RootData App has been newly upgraded with features such as Token Unlock data. [Click here to download]

Privacy Policy

Last Updated: October 26, 2022

Effective Date: October 26, 2022

1. Special Notice

Welcome to RootData! The providers of RootData services (hereinafter referred to as "we" or "us") deeply understand the importance of your personal information and are committed to protecting its security and reliability. We strive to maintain your trust in us and process your personal information in accordance with the principles of lawfulness, legitimacy, necessity, and integrity. This Privacy Policy (hereinafter referred to as "this Policy") is established to help you fully understand how we collect, use, store, share, and transfer your information when you use RootData, as well as the ways we provide for you to access, update, delete, and protect this information.

Before using RootData, please read this Policy carefully and fully understand its terms. You may make choices you deem appropriate based on the guidance provided in this Policy. We aim to use concise language for terms related to this Policy and provide links to further explanations for your better understanding. If you have any questions, please contact us.

This Policy will help you understand the following:

1.1 How We Collect and Use Your Personal Information

1.2 How We Use Cookies or Similar Technologies

1.3 How We Share, Transfer, and Publicly Disclose Your Personal Information

1.4 How We Protect Your Personal Information

1.5 How You Can Manage Your Personal Information

1.6 How We Handle Minors’ Personal Information

1.7 How This Privacy Policy Is Updated

1.8 How to Contact Us

2. How We Collect and Use Your Personal Information

2.1 Definition of Personal Information: Personal information refers to various types of information recorded electronically or otherwise that relate to an identified or identifiable natural person, excluding anonymized data. Sensitive personal information refers to personal information that, if leaked or illegally used, could easily harm an individual’s dignity, personal safety, or property, including biometric data, religious beliefs, specific identities, medical health information, financial accounts, location tracking, and personal information of minors under 14 years of age.

2.2 We will collect and use personal information you actively provide while using RootData, information generated from your use of RootData, and information obtained from third parties, adhering to the principles of legitimacy, lawfulness, and necessity for the purposes outlined in this Policy. If we intend to use your personal information for purposes not specified in this Policy or use information collected for a specific purpose for other purposes, we will notify you in a reasonable manner and obtain your consent again before such use. Upon account cancellation, we will cease using and delete the aforementioned information.

2.3 Scenarios Where You Must Authorize Us to Collect and Use Your Personal Information

2.3.1 RootData includes core functions that require us to collect, store, and use the following information about you to enable these functions. If you do not provide this information, you will not be able to enjoy our products and services. These functions include:

2.3.1.1 Account Registration, Login, and Verification

When you register for a RootData account, you must provide us with at least your chosen account name, password, and email address. We will verify the validity of your identity by sending an email verification code.

2.3.1.2 Security Assurance

To enhance the security of your use of our products and services, protect your or other users’ personal and property safety from infringement, and better prevent risks such as phishing websites, fraud, network vulnerabilities, and computer viruses, as well as accurately identify violations of laws and regulations, we may collect, use, or integrate your account information, transaction information, and device information to assess account and transaction risks, perform identity verification, detect and prevent security incidents, and take necessary measures such as recording, auditing, analyzing, and handling in accordance with the law.

2.3.1.3 Network Services

When you use RootData’s network services or visit RootData platform webpages, RootData automatically receives and records information from your browser and computer, including but not limited to your IP address, browser type, language used, access date and time, software and hardware characteristics, and webpage records you request.

2.4 Scenarios Where You May Voluntarily Provide Personal Information

2.4.1 To make your use of RootData more convenient or enjoyable and enhance your experience, the following extended functions may collect and use your personal information. If you do not provide this information, you can still use RootData’s core functions, but you may not be able to use these extended functions or may need to repeatedly fill in certain information. These extended functions include:

2.4.1.1 Logging in with Third-Party Accounts

When you log in to RootData using a third-party account (e.g., Twitter, Google), you need to authorize us, in compliance with applicable laws and regulations, to access and share public information you have published or recorded on that third-party platform (e.g., nickname, profile picture, region, gender, or contact email, individually or in combination) to link your third-party account with your RootData account and remember your login identity as our user.

2.4.1.2 Supplementing Account Information

After registering your account, you may continue to fill in your information in the profile section, including your birthday, gender, and company name. Not providing this information will not affect your use of specific technical services.

2.4.1.3 Changing Account Password

When you need to change your account password, please enter a new password to complete the reset. You will need to provide your email account and the SMS verification code we send for verification.

2.4.1.4 Accessing Third-Party Applications

When you use third-party applications integrated into RootData, we may obtain necessary personal information (e.g., device information, operational behavior logs) from the developers or technical service providers of such applications to provide technical support. If sensitive personal information is involved, we will seek your separate authorization. If you refuse to allow us to collect this information, some or all functions of the third-party application may not work, but this will not affect your use of other RootData functions. Developers and technical service providers of such third-party applications may directly collect and use your personal information based on their own privacy policies, which we do not access. We recommend that you read and understand these privacy policies before accepting related services and providing personal information.

2.5 Scenarios Where We May Collect and Use Personal Information Without Your Consent

You are fully aware that we may collect and use your personal information without your authorization in the following circumstances:

2.5.1 Disclosure to third parties or administrative/judicial authorities as required by applicable laws or administrative/judicial requests.

2.5.2 Sharing your personal information with third parties as necessary to provide the products and services you request.

2.5.3 Information you or your guardian have voluntarily made public to society.

2.5.4 Personal information collected from legally disclosed sources, such as legitimate news reports or government public disclosures.

2.5.5 Information necessary to enter into a contract at your request.

2.5.6 Information necessary to maintain the safe and stable operation of our products/services, such as detecting and addressing product/service malfunctions.

2.5.7 Information used by academic research institutions for statistics or research in the public interest, provided that personal information in the results is de-identified when disclosed externally.

2.6 Obtaining Your Personal Information from Third Parties

2.6.1 We may obtain personal information you have authorized to be shared from third parties. We will verify the legality of the source in accordance with agreements with such third parties and use this information only under the premise of compliance with relevant laws and regulations.

3. How We Use Cookies or Similar Technologies

3.1 We may collect and use your information through Cookies or similar technologies and store it as log data.

3.2 By using Cookies, we provide users with a simple, user-friendly, and personalized web experience. A Cookie is a small amount of data sent from a web server to your browser and stored on your computer’s hard drive. We use Cookies to benefit our users—for example, to make the RootData login process faster, you can choose to store your username in a Cookie, making it more convenient for your next login. Cookies help us track the pages and content you connect to, the time you spend on specific RootData services, and the RootData services you choose.

3.3 Cookies allow us to serve you better and faster, enhancing the personalization of your experience on RootData services. You can refuse or manage Cookies or similar technologies through your browser or user selection mechanisms. However, please note that disabling Cookies or similar technologies may prevent us from providing you with the best service experience, and some services may not function properly.

3.4 We use our own Cookies or similar technologies for the following purposes:

3.4.1 Remembering your identity.

3.4.2 Analyzing your use of our services.

3.4.3 Optimizing advertisements.

3.5 If you wish to disable Cookies, you can configure your browser to "reject Cookies" or "notify you when a website sends Cookies." Since our services rely on Cookie support, disabling Cookies may affect your access or prevent you from fully enjoying our services. If you do not disable Cookies, you may receive prompts, such as whether to retain your information for the next visit to simplify login procedures (e.g., auto-login).

4. How We Share, Transfer, or Publicly Disclose Your Personal Information

4.1 Entrustment

4.1.1 If we entrust a third party to process your personal information, we will agree with the entrusted party on the purpose, duration, method, type of personal information, protective measures, and the rights and obligations of both parties, and supervise their personal information processing activities.

4.2 Sharing

4.2.1 We share your personal information only under the principles of lawfulness, legitimacy, minimal necessity, and clear purpose. We conduct a personal information protection impact assessment prior to sharing, adopting effective technical safeguards for the output, transmission, and use of such information. At the contractual level, we strictly require our partners to fulfill their data protection obligations and responsibilities, signing data security protection agreements with business partners before cooperation. We have established a Third-Party Sharing List to clearly and concisely inform you about the primary scenarios where your personal information is shared.

4.2.2 We will not share your information with any third party outside our company, except in the following cases:

(1) With your prior explicit consent or authorization.

(2) As required by applicable laws, legal procedures, or mandatory administrative/judicial requirements.

(3) When sharing your personal information is necessary to enable the core functions of our products/services or provide the services you request.

(4) To provide relevant products/services, display content you may be interested in, or protect your account and transaction security, we may share your personal information with our affiliates under this Policy. We will only share necessary information and remain bound by the purposes stated herein. If our affiliates intend to change the purpose of processing, we will seek your consent again.

(5) We may share your information with partners or other third parties to ensure the smooth delivery of services, but only for lawful, legitimate, necessary, specific, and clear purposes, and only the information required to provide the service will be shared. Our partners are not authorized to use this information for any other purpose.

(6) For academic research purposes.

(7) As stipulated in a specific service agreement or other legal document signed with you.

4.3 Transfer

4.3.1 Transfer refers to the process of transferring control of personal information to another company, organization, or individual.

4.3.2 We will not transfer your personal information to any third party outside our company, except in the following cases:

(1) With your prior explicit consent or authorization.

(2) In the event of a merger, acquisition, or bankruptcy liquidation as our business develops, your information may be transferred as part of such transactions. If personal information transfer is involved, we will require the new entity holding your information to remain bound by this Policy; otherwise, we will request that entity to seek your consent again.

4.4 Public Disclosure

4.4.1 We will not publicly disclose your personal information to any third party outside our company, except in the following cases:

(1) We may disclose your personal information as required by laws, litigation, dispute resolution needs, or lawful requests from administrative/judicial authorities.

(2) At your request and with your explicit consent, we may disclose specified information in the manner you agree to.

5. How We Protect Your Personal Information

5.1 We place great importance on protecting the security of your personal information and have adopted industry-standard security technologies, as well as organizational and managerial safeguards, to minimize the risks of leakage, damage, misuse, unauthorized access, unauthorized disclosure, or alteration of your information.

5.1.1 Data Security Technical Measures

5.1.1.1 We adopt industry-standard security measures, including reasonable policies and technologies, to prevent unauthorized access, use, or modification of your personal information and avoid data damage or loss.

5.1.1.2 Our network services use encryption technologies such as Transport Layer Security (TLS) protocols and provide browsing services via HTTPS to ensure data security during transmission.

5.1.1.3 We encrypt and store your personal information using encryption technologies and isolate it using separation techniques.

5.1.1.4 When using personal information, such as displaying it or performing associated calculations, we employ various data desensitization techniques, including content replacement, to enhance security.

5.1.1.5 We implement strict data access controls and multi-factor authentication technologies to protect personal information from misuse.

5.1.1.6 We use automated code security checks and data access log analysis technologies for personal information security audits.

5.1.2 Other Security Measures to Protect Personal Information

5.1.2.1 We manage and regulate the storage and use of personal information through data classification systems, data security management standards, and data security development protocols.

5.1.2.2 We enforce comprehensive data security controls through confidentiality agreements with information handlers, as well as monitoring and auditing mechanisms.

5.1.2.3 We have established a Data Security Committee with dedicated information protection departments and emergency response organizations to advance and ensure personal information security.

5.1.2.4 We conduct security and privacy protection training courses to enhance employees’ awareness and understanding of personal information protection policies and procedures.

5.2 Please be aware that, despite our efforts to ensure the security of any information you send us, the internet is not 100% secure, and we are not liable for any risks or losses arising from or related to this.

5.3 In the unfortunate event of a personal information security incident, we will comply with legal requirements and promptly inform you of the incident’s basic details and potential impact, the measures we have taken or will take, suggestions for you to mitigate risks independently, and remedial actions for you. We will notify you via email, letter, phone, push notifications, or other methods. If it is impractical to inform each individual, we will issue a reasonable and effective public announcement. Additionally, we will report the incident’s handling to regulatory authorities as required.

6. How You Can Manage Your Personal Information

6.1 We highly value your ability to manage your personal information and strive to ensure your rights to access, correct, delete, withdraw consent, and other legal rights, empowering you to protect your privacy and personal information security.

6.2 Accessing and Correcting Your Personal Information

6.2.1 Unless otherwise stipulated by law, you have the right to access and correct your personal information at any time, including:

(1) Account Information

(2) Followed Information

6.2.2 For other personal information generated during your use of our products and services that you need to access or correct, please contact us at any time. We will respond to your request within the timeframe and manner specified in this Policy.

6.3 Deleting Your Personal Information

6.3.1 You may request the deletion of your personal information through the methods outlined in this Policy in the following cases:

(1) If our processing of personal information violates laws or regulations.

(2) If you no longer use our products/services or cancel your account.

(3) If we cease providing products/services or the retention period expires.

(4) If you withdraw your consent.

(5) If the purpose of processing personal information has been achieved, cannot be achieved, or is no longer necessary.

6.4 Changing or Withdrawing Your Consent

6.4.1 You may change the scope of your authorization for us to collect personal information or withdraw your consent by deleting information, disabling device functions, adjusting privacy settings on the RootData website or software, or other methods. You may also withdraw all authorization for us to collect your personal information by canceling your account.

6.4.2 Please note that RootData may require certain personal information to function. Once you withdraw consent, we will no longer provide the corresponding services, but this will not affect prior processing based on your authorization.

6.5 Canceling Your Account

6.5.1 You may cancel your previously registered account at any time through:

(1) Account Cancellation Process

(2) Contacting Us

6.5.2 Upon account cancellation, all content, information, data, and records under the account will be deleted or anonymized (unless otherwise required by laws or regulatory authorities). Once canceled, the account cannot be restored.

6.6 Responding to Your Requests

6.6.1 If you cannot exercise your rights as described above, you may contact us using the methods outlined in this Policy. For account security, we may require you to verify your identity before processing your request.

6.6.2 We generally do not charge fees for reasonable requests, but for repeated requests exceeding reasonable limits, we may charge a cost-based fee at our discretion. We may reject requests that are unfounded, repetitive, require excessive technical means, pose risks to others’ legitimate rights, or are highly impractical.

6.6.3 Exceptions to Responses

We will not be able to respond to your requests in the following cases:

(1) Related to our obligations under laws and regulations.

(2) Directly related to national security or defense.

(3) Directly related to public safety, public health, or significant public interest.

(4) Directly related to criminal investigations, prosecutions, trials, or enforcement of judgments.

(5) Where we have sufficient evidence of subjective malice or abuse of rights by the individual.

(6) Where responding would harm the life, property, or significant legitimate rights of the individual or others but consent is difficult to obtain.

(7) Where responding would seriously harm the legitimate rights of the individual or other persons/organizations.

(8) Where commercial secrets are involved.

7. How We Handle Minors’ Personal Information

Our products, websites, and services are primarily aimed at adults. Without parental or guardian consent, children may not create their own user accounts.

For cases where children’s personal information is collected with parental consent, we will only use or disclose this information as permitted by law, with explicit parental/guardian consent, or as necessary to protect the child.

Although definitions of "children" vary by local laws and customs, we consider anyone under 18 years of age a minor.

If we discover that we have collected a minor’s personal information without prior verifiable parental consent, we will endeavor to delete the data as soon as possible.

8. How This Privacy Policy Is Updated

8.1 Our Privacy Policy may be updated as needed. We will post any changes to this Policy on the RootData platform. For significant changes, we will provide more prominent notices, such as specific prompts on the browsing page, to explain the details of the changes. Without your explicit consent, we will not diminish your rights under this Policy.

8.2 Significant changes include but are not limited to:

8.2.1 Major changes in our service model.

8.2.2 Changes in the primary recipients of personal information sharing, transfer, or disclosure.

8.2.3 Significant changes in your rights to participate in personal information processing or how they are exercised.

8.2.4 Changes in our contact methods or complaint channels.

8.2.5 When a personal information security impact assessment indicates high risk.

8.3 We will archive previous versions of this Policy for your reference.

9. How to Contact Us

9.1 If you have any questions regarding privacy protection, policy implementation, or website operations, please send your suggestions or inquiries to our email: contact@rootdata.com. Generally, we will respond within fifteen (15) business days.