SWFT Blockchain User Agreement and Privacy Policy

This policy only applies to the "SWFT Blockchain" products or services of Explorerx Digital Limited.
Lastest updated: April 09, 2024
If you have any questions, comments or suggestions, please contact us through the following contact methods:
• Email: contact@swft.pro
• Telegram https://t.me/swfcoin
This policy will help you understand the following:
• 1. How do we collect and use user information
• 2. How do we use cookies and similar technologies
• 3. How do we share, transfer, and publicly disclose user information
• 4. How do we protect user information
• 5. Your rights
• 6. How do we deal with children’s personal information
• 7. How do we update this policy
• 8. How to contact us
We are well aware of the importance of user information to you, and will do our best to protect your user information safe and reliable. We are committed to maintaining your trust in us and abide by the following principles to protect your user information: principle of consistent rights and responsibilities, principle of clear purpose, principle of choice and consent, principle of least sufficient, principle of ensuring security, principle of subject participation, principle of openness and transparency, etc. . At the same time, we promise that we will take corresponding security protection measures to protect your user information in accordance with the developed security standards of the industry
Please read and understand this "Privacy Policy" carefully before using our products (or services).

1.How we collect and use your user information

1)Information we collect and use during the us of our products or services

We will only collect and use your user information for the business functions described in this policy. The purpose of collecting user information is to provide you with products or services. You have the right to choose whether to provide this information, but in most cases, if you do not provide it, we may not be able to provide you with the corresponding services, and we cannot respond to the problems you encounter:
• 1. Application operation: In order to conduct user statistics and optimize operations, we may need to collect the following user information: device identification code (such as IMEI, AndroidID, device serial number), and device manufacturer, device brand, device model, and Android version.
• 2. Notification
Notification from this application is provided by Igexin SDK with technical support.
● Name of the SDK: Igexin SDK
● Service type: message push
In order to achieve the real-time performance of notification, as well as achieve the smart notification based on user portrait and the occasional notify function based on offline location information, the following information of you needs to be collected and used during the use of this application:
● Create user ID: In order to create the user ID required for the notification service, we may need to collect the following device information: such as IMEI, Android ID, device serial number, MAC, Android Advertisement ID, IMSI, etc. The above information will be used to generate a unique notification target id, namely CID.
● Improve notification capability: In order to provide a better notification service and experience, such as using the manufacturer’s system push capability, we may need to collect the following device information: device manufacturer, device brand, device model, Android version, Rom information.
● Smart notification function: In order to implement refined notification operations based on user portraits and recommend push content that better meets your needs, we may need to collect the following application information: APP installation list, APP active list information.
● Circumstance notification function: In order to achieve the ability to push notification based on the user’s offline location and recommend push content that is more suitable for you, we may need to collect the following user information: network information (including IP address, MAC information, WIFI list, Base station information), and location-related information (latitude and longitude).
If you do not allow the above-mentioned information to be collected by us, or disagree to allow the relevant mobile phone permissions, the application may not function properly.
• 3.Three-party login and sharing
We use a third-party (Shanghai Youkun Information Technology Co., Ltd., referred to as "MobTech") MobTech ShareSDK service to provide you with social sharing, third-party login social sharing, and third-party login functions. In order to successfully implement this function, you need to authorize MobTechSDK to provide corresponding services; after your authorization, MobTech will collect your relevant personal information. Regarding the types and uses of information collected by MobTech, personal information protection rules and withdrawal mechanisms, etc., please refer to the privacy policy (www.mob.com/about/policy) on the MobTech official website (www.mob.com).
If you do not allow the above-mentioned information to be collected by us, or disagree to allow the relevant mobile phone permissions, the application may not function properly.
The above information you provide will continue to authorize us to use it during your use of this service. When you stop using this service, we will stop using and delete the above information.

2)Exception with authorization and consent

Please understand that in accordance with laws, regulations and relevant national standards, we do not need to obtain your and your user’s authorization to collect and use your and your user’s information in the following situations:
• 1. It is directly related to national security and national defence security;
• 2. It is directly related to public safety, public health, and major public interests;
• 3. Directly related to criminal investigation, prosecution, trial and execution of judgments;
• 4. In order to protect your or other individuals’ life, property and other major legal rights, but it is difficult to obtain the consent of the person;
• 5. The collected user information of you and users is disclosed to the public by yourself;
• 6. The user information of you and your users collected from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels;
• 7. Necessary for signing or performing a contract according to your requirements;
• 8. Necessary for maintaining the safe and stable operation of software and related services, such as discovering and handling faults in software and related services;
• 9. The personal information controller is a news organization and is necessary for it to carry out legal news reports;
• 10. When academic research institutions conduct statistical or academic research based on the public interest, and when they provide academic research or described results to the outside, they de-identify the personal information contained in the results.
• 11. Other circumstances stipulated by laws and regulations.

2.How we use cookies and similar technologies

1)Cookie

To ensure the proper functioning of the website, we will store small data files called cookies on your computer or mobile device. Cookies usually contain identifiers, site names, and some numbers and characters. With the help of cookies, websites can store your visit preference data.
We will not use cookies for any purpose other than those described in this policy. You can manage or delete cookies according to your preferences. You can clear all cookies saved on your computer, and most web browsers have a feature to block cookies. But if you do this, you need to personally change the user settings every time you visit our website.

2)Web beacons and pixel tags

In addition to cookies, we also use other similar technologies such as web beacons and pixel tags on our websites. For example, the email we send you may contain a click-through URL that links to the content of our website.
If you click the link, we will track the click to help us understand your product or service preferences and improve customer service. A web beacon is usually a transparent image embedded in a website or email. With the help of the pixel tags in the email, we can know whether the email has been opened. If you do not want your activities to be tracked in this way, you can unsubscribe from our mailing list at any time.

3)Do Not Track

Many web browsers have a Do Not Track function, which can post Do Not Track requests to websites. Currently, major Internet standards organizations have not established relevant policies to regulate how websites should respond to such requests. But if Do Not Track is enabled in your browser, all our websites will respect your choice.

3.How do we share, transfer, and publicly disclose your user information

1)Information sharing

We will not share your user information with any company, organization, or individual other than Explorerx Digital Limited, except in the following cases::
• 1. Sharing with explicit consent: After obtaining your explicit consent, we will share your user information with other parties.
• 2. We may share your user information externally in accordance with laws and regulations, or mandatory requirements of government authorities.
• 3. Sharing with authorized partners: only to achieve the purpose stated in this policy, some of our services will be provided by authorized partners. We may share some of your user information with our partners to provide better customer service and user experience. We will only share your user information for legal, legitimate, necessary, specific and clear purposes, and will only share user information necessary to provide services. In order to better operate and improve technology and services, you agree that we and our authorized partners can use the collected information for other services and purposes under the premise of compliance with relevant laws and regulations.
For companies, organizations and individuals with whom we share user information, we will sign strict confidentiality agreements with them, requiring them to handle user information in accordance with our instructions, this privacy policy, and any other relevant confidentiality and security measures.

2)Transfer

We will not transfer your user information to any company, organization or individual, except in the following cases:
• 1. Transfer with explicit consent: After obtaining your explicit consent, we will transfer your user information to other parties;
• 2. When it involves a merger, acquisition or bankruptcy liquidation, if it involves the transfer of user information, we will require the new company or organization that holds your user information to continue to be bound by this privacy policy, otherwise we will require the company, The organization re-seeks authorization and consent from you.

3)Public disclosure

We will only publicly disclose your user information under the following circumstances:
• 1. After obtaining your explicit consent;
• 2. Disclosure based on law: We may publicly disclose your user information when required by law, legal procedures, litigation, or compulsory government authorities.

4)Exceptions for prior authorization and consent when sharing, transferring, and publicly disclosing information

Please understand that, in accordance with laws, regulations and relevant national standards, in the following situations, we do not need to obtain the authorization and consent of you and your users to share, transfer, and publicly disclose information about you and your users:
• 1. It is directly related to national security and national defense security;
• 2. It is directly related to public safety, public health, and major public interests;
• 3. Directly related to criminal investigation, prosecution, trial and execution of judgments;
• 4. In order to protect your or other individuals’ life, property and other major legal rights, but it is difficult to obtain the consent of the person;
• 5. Information that you and your users disclose to the public on their own;
• 6. Collected from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels.

4.How we protect your user information

• (1) We have used safety protection measures that comply with industry standards to protect the user information you provide to prevent unauthorized access, public disclosure, use, modification, damage or loss of data. We will take all reasonable and feasible measures to protect your user information. For example, the exchange of data (such as credit card information) between your browser and the "service" is protected by SSL encryption; we also provide https secure browsing for the website; we will use encryption technology to ensure the confidentiality of data; we will use A trusted protection mechanism prevents malicious attacks on data; we will deploy an access control mechanism to ensure that only authorized personnel can access user information; and we will organize security and privacy protection training courses to strengthen employees’ awareness of the importance of protecting user information .
• (2) Our data security capabilities: Explorerx Digital Limited. has established a data classification and grading system, data security management specifications, and data security development specifications to manage the storage and use of standardized information.
• (3) We will take all reasonable and feasible measures to ensure that irrelevant user information is not collected. We will only retain your user information for the period required to achieve the purpose stated in the policy, unless it is necessary to extend the retention period or is permitted by law.
• (4) The Internet is not an absolutely secure environment, and emails, instant messaging, and communication with other users are not encrypted. We strongly recommend that you do not send user information through such methods. Please use a complex password to help us ensure the security of your account.
• (5) The Internet environment is not 100% secure. We will try our best to ensure or guarantee the security of any information you send to us. If our physical, technical, or management protection facilities are damaged, resulting in unauthorized access, public disclosure, tampering, or destruction of information, resulting in damage to your legitimate rights and interests, we will bear the corresponding legal responsibility.
• (6) In the unfortunate event of a user information security incident, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, and you can take precautions on your own and suggestions to reduce risks, remedial measures for you, etc. We will promptly inform you about the incident by email, letter, telephone, push notification, etc. If it is difficult to inform the user information subject one by one, we will take a reasonable and effective way to issue an announcement. At the same time, we will also proactively report the handling of user information security incidents in accordance with the requirements of the regulatory authorities.

5.Your rights

In accordance with relevant laws, regulations, standards, and the common practices of various countries and regions, we guarantee that you exercise the following rights with respect to your user information:

1)Access your user information

You have the right to access your user information, except for exceptions provided by laws and regulations. If you want to exercise your data access rights, you can do so by yourself:
• Email of the person in charge of user information protection: contact@swft.pro
If you are unable to access the user information through the above link, you can use our web form to contact at any time, or send an email to contact@swft.pro. We will respond to your access request within 30 days.
As long as we don’t need to invest too much, we will provide you with other user information generated during your use of our products or services. If you want to exercise data access rights, please send an email to contact@swft.pro.

2)Correct your user information

When you find that the user information we process about you is wrong, you have the right to ask us to make corrections. You can apply for correction through the methods listed in "(1) Access to your user information".
If you are unable to correct the user information through the above link, you can use our web form to contact at any time, or send an email to contact@swft.pro. We will respond to your correction request within 30 days.

3)Delete your user information

In the following situations, you can request us to delete user information:
• 1. If our handling of user information violates laws and regulations;
• 2. If we collect and use your user information without your consent;
• 3. If our handling of user information violates our agreement with you;
• 4. If you no longer use our products or services, or you cancel your account;
• 5. If we no longer provide you with products or services.
If we decide to respond to your deletion request, we will also notify the entities that have obtained your user information from us and require them to delete them in a timely manner, unless laws and regulations provide otherwise, or these entities obtain your independent authorization.
When you delete information from our service, we may not immediately delete the corresponding information from the backup system. We will safely store your information until the backup can be cleared or anonymized.

4)Change the scope of your authorization

Each business function requires some basic user information to be completed (see "Part One" of this policy). For the collection and use of additional user information, you can give or withdraw your authorization and consent at any time. You can do it yourself in the following ways:
• Email of the person in charge of user information protection: contact@swft.pro
After you withdraw your consent, we will no longer process the corresponding user information. At the same time, please note that your withdrawal of authorization may result in certain legal consequences. For example, we may not be able to continue to provide you with corresponding services or specific functions. However, your decision to withdraw your consent will not affect the previous authorization based on your authorization. User information processing carried out.

5)User information subject obtains a copy of user information

You have the right to obtain a copy of your user information, you can do it yourself in the following ways:
• Email of the person in charge of user information protection: contact@swft.pro
Under the premise of technically feasible, such as data interface matching, we can also directly transmit a copy of your user information to a third party designated by you according to your requirements.

6)Constraint information system automatic decision

In some business functions, we may only make decisions based on non-manual automatic decision-making mechanisms including information systems and algorithms. If these decisions significantly affect your legal rights, you have the right to ask us for an explanation, and we will also provide appropriate compensation.

7)Respond to your above request

To ensure safety, you may need to provide a written request or prove your identity in other ways. We may ask you to verify your identity before processing your request.
We will reply within thirty days. If you are not satisfied, you can also complain through the following channels:
• Email: contact@swft.pro
• Telegram https://t.me/swfcoin
For your reasonable request, we do not charge fees in principle, but for repeated requests that exceed reasonable limits, we will charge a certain cost depending on the circumstances. For those that are unreasonably repeated, require excessive technical means (for example, the need to develop new systems or fundamentally change existing practices), bring risks to the legitimate rights and interests of others, or are very impractical (for example, involving information stored on backup tapes) Request, we may reject it. Please also understand that due to security considerations, requirements of relevant laws and regulations, or technical restrictions, we may not be able to respond to certain requests from you and your users, such as the following situations:
• 1. It is related to the performance of the obligations stipulated by laws and regulations by the user information controller;
• 2. It is directly related to national security and national defense security;
• 3. It is directly related to public safety, public health, and major public interests;
• 4. Directly related to criminal investigation, prosecution, trial and execution of judgments;
• 5. The user information controller has sufficient evidence to show that the user information subject has subjective malice or abuse of rights;
• 6. It is difficult to obtain the consent of the person in order to protect the life, property and other major legal rights of the user information subject or other individuals;
• 7. Responding to the request of the user information subject will cause serious damage to the lawful rights and interests of the user information subject or other individuals or organizations;
• 8. Involving commercial secrets.

6.How do we process children's personal information

We attach great importance to the protection of children's personal information, and our products, websites and services are mainly for adults. Without the consent of their parents or guardians, children should not create their own user accounts. Although local laws and customs define children differently, we treat anyone under the age of 14 as a child.
In the case of collecting child user information with the consent of the parent or guardian, we will only store, use or publicly disclose this information when permitted by law, the parent or guardian's explicit consent, or necessary to protect the child, otherwise we will try to delete it as soon as possible related data.
In view of the limitations of existing technology and business models, it is difficult for us to proactively identify children’s personal information. If you find that we have collected children’s personal information without knowing it or without the prior consent of a verifiable guardian, You can contact us in time, and we will try to delete it in time after discovering it. If we find the aforementioned situation ourselves, we will delete it in time, unless the law requires us to keep it.

7.How do we update this policy

Our privacy policy may change.
Without your explicit consent, we will not reduce your rights in accordance with this privacy policy. We will post any changes to this policy on this page.
For major changes, we will also provide more noticeable notifications (including for some services, we will send notifications by email to explain the specific changes to the privacy policy).
The major changes referred to in this policy include but are not limited to:
• 1. Significant changes have taken place in our service model. Such as the purpose of processing user information, the type of user information processed, and the way the user information is used, etc.;
• 2. Significant changes have taken place in our ownership structure and organizational structure. Such as changes in owners caused by business adjustments, bankruptcy mergers, etc.
• 3. Changes in the main objects of user information sharing, transfer or public disclosure;
• 4. Your right to participate in user information processing and how to exercise it has undergone major changes;
• 5. When the department responsible for handling user information security, contact information and complaint channels change;
• 6. When the user information security impact assessment report shows that there is a high risk.
• 7. We will also archive the old version of this policy for your review.

8.How to contact us

If you have any questions, comments or suggestions about this privacy policy, please contact us via the following method: contact@swft.pro
We have set up a dedicated department for user information protection (or user information protection specialist), you can contact them in the following ways:
• Email of the person in charge of user information protection: contact@swft.pro
Under normal circumstances, we will reply within 30 days.
If you are not satisfied with our response, especially our user information processing behavior has harmed your legitimate rights and interests, you can also seek a solution through the following external channels:
• Email: contact@swft.pro
• Telegram https://t.me/swfcoin