Privacy Policy

Last Updated: February 14, 2023

Security of Personal Data

Protecting the personal privacy of members is an important business philosophy of Alpha Intelligence. Without your consent, we will never provide the personal information of members to any third parties. Members should properly keep their network passwords and personal information confidential, and do not provide any personal information, especially network passwords, to anyone. After using the various service functions provided by the Alpha Intelligence website, you must remember to log out of your account. If you share the computer with others or use a public computer, remember to close the browser window.

Information Security Policy

  1. Various safety management regulations must comply with relevant government laws and regulations (such as: criminal law, state secret protection law, archives law, patent law, trademark law, copyright law, information security management law, personal data protection law and government information disclosure law, etc.).
  2. According to the company's organizational and business objectives, we will carefully evaluate the needs and goals of information security operations and ensure that the company's key businesses continue to operate without interruption.
  3. We carry out asset inventory, risk assessment and management according to the requirements of internal and external stakeholders and information security operations before and after the operation, effectively manage the risks faced by information assets, and reduce the risks to an acceptable range.
  4. Our senior executives should actively participate in information security management activities, provide support and commitment to information security, hold regular high-level meetings to ensure the overall continuous improvement of information security maintenance, and prevent unauthorized access actions.
  5. All employees of the company (including contracts and employees) must abide by the company's information security incident notification mechanism and report the information security incidents or information security weaknesses found. People who fail to comply with this policy or have made any information security violations, will be handled in accordance with relevant regulations.
  6. All suppliers of the company must sign a confidentiality agreement and abide by the provisions of this policy and related procedures. An unauthorized use of information is forbidden.
  7. We will regularly formulate an internal information audit plan, review the situation of the company's information security protection, and generate corrective measures based on the audit report.

Personal data inquiry, correction method, response channel

If you have any questions relate to personal data incident processing/exercise of rights (inquiry and reading, making copies, supplements, or corrections, stop computer collection, processing and use, and deletion)/complaints and appeals, etc., you can contact the customer service center. We will work with you as soon as possible. Depending on your request, certain service might charge extra fee.