-app purchases, subscription management, payment function implementation, purchase record tracking.
Third-Party Organization Name: Google LLC
Third-Party Related Privacy Policy: https://policies.google.com/privacy
Whether Data is Transmitted After De-identification: Yes
Third-Party SDK: WeChat Pay SDK
Personal Information Type: Payment information, device information.
Personal Information Fields: Device model, OS, unique device identifier (Android ID/OAID), device identification code, IP address, network information, and operation records. See privacy policy for details.
Application Scenarios: Processing payments through WeChat Pay.
Third-Party Organization Name: Tencent Technology (Shenzhen) Co., Ltd.
Third-Party Related Privacy Policy: https://weixin.qq.com/cgi-bin/readtemplate?lang=en&t=weixin_agreement&s=privacy
Whether Data is Transmitted After De-identification: Yes
Third-Party SDK: Alipay Payment SDK
Personal Information Type: Payment information, device information.
Personal Information Fields: IMEI, IMSI, MAC address, hardware serial number, device model, OS, Android ID, operator information, WIFI status, network type. See privacy policy for details.
Application Scenarios: Processing payments through Alipay.
Third-Party Organization Name: Ant Group Co., Ltd.
Third-Party Related Privacy Policy: https://render.alipay.com/p/c/k2cx0tg8
Whether Data is Transmitted After De-identification: Yes
Social Service SDK
Third-Party SDK: WeChat OpenSDK
Personal Information Type: User authentication information, device information, social interaction data.
Personal Information Fields: User WeChat ID, user avatar, user nickname, device identifiers (e.g., Android ID), IP address, user authorization information.
Application Scenarios: WeChat login, sharing function, payment function, user social interaction.
Third-Party Organization Name: Tencent Technology (Shenzhen) Co., Ltd.
Third-Party Related Privacy Policy: https://www.tencent.com/en-us/privacy-policy.html
Whether Data is Transmitted After De-identification: Yes
Network Request SDKs
Third-Party SDK: Retrofit2
Personal Information Type: Network information.
Personal Information Fields: IP address, network connection status, HTTP request and response data (which may contain personal info depending on the API call).
Application Scenarios: Simplifying HTTP requests to communicate with our servers.
Third-Party Organization Name: Square, Inc.
Third-Party Related Privacy Policy: https://square.github.io/retrofit/
Whether Data is Transmitted After De-identification: Yes
Third-Party SDK: OkHttp
Personal Information Type: Network information.
Personal Information Fields: IP address, network connection status, HTTP request and response data.
Application Scenarios: Efficiently handling network requests and responses.
Third-Party Organization Name: Square, Inc.
Third-Party Related Privacy Policy: https://square.github.io/okhttp/
Whether Data is Transmitted After De-identification: Yes
Data Processing & Storage SDKs
Third-Party SDK: com.google.code.gson:gson
Personal Information Type: Data serialization information.
Personal Information Fields: Used to convert data objects to and from JSON format locally on the device. Does not involve collecting or transmitting sensitive personal information itself.
Application Scenarios: Data serialization and deserialization, API response parsing, local data storage.
Third-Party Organization Name: Google LLC
Third-Party Related Privacy Policy: https://github.com/google/gson
Whether Data is Transmitted After De-identification: No (operates on local data)
Third-Party SDK: com.tencent:mmkv
Personal Information Type: Device storage information.
Personal Information Fields: Key-value data pairs stored locally on the device, such as user settings or tokens.
Application Scenarios: High-performance local data storage and retrieval.
Third-Party Organization Name: Tencent
Third-Party Related Privacy Policy: https://github.com/Tencent/MMKV
Whether Data is Transmitted After De-identification: No (operates on local data)
Image Processing SDK
Third-Party SDK: Glide
Personal Information Type: Device and storage information.
Personal Information Fields: Device storage permissions, cached data, information related to images and multimedia files.
Application Scenarios: Loading, displaying, and caching images and GIFs to optimize performance and resource usage.
Third-Party Organization Name: Bump Technologies (Google)
Third-Party Related Privacy Policy: https://github.com/bumptech/glide
Whether Data is Transmitted After De-identification: No (operates on local data)
UI Component SDKs
Third-Party SDK: SmartRefreshLayout
Personal Information Type: UI interaction information.
Personal Information Fields: User interface interaction data (e.g., swipe gestures). Does not collect sensitive personal data.
Application Scenarios: Implementing pull-to-refresh and load-more functionality in lists.
Third-Party Organization Name: scwang90 (Open Source)
Third-Party Related Privacy Policy: https://github.com/scwang90/SmartRefreshLayout
Whether Data is Transmitted After De-identification: Yes
Third-Party SDK: com.github.li-xiaojun:XPopup
Personal Information Type: UI interaction information.
Personal Information Fields: User interface interaction data. Does not collect sensitive personal data.
Application Scenarios: Displaying various types of pop-up dialogs, menus, and windows.
Third-Party Organization Name: li-xiaojun (Open Source)
Third-Party Related Privacy Policy: https://github.com/li-xiaojun/XPopup
Whether Data is Transmitted After De-identification: Yes
Third-Party SDK: BaseRecyclerViewAdapterHelper (BRVAH)
Personal Information Type: UI interaction information.
Personal Information Fields: Handles data used to populate lists, which may include personal information provided by the user for display purposes.
Application Scenarios: Simplifying the development of complex list views and improving performance.
Third-Party Organization Name: CymChad (Open Source)
Third-Party Related Privacy Policy: https://github.com/CymChad/BaseRecyclerViewAdapterHelper
Whether Data is Transmitted After De-identification: Yes
Third-Party SDK: Lottie
Personal Information Type: No personal information collected.
Personal Information Fields: None.
Application Scenarios: Rendering high-quality vector animations to improve the user interface experience.
Third-Party Organization Name: Airbnb, Inc.
Third-Party Related Privacy Policy: https://github.com/airbnb/lottie-android
Whether Data is Transmitted After De-identification: N/A
3.6 Details of Permissions Applied for in Bilin
Customer Service, Dispute Resolution:
Possible Personal Information Fields Collected / System Permissions Obtained: Personal identity information, communication records, call records and related content.
Purpose of Collection / Obtaining: Used for feedback tracking and user communication.
Message Push:
Possible Personal Information Fields Collected / System Permissions Obtained: System identifier, device status, IDFA, GAID.
Purpose of Collection / Obtaining: To provide users with quick login.
Behavior Verification:
Possible Personal Information Fields Collected / System Permissions Obtained: Network status, network device identifier, etc.
Purpose of Collection / Obtaining: To improve service security and business guarantee.
4. How We Store Personal Information
4.1 Storage Location
In accordance with the provisions of laws and regulations, we will store your personal information collected and generated during our operations within the People's Republic of China. Currently, we will not transfer the above information overseas. If we do transfer it overseas, we will comply with relevant national regulations or seek your consent.
4.2 Storage Period
We will only retain your personal information for the period necessary to achieve the purposes stated in this Privacy Policy, unless otherwise required by laws and regulations. For example, we will retain your account and password information. After the necessary period, we will delete or anonymize your personal information, unless otherwise stipulated by laws and regulations.
5. How We Protect the Security of Personal Information
a. We attach great importance to the security of your personal information and will strive to take reasonable security measures (including technical and management aspects) to protect your personal information and prevent the personal information you provide from being improperly used or accessed, publicly disclosed, used, modified, damaged, lost, or leaked without authorization.
b. We will use encryption technology, anonymization processing, and related reasonable and feasible means no less than those used by our industry peers to protect your personal information, and use security protection mechanisms to prevent your personal information from malicious attacks.
c. We will establish a dedicated security department, security management system, and data security processes to ensure the security of your personal information. We adopt strict data usage and access systems to ensure that only authorized personnel can access your personal information and conduct security audits of data and technology from time to time.
d. Despite the aforementioned reasonable and effective measures taken and the standards required by relevant laws and regulations have been complied with, please understand that due to technical limitations and various possible malicious means in the Internet industry, even if we do our best to strengthen security measures, it is impossible to always guarantee 100% security of information. We will do our best to ensure the security of the personal information you provide to us.
e. You acknowledge and understand that the system and communication network you use to access our services may experience problems due to factors beyond our control. Therefore, we strongly recommend that you take active measures to protect the security of your personal information, including but not limited to using complex passwords, changing passwords regularly, and not disclosing your account passwords and related personal information to others.
f. We will formulate an emergency response plan and immediately activate the emergency response plan in the event of a user information security incident, and strive to prevent the impact and consequences of these security incidents from expanding. Once a user information security incident (leakage, loss) occurs, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, suggestions for you to independently prevent and reduce risks, and remedial measures for you. We will promptly inform you of the relevant situation of the incident through push notifications, emails, and related forms. When it is difficult to inform you one by one, we will take reasonable and effective means to issue an announcement. At the same time, we will also report the handling of user information security incidents in accordance with the requirements of relevant regulatory authorities.
g. Once you leave Bilin and related services and browse or use other websites, services, and content resources, we will not have the ability and direct obligation to protect any personal information you submit on software and websites outside of Bilin and related services, regardless of whether you log in, browse, or use the aforementioned software and websites based on links or guidance from Bilin.
6. Managing Your Personal Information
We attach great importance to your management of personal information and will do our best to protect your rights to query, access, modify, delete, withdraw consent authorization, cancel your account, file complaints and reports, and set privacy functions for your personal information, so that you have the ability to protect your privacy and information security.
6.1 Complaints and Reports
You can file complaints or reports in accordance with our publicized system. If you believe that your personal information rights may be infringed, or find clues of infringement of personal information rights, you can contact our manual customer service through [Homepage] - [Contact Customer Service]. We will review and respond to your complaints and reports within 30 days.
6.2 Access to Privacy Policy
You can view the entire content of this Privacy Policy on the registration page or by logging into your personal account and going to [Homepage] - [Settings] - [Privacy Policy].
6.3 Notification of Cessation of Operations
If we cease operations, we will promptly stop collecting your personal information, notify you of the cessation of operations in the form of individual delivery or announcement, and delete or anonymize your personal information held by us.
7. Provisions for Minors
7.1 General Provisions for Minors
a. If you are a minor under the age of 16, you should read and agree to this Privacy Policy together with your parents or other guardians before using Bilin and related services.
b. If you are a guardian of a minor, please contact us through the contact information disclosed in this Privacy Policy if you have any questions about the personal information of the minor under your guardianship. So that we can immediately investigate and delete such personal information.
8. Revision and Notification of the Privacy Policy
a. In order to provide you with better services, Bilin and related services will be updated and changed from time to time. We will revise this Privacy Policy in due course. These revisions constitute part of this Privacy Policy and have the same effect as this Privacy Policy. Without your explicit consent, we will not reduce the rights you should enjoy under the currently effective Privacy Policy.
b. After this Privacy Policy is updated, we will issue an updated version in Bilin and remind you of the updated content in other appropriate ways so that you can understand the latest version of this Privacy Policy in a timely manner.
9. Contact Us
If you have any complaints, suggestions, or questions about personal information protection issues, you can send your questions to our Data Protection Officer (wenxiao@nn.com). We will review the issues involved as soon as possible and reply within fifteen working days after verifying your user identity.
Update Date: June 7, 2025
Effective Date: March 25, 2024
SUCCESS LINK OVERSEAS HK LIMITED