Last Updated: February 14, 2023
Security of Personal Data
Protecting the personal privacy of members is an important business
philosophy of Alpha Intelligence. Without your consent, we will never
provide the personal information of members to any third parties.
Members should properly keep their network passwords and personal
information confidential, and do not provide any personal information,
especially network passwords, to anyone. After using the various
service functions provided by the Alpha Intelligence website, you must
remember to log out of your account. If you share the computer with
others or use a public computer, remember to close the browser
Information Security Policy
- Various safety management regulations must comply with
relevant government laws and regulations (such as: criminal law,
state secret protection law, archives law, patent law, trademark
law, copyright law, information security management law,
personal data protection law and government information
disclosure law, etc.).
- According to the company's organizational and business
objectives, we will carefully evaluate the needs and goals of
information security operations and ensure that the company's
key businesses continue to operate without interruption.
- We carry out asset inventory, risk assessment and management
according to the requirements of internal and external
stakeholders and information security operations before and after
the operation, effectively manage the risks faced by information
assets, and reduce the risks to an acceptable range.
- Our senior executives should actively participate in information
security management activities, provide support and
commitment to information security, hold regular high-level
meetings to ensure the overall continuous improvement of
information security maintenance, and prevent unauthorized
- All employees of the company (including contracts and
employees) must abide by the company's information security
incident notification mechanism and report the information
security incidents or information security weaknesses found.
People who fail to comply with this policy or have made any
information security violations, will be handled in accordance with
- All suppliers of the company must sign a confidentiality
agreement and abide by the provisions of this policy and related
procedures. An unauthorized use of information is forbidden.
- We will regularly formulate an internal information audit plan,
review the situation of the company's information security
protection, and generate corrective measures based on the audit
Personal data inquiry, correction method, response channel
If you have any questions relate to personal data incident
processing/exercise of rights (inquiry and reading, making copies,
supplements, or corrections, stop computer collection, processing
and use, and deletion)/complaints and appeals, etc., you can
contact the customer service center. We will work with you as
soon as possible. Depending on your request, certain service
might charge extra fee.