Search
  • FAITH & INNOVATION
    VALUE & PRAGMATISM

  • SERVICE ADVANTAGES
    Integrated service
    Provide service from investment planning to implementation of the integration
    Data based
    With data as the core of scientific analysis, diagnosis of investment problems, customized solutions
    SERVICE CONTENT

    Integrating our extensive expertise on finance and economic market, the company team takes advantage of our innovative R&D data model to explore and analyze the business and financial data of over 5,000 companies listed on the stock exchanges of the Greater China region (including the Hong Kong Stock Exchange, Shanghai Stock Exchange and Shenzhen Stock Exchange), providing Islamic financial compliance opinions to public companies in the Greater China region in accordance with the internationally recognized assessment standards of AAOIFI institutions. We compile standardized reports equipped with search and filter functions, and issue periodic reports on enterprise assessment and related market enquiry to individual and corporate customers through company website and mobile device. In the days to come, our company shall continue to rely on the robust market and strategic superiority of Hong Kong and the Greater Bay Area, steadily expand business scope and enhance professional service capability, adhere to a standard that incorporates Islamic financial regulations and sustainable development goals (SDGs) of the United Nations, and provide a more professional, more comprehensive market and business consultation service to customers.

    Research & Insights
    Equity Screening: Screening 4K+ companies to determine their Shariah compliance with customizable screening options. Equity Research: Provide in-depth and customized research reports on market, industry for listed companies in greater China region
    Portfolio Solutions & Data Services
    Analyze client’s portfolios and provide purification advice and risk hedging solutions, and the team also able to provide financial databases analyses as well as customized data services base on client's various data processing needs with diversified data interface.
    MEMBERSHIP SYSTEM

    TYC membership system


    1. Classification of registered users (Note: required registration information and disclaimer are different)


    Individual User (Dromedary camel)

    Level classification

    Regular users (Iron badge)  30-300 points

    Intermediate user (silver badge)  301-2000 points

    Advanced User (Golden Camel)  2001-10,000 credits

    Highest level users (red camel)  10,001 and above


    institutions

    Corporate Users (Bactrian Camel Badge)

    Level classification (enterprise-level functions and requirements, both parties can negotiate customization)

    Regular users (Iron badge) 30-300 points

    Intermediate user (silver badge) 301-2000 points

    Advanced User (Golden Camel) 2001-10,000 credits




    2. After login, display the content

    It is divided into three stock markets of Shanghai/Shenzhen/Hong Kong, as well as the list of individual stocks of each subsector. It can screen the complete database of about 5000 listed companies and see the evaluation results. And you can click on individual stocks to obtain detailed report content , where

    - For ordinary users, after login, they can give 30 bonus points, access to 3 detailed reports of the enterprise, no more than 10 times of likes per day, no more than 5 times of comments)

    - Intermediate users, after login, use the points to query and report the content, the number of likes per day is no more than 20 times, the number of comments is no more than 10 times)

    - Power users, each login can be 30 points, and can use the points to access the detailed report content of the enterprise, the number of likes and comments are unlimited.

    - The highest level user (Red camel) 10,001 or above, the number of likes and comments is not limited, and has a certain administrator role, with the permission to delete content and comments.


    -

    3. Point acquisition system

    Points (camel coins) are earned

    - 30 credits for new user registration.

    - Log in every day, get 2 points (continuous check-in, increase by 1 point every day, the highest for 5 consecutive days, send 6 points on the fifth day, continuous to the sixth day, or 2 points, do rolling cycle)

    - Browse for likes and get 1 point (no more than 20 likes per day).

    - Browse and forward, earn 2 points.

    - Earn 5 points by Posting a comment on the forum

    - If you get a "like" on your comment, you get 1 point

    - Score 2 points for comments received from others (you can't reply to your comments yourself).

    - Reading time: 2 points per 30 minutes (depending on the content of the post).

    - Answers to questions adopted as FAQs can be awarded 100 points.

    - Forward and recommend other users to register, and get 30 points

    - If you successfully publish your article on the platform, you can get 100 points (manually awarded points).

    - Authorized to publish a personal official academic paper and PPT related to Islamic finance on TYC platform, and the video content can be awarded 300 points (manually awarded points)

    - Bachelor degree or above in Islamic or Islamic Finance (with proof of education) can directly obtain 300 points (manually awarded points)

    -- Authorizing publication of a personal official work related to Islamic finance (electronic version) on TYC platform for 2000 points (manually awarded points)


    4 Integral consumption

    Click on the report

    - Unlock an enterprise report costing 20 credits

    - Delete comments, deduct 10 points.

    If you do not visit the website for three consecutive months, 100 points will be deducted, and you will be demoted according to the score reduction until the points are deducted.


    TYC Finance Privacy Policy


    Introduction

    TYC Finance ("we") pays attention to protecting users' personal information and personal privacy. This privacy policy contains relevant terms for our collection, processing, storage, use, sharing, transfer, public disclosure and protection of user ("you") personal information (hereinafter referred to as "information").

    We are well aware of the importance of personal information to you and will do our best to protect your personal information safe and reliable. We are committed to maintaining your trust in us and abide by the following principles to protect your personal information: principle of consistent rights and responsibilities, principle of clear purpose, principle of choice and consent, principle of least enough, principle of ensuring security, principle of subject participation, principle of openness and transparency, etc. . At the same time, we promise that we will adopt appropriate security protection measures to protect your personal information in accordance with the mature security standards of the industry.

    Please read and understand this privacy policy carefully before using our services and the business functions contained in the service (hereinafter collectively referred to as "services" or "our services") to help you understand our handling of your personal information The rules and the way you maintain your privacy. If you have any questions about this privacy policy, you can contact us through the contact information we announced in this privacy policy.

    PART ONE

    1, TYC Finance ("we"): refers to the registered address of TYC Finance Co., Ltd.,

    2, TYC Finance website: refers to TYC Finance website (the current website is www.tycfinace.com, if we change the website or add other websites in the future, please refer to the website at that time), the mobile application APP corresponding to TYC Finance website, and related WeChat official account or other official account platforms, WeChat mini programs or other mini programs, and other Internet media that may be involved from time to time.

    3, Affiliated company: refers to any company or institution that a party controls, is controlled, or is under common control with it now or in the future. "Control" refers to the right to directly or indirectly manage or influence the management and policies of the entity, whether through voting equity or through other means such as contracts.

    4, Personal information: refers to various information recorded electronically or in other ways that can identify a specific natural person alone or in combination with other information or reflect the activities of a specific natural person, such as name, date of birth, ID number, personal biometric information, and address , Communication and communication contact information, communication records and content, account passwords, property information, credit information, whereabouts, accommodation information, health and physiological information, transaction information, etc. The definition of such personal information comes from GB/T35273-2020 "Information Security Technology Personal Information Security Specification". If the definition of personal information in this regulatory document changes in the future, or there are new laws, regulations, rules, and regulatory documents This regulatory document shall be replaced by the latest regulations at that time.

    5, Personal sensitive information: refers to personal information that, once leaked, illegally provided, or misused, may endanger personal and property safety, and easily lead to personal reputation, physical and mental health damage, or discriminatory treatment. The definition of such personal sensitive information comes from GB/T35273-2020 "Information Security Technology Personal Information Security Specification". If the definition of personal sensitive information in this regulatory document changes in the future, or there are new laws, regulations, rules, and regulations The regulatory documents have been replaced by sexual documents, etc., and the latest regulations at that time shall prevail.

    6, Unique device identifier: refers to a string of characters compiled into the device by the device manufacturer, which can be used to uniquely identify the corresponding device (for example, the IMEI, IDFA of the mobile phone). If you are using a mobile phone with Android system, limited by the technical characteristics of the Android system, we need to use IMEI as the unique device identifier of your device; but starting from the Android 10 system, based on the technical improvements of the Android system, we will be able to use it Alternative codes are used to identify your device, unless the law is otherwise mandatory, or we have obtained your explicit authorization based on other legitimate and reasonable purposes, we will no longer collect the IMEI of your device.

    PART TWO

    This privacy policy will help you understand the following

    • 1. The governing law and scope of application of this privacy policy;
    • 2. How we collect and use your personal information;
    • 3. How do we store your personal information;
    • 4. How we use cookies and similar technologies;
    • 5. How do we entrust the processing, sharing, transfer and public disclosure of your personal information;
    • 6. How do we protect your personal information;
    • 7. Your right to manage your personal information;
    • 8. Protection of personal information of minors;
    • 9. The update of this privacy policy and how to contact us;
    • ten. Dispute Resolution.

    1. The governing law and scope of application of this privacy policy

    (1) The governing law of this privacy policy

    This privacy policy is formulated and interpreted in accordance with the laws of the People’s Republic of China ("China", excluding Hong Kong Special Administrative Region, Macau Special Administrative Region and Taiwan) (excluding conflict of laws) for the purpose of this privacy policy. Legal jurisdiction.

    The Chinese law referred to in this privacy policy refers to the laws, regulations, rules, regulatory documents, and other forms of regulatory requirements or government orders promulgated by the Chinese legislature or government agencies from time to time.

    (2) The scope of application of this privacy policy

    This privacy policy applies to all services provided by TYC Finance. This privacy policy applies to your visit to the TYC Finance website and use of the services provided by TYC Finance.

    In addition, for certain specific services, we may also formulate specific privacy policies/statements/terms (regardless of the specific title, hereinafter collectively referred to as "specific privacy policies"), these specific privacy policies will more specifically specify that we are in specific services How to collect, process, store, use, share, transfer, publicly disclose and protect your personal information in China. If there is any inconsistency between these specific privacy policies and this privacy policy, the relevant provisions of these specific privacy policies shall be applied in priority when related matters are involved.

    This privacy policy does not apply to information collected by other third-party products or services ("third parties") accessed through our services. Please note that third parties may have their own privacy policies, and you need to read their policies carefully. When you view a webpage created by a third party or use an application developed by a third party, you may find cookies or pixel tags placed on the webpage or application. These cookies or pixel tags are not under our control, and their use is not subject to this privacy policy.

    2. How we collect and use your personal information

    We will only collect and use your personal information for the following purposes described in this privacy policy:

    (1) You register a TYC Finance account to become our user

    1. You use your mobile phone number to register a TYC Finance account

    Before you use our services, you need to register a TYC Finance account to become our user. For the purpose of account registration, you need to provide us with the information used to identify you according to the prompts on the relevant web pages.

    If you are an individual user, you can use your real-name mobile phone number to register in the relevant network page (for this you must ensure that the mobile phone number has been registered with the corresponding telecommunications service provider in your own name, and The phone number is being used by you yourself), you can also register through a third-party account (see below for the introduction of registration through a third-party account). If you are a non-individual user, you need to comply with our relevant regulations and requirements regarding non-individual user registration and real-name authentication.

    If you have not registered a TYC Finance account, you will not be able to become our user, but this will not cause us to prohibit you from visiting the TYC Finance website and using basic browsing or information search functions. If you visit the TYC Finance website without registering a TYC Finance account, we will only request your device permission within the minimum necessary range and with your explicit authorization (you can check the "device sensitive Permission and request purpose comparison table" to further understand the specific permission information and request purpose). However, under any circumstances, you fully understand and agree that we have no intention and should not be deemed to provide any service or establish any business relationship with any object who has not registered a TYC Finance account.

    After you register a TYC Finance account, you can further upload your user profile picture through the relevant web page (the profile picture can be a cartoon image or other pictures that do not contain illegal content, and we do not require you to upload your own photo), or We further provide you with information such as your gender, region, and personal profile (specifically subject to the prompts and actual conditions of the relevant web pages). This information may help us provide you with more personalized services. However, refusing to provide this information does not Will affect the basic functions of your use of our services.

    2. You use a third-party account to register a TYC Finance account

    For your convenience, we allow you to register TYC Finance accounts through Weibo, WeChat, QQ, and other third-party accounts (if any) (for this you must ensure that these third-party accounts have been registered on the corresponding third-party platforms in your own name You have completed the real-name authentication and these third-party accounts are being used by you). After you register a TYC Finance account with a third-party account, we will guide you to bind your mobile phone number to complete the real-name verification (for this you must ensure that the mobile phone number has been registered with the corresponding telecom service provider in your own name, and The mobile phone number is being used by you); if you refuse to bind your mobile phone number, you will not be able to use our information publishing related functions, but it will not affect your visit to the TYC Finance website and use of basic browsing or information search functions.

    In addition, after you register a TYC Finance account with your mobile phone number, you can also choose to bind your TYC Finance account with your own Weibo, WeChat, QQ, email, and other third-party accounts (if any). Later, you can log in to the TYC Finance website through your bound third-party account. Binding a third-party account will help you to log in to the TYC Finance website more conveniently, but not binding will not affect your use of our services.

    In order to achieve the foregoing purposes, we need to obtain and verify your third-party account information from a third party, such as your nickname and avatar in the third party, and other information provided to us by the third party in accordance with its authorization rules.

    In addition to the above, we will not actively obtain your personal information from a third party without your explicit authorization. If future business development needs to obtain your personal information from a third party indirectly, we will strictly abide by Chinese laws Relevant regulations. If the personal information processing activities that we need to carry out our business are beyond the scope of processing that you have authorized and agreed to a third party, we will obtain your express consent before processing your personal information. We will also strictly abide by the relevant provisions of Chinese laws and require third parties to protect the legality of the information they provide.

    (2) You use the services we provide

    Our services include basic business functions and extended business functions. The basic business functions include business functions that meet your most important needs and fundamental expectations when choosing to use TYC Finance, such as information publishing functions (including posting and commenting), interactive communication functions (including Follow, favorite, like, share, and reward). Extended business functions are other business functions in addition to basic business functions, such as search functions, advanced authentication functions, investment transaction functions, system notification functions, adding major event functions, customer service functions, research or brand activities, and user portraits.

    In order to provide you with services, we need to collect, store and use the following information about you. If you are unwilling to provide information related to basic business functions, you will not be able to use the basic business functions provided by us; if you are unwilling to provide information related to extended business functions, you will not be able to use the corresponding extended business functions, but not It will not affect your use of the basic business functions we provide.

    1. Basic business functions include:

    (1) Information browsing function: You can use the information browsing function we provide by visiting the TYC Finance website (including PC and APP). In order to meet the differentiated information browsing needs of users, we provide users with different information browsing layouts on the APP side (currently include following, recommended and popular pages, if there are future adjustments, please refer to the latest situation at that time):

    a. Follow the page: It is convenient for you to browse the content of the posts published by the users you follow, and the information about the individual stocks you follow;

    b. Recommended page: It is the recommended page of personalized information that we provide to you. We recommend information that may be of interest to you based on your browsing records, concerns, favorites, likes, comments and forwarding information on the TYC Finance website. If you are not interested in the information we recommend or want to reduce the recommendation of some information, you can click the "×" in the lower right corner of the corresponding recommendation information, check the reason and then block it accurately;

    c. Hot page: It is convenient for you to browse hot stocks, hot topics, hot creators and hot posts on the TYC Finance website.

    (2) Information release function (including posting and commenting):

    a. When you post or comment, we will record the information you posted and save the operation log information in accordance with the law;

    b. When you publish pictures using the capture/upload picture function, we will ask you to authorize your device's camera/album permissions. If you refuse to authorize this permission, you will not be able to use this function, but it will not affect your use of other functions.

    2, Extended business functions include:

    (1) Search function: When you use the search function, we will record your historical search records and save the operation log information in accordance with the law. Such historical search records usually cannot individually identify your personal identity, do not belong to your personal information, and are not within the scope of this privacy policy. Only when your historical search records are connected with your other information and can identify your personal identity, during the combined use period, we will use your historical search records as your personal information, and conduct it in accordance with this privacy policy. Treatment and protection.

    (2) Advanced authentication function: We provide advanced authentication functions that users can choose to use, including strong real-name authentication (you need to upload a photo of your hand-held ID card), self-media authentication, company agency authentication, and industry expert authentication. When you choose to use the advanced certification function and provide us with relevant information according to the prompts on the certification page and we have passed the review, we will mark you with the advanced certification mark.

    (3) System notification function: In order to facilitate timely push of market trends to you, we provide a system notification function that users can choose to use or not. We currently only provide this function on the APP side. Before you use this function for the first time, we will request in advance the notification permission of your device in the form of a pop-up window. You can choose whether to authorize or not in your device. Under the path of "Settings-Applications and Notifications" (the name or specific path may vary depending on different devices) or under the path of "Settings-Push Settings" on the APP side, turn off or re-enable this permission autonomously. If you refuse to authorize this permission, you will not be able to use this function, but it will not affect your use of other functions.

    (5) Customer service: When you use the customer service consultation and complaint function, in order to facilitate contact with you and help you solve the complaint, we may need you to provide your name, contact information, other information required by our relevant business rules, and your Explicitly agree to provide other information.

    (6) Research or branding activities: We will hold online or offline research or branding activities from time to time. In such research or branding activities, we may need you to provide your relevant personal information. We will conduct relevant research or branding activities. The specific type, purpose and method of collecting information are clearly stated in the activity page or rules in advance.

    (8) User portrait: On the premise of complying with the lawful purpose and due process stipulated by laws, regulations, rules and regulatory documents, we may form your personal information after anonymization, aggregation, desensitization and encryption. Statistics or user portraits (but the portraits cannot identify any individual users), to show and push related services, products or functions for you.

    In addition, we may add new functions or make adjustments to existing functions from time to time. We will strictly abide by the provisions of laws and regulations and the provisions of this privacy policy, and take necessary measures in accordance with the law to protect your data privacy rights and your right to manage your personal information.

    (3) Ensuring the operational safety of TYC Finance's website and related services

    In order to ensure the safe operation of the TYC Finance website and related services, when you use our APP or visit the TYC Finance website, we will collect the device model, operating system, operating system version, resolution, network information, and uniqueness related to your device. Device identifier, browser type/version/kernel, language used, telecom operator, mobile phone network, store the web log information generated during your use of our services. This information is the basic information that must be collected to ensure the normal operation of the TYC Finance website and the provision of services.

    (4) Exceptions for obtaining authorization and consent

    According to Chinese law, the collection and use of your personal information does not require your authorization and consent in the following situations:

    1. Related to our fulfillment of obligations stipulated by laws and regulations;

    2. It is directly related to national security and national defense security;

    3. It is directly related to public safety, public health, and major public interests;

    4. Directly related to criminal investigation, prosecution, trial and execution of judgments;

    5. In order to protect the life, property and other major legal rights of the personal information subject or other individuals, but it is difficult to obtain the authorization and consent of the person;

    6. The personal information involved is disclosed to the public by yourself;

    7. Collect personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels;

    8. Necessary for signing and fulfilling the contract according to your requirements;

    9. It is necessary to maintain the safe and stable operation of the products or services provided, such as discovering and disposing of product or service failures;

    10. It is necessary for news organizations to carry out legal news reports;

    11. When it is necessary for academic research institutions to conduct statistical or academic research based on public interests, and when they provide academic research or description results to the outside, they de-identify the personal information contained in the results;

    12. Other circumstances stipulated by Chinese law.

    3. How do we store your personal information

    (1) Storage area

    The personal information we collect and generate in China will only be stored in China. If it is necessary to transfer personal information collected in China to overseas institutions for the processing of cross-border business, we will strictly implement the provisions of laws, regulations, rules or regulatory documents, and inform you of the purpose of leaving the country, the type of personal information involved, and the identity of the recipient , Security risks, and with your prior consent, and through effective measures such as signing agreements, security assessments, and verifications, the recipient is required to keep the personal information obtained confidential and properly handled, to ensure that the recipient has sufficient capabilities to protect your Personal information.

    (2) Storage period

    Unless otherwise provided by laws, regulations, rules or regulatory documents, we will store your information for the following periods:

    1. We will retain your personal information for the period necessary to achieve the purpose stated in this privacy policy, unless laws, regulations, rules or regulatory documents require or allow the storage of such information for a longer period of time.

    2. Your personal information will become usable and circulated data after being anonymized. We do not need to notify and obtain your consent for the storage and processing of such data.

    4. How do we use cookies and similar technologies

    (1) Cookie

    In order to ensure the normal and efficient operation of the website, provide you with a more relaxed visit experience, and recommend you content that may be of interest to you, we sometimes store small data files called cookies on your device terminal/system. Cookies will help you call up your information when you visit the TYC Finance website later, simplifying the process of filling in your personal information (such as logging in, etc.).

    We will not use cookies for any purpose other than those described in this privacy policy. You can manage or delete cookies according to your preferences. You can clear all cookies saved on your computer or mobile device, and you have the right to accept or reject cookies. Most browsers will automatically accept cookies, but you can usually modify your browser settings to reject cookies according to your needs; in addition, you can also clear all cookies saved in the software. But you may not be able to fully experience some of our convenient service functions.

    (2) Other similar technologies

    At present, we do not use other similar technologies except cookies.

    5. How do we entrust the processing, sharing, transfer, and public disclosure of your personal information

    We will sign strict confidentiality agreements with these third parties and require them to properly protect and process your personal information in accordance with our requirements, this privacy policy and related confidentiality and security measures.

    (2) Sharing

    We will not share your personal information with any company, organization or individual, except in the following circumstances:

    1. Obtain your explicit consent or authorization in advance;

    2. Based on statutory circumstances: in accordance with legal provisions, litigation and other dispute resolution needs, the requirements of judicial or government agencies in accordance with the law;

    3. Sharing with related parties: We may share your personal information with our related companies. However, we only share necessary personal information, and the processing and protection of your personal information by affiliated companies shall also be bound by the purpose stated in this privacy policy. If the affiliated company wants to change the purpose of processing your personal information, it will ask for your authorization and consent again;

    4. Sharing with authorized partners: For the purpose of this privacy policy statement, some of our services are provided by authorized partners, and we may share some of your personal information with partners. For example, when you participate in research or branding activities provided by us, we need to share the personal information (name, mobile phone number, address) you actively provide with our partners in order to arrange the delivery of prizes or tickets. We will only share your personal information for legal, legitimate, necessary, specific and clear purposes, and will only share personal information necessary to provide services. Our partners have no right to use the shared personal information for any other purposes;

    5. Other agreements between you and us regarding personal information sharing.

    Please be aware that even if you have obtained your authorization, we will only share your personal information for legal, legitimate, necessary, specific and clear purposes, and try to de-identify the personal information in the shared content. For companies, organizations and individuals with whom we share your personal information, we will sign strict data protection agreements with them, requiring them to properly protect and handle you in accordance with our instructions, this privacy policy and any other relevant confidentiality and security measures Personal information.

    (3) Transfer

    We will not transfer your personal information to any other companies, organizations or individuals, except in the following circumstances:

    1. With the development of our business, we and our affiliated companies may conduct mergers, acquisitions, asset transfers or other similar transactions. If the relevant transaction involves the transfer of your personal information, we will require the new company, organization and individual holding your personal information to continue to be bound by this privacy policy, otherwise we will require the company, organization and individual to obtain your authorization again agree;

    2. Transfer with your explicit consent, that is, after obtaining your explicit consent, we will transfer your personal information that we have obtained to other parties.

    (4) Public disclosure

    We will only publicly disclose your personal information in the following situations:

    1. Your explicit consent has been obtained;

    2. In cases where your personal information must be provided in accordance with the requirements of Chinese laws, mandatory administrative law enforcement or judicial activities, we may publicly disclose your personal information based on the required personal information types and disclosure methods. To the extent feasible, when we receive the above request for information disclosure, we will require the requesting party to issue corresponding legal documents, such as a subpoena or investigation letter;

    3. Other circumstances permitted by Chinese law.

    (5) Exceptions for obtaining prior authorization and consent when sharing, transferring, and publicly disclosing personal information

    In the following situations, sharing, transferring, and publicly disclosing your personal information does not require your prior authorization and consent:

    1. Related to national security and national defense security;

    2. Related to public safety, public health, and major public interests;

    3. Related to criminal investigation, prosecution, trial, and execution of judgments;

    4. In order to protect your or other individuals' life, property and other major legal rights and interests, but it is difficult to obtain your own consent;

    5. Your personal information disclosed to the public on your own;

    6. Collect personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels;

    7. The circumstances specified in the second and third items of paragraph (4) of this article.

    According to laws and regulations, if personal information that has been de-identified is shared, transferred, and publicly disclosed, and it is ensured that the data recipient cannot recover and re-identify the subject of personal information, we will not need to notify you and obtain information about the processing of such data. Your consent.

    Please note that the information you voluntarily release or even publicly share when using our services may involve your or others’ personal information or even personal sensitive information, such as your posts, comments, text, pictures, etc. contained in the chat content. Various forms of information. Please carefully confirm whether you want to publish or even publicly share relevant information when using our services.

    6. How do we protect your personal information

    (1) Data security measures

    To protect your information security, we strive to adopt various physical, electronic and management security measures that meet industry standards to protect your personal information and prevent your personal information from unauthorized access, public disclosure, use, and modification , Damaged or lost. We will try our best to take all reasonable and feasible measures to protect your personal information. For example, use SSL encryption protection technology when exchanging data between your browser and the "service"; at the same time, provide https secure browsing for the website itself; use encryption technology to ensure data confidentiality; use trusted protection mechanisms to prevent data from being Malicious attacks; deploy access control mechanisms to ensure that only authorized personnel can access personal information; and organize security and privacy protection training courses to strengthen employees’ awareness of the importance of protecting personal information.

    Please note that data that cannot be directly contacted with any specific individual is not personal information. If we combine this type of non-personal information with other information to identify the personal identity of a natural person, or combine it with personal information, such information will be treated as personal information during the combined use.

    (2) Account security

    The Internet is not an absolutely secure environment. We strongly recommend that you use a secure method and use a complex password to help us protect the security of your account. If you find that your personal information has been leaked, especially your account password, please contact us immediately according to the contact information provided in this privacy policy so that we can take corresponding measures.

    (3) Handling of personal information security incidents

    In the unfortunate event of a personal information security incident, we will promptly inform you in accordance with Chinese laws: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, and what you can independently prevent and reduce risks Suggestions, remedies for you, etc. We will promptly inform you of the relevant situation of the incident by email, letter, telephone, push notification, etc. When it is difficult to inform the subject of personal information one by one, we will adopt a reasonable and effective way to issue an announcement. At the same time, we will also proactively report the handling of personal information security incidents in accordance with the requirements of the regulatory authorities.

    7. Your right to manage your personal information

    In accordance with Chinese laws and with appropriate reference to the prevailing practices of other countries or regions, we guarantee that you exercise the following rights with respect to your personal information:

    (1) Access and edit your personal information

    You have the right to access and edit your personal information, except for exceptions provided by law. If you want to exercise the rights of data access and editing, you can access and edit by yourself in the following ways:

    2. Posting, commenting and Q&A information: If you want to access, delete or modify your posting, commenting and Q&A information, you can visit the TYC Finance website on the PC side (in the login state, go through "Home-Discussion" /"Personal Homepage-Posts"/"the main post comment area corresponding to the post comments" path) or find your corresponding posts, post comments, Q&A information, and perform such operations on the corresponding information page. In order to facilitate you to clearly understand the relevant operation paths, we have listed the support status of the corresponding functions on the PC and APP in the table below 

    3. Chat information: If you want to access your chat information, you can visit the TYC Finance website on the PC side or find your corresponding chat information on the APP side, and perform the access operation on the corresponding page, but please be aware and Understand that once the chat message is sent successfully, it cannot be edited again.

    4. Follow users: If you want to access your follow user information, you can visit the TYC Finance website on the PC side  and perform such operations on the corresponding page.

    5. Collection information: If you want to access your collection information, you can visit the TYC Finance website on the PC side and perform such operations on the corresponding page.

    6. Search history: If you want to access your recent search history, you can find your history search on the APP search page to perform such operations.

    If you are unable to access or edit your above-mentioned personal information through the above-mentioned path, you can contact our online customer service at any time, and we will reply to you as soon as possible and provide you with guidance as much as possible.

    As long as we do not need to invest too much in other personal information generated during your use of our services, we will provide you as much as possible. If you want to exercise data access rights, please send an email to info@tycfinance.com and we will respond to your access request within 15 working days.

    (2) Correct your personal information

    When you find that the personal information we process about you is wrong, you have the right to ask us to make corrections. You can send an email to info@tycfinance.com to apply for correction, and we will respond to your correction request within 15 working days.

    (3) Delete your personal information

    You can delete part of your personal information in a manner permitted in "(1) Access and Edit Your Personal Information".

    In the following situations, you can request us to delete personal information:

    1. If our handling of personal information violates Chinese laws;

    2. If we collect and use your personal information without obtaining your explicit consent;

    3. If our handling of personal information seriously violates our agreement with you;

    4. If you no longer use our products or services, or you voluntarily cancel your account;

    5. If we no longer provide services to you.

    If we decide to respond to your deletion request, we will also notify the subjects who have obtained your personal information from us as much as possible at the same time and require them to delete them in a timely manner, unless Chinese laws provide otherwise, or these subjects obtain your independent authorization.

    When you delete information from our service, we may not immediately delete the corresponding information from the backup system, but we will delete the information when the backup is updated.

    (4) Change the scope of your authorization or withdraw your authorization

    Each business function requires some basic personal information to be completed (see "Article 2" of this privacy policy). You can delete information, change privacy settings, and disable related functions in the browser or the operating system of your mobile device through the methods permitted in "(1) Access and edit your personal information" to change the scope of consent or withdraw your consent Authorization. But please understand that after you perform the above operations, we will no longer be able to provide you with services corresponding to the withdrawal of your consent or authorization, and will no longer process the corresponding personal information. However, your decision to withdraw your consent will not affect the previous processing of personal information based on your authorization.

    (5) Cancel account

    You have the right to cancel your TYC Finance account. You can get in touch with us through our online customer service and other methods (if any) we provide from time to time, and we will provide you with account cancellation services. Please refer to the specific process and required information for account cancellation

    After you voluntarily cancel your account, we will stop providing services to you and delete your personal information in accordance with the provisions of Chinese law, unless otherwise provided by law.

    (6) Constraint information system automatic decision-making

    In some business functions, we may only make decisions based on non-manual automatic decision-making mechanisms including information systems and algorithms. If these decisions significantly affect your legal rights, you have the right to ask us for an explanation, and we will also provide appropriate remedies.

    (7) In response to your above request

    In order to protect the security of your account and personal information, when it involves some requests (such as account cancellation, etc.), we may need you to provide corresponding methods to prove your identity and the legitimacy of the request. We will receive your feedback and verify your Respond to your request within 15 working days after identification.

    For your reasonable request, we do not charge fees in principle, but for repeated requests that exceed reasonable limits, we will charge a certain cost according to the situation.

    We may reject requests that are unreasonably repeated, require excessive technical means (for example, the need to develop new systems or fundamentally change current practices), bring risks to the legitimate rights and interests of others, or are very unrealistic.

    In the following situations, we will not be able to respond to your request in accordance with the requirements of laws and regulations:

    1. Related to personal information controllers fulfilling obligations stipulated by laws and regulations;

    2. It is directly related to national security and national defense security;

    3. It is directly related to public safety, public health, and major public interests;

    4. Directly related to criminal investigation, prosecution, trial, and execution of judgments;

    5. The personal information controller has sufficient evidence to show that the personal information subject has subjective malice or abuse of rights;

    6. In order to protect the life, property and other major legitimate rights and interests of the personal information subject or other individuals, but it is difficult to obtain the consent of the person;

    7. Responding to the request of the personal information subject will cause serious damage to the lawful rights and interests of the personal information subject or other individuals or organizations;

    8. Involving commercial secrets.

    8. Protection of personal information of minors

    Based on the characteristics of our services, our website and services are mainly for adults, we do not provide any services to minors, and we refuse to collect personal information of minors or send any promotional materials to such groups of people.

    We will not seek or attempt to seek to receive any personal information from minors. If a parent or guardian has reason to believe that a minor has submitted personal information to us without prior consent, please contact us to ensure that such personal information is deleted, and to ensure that the minor cancels its subscription and use of TYC Finance Services.

    Nine, the update of this privacy policy and how to contact us

    (1) Update of this privacy policy

    Our services may change from time to time, and this privacy policy will be adjusted accordingly. Without your explicit consent, we will not reduce your rights under this privacy policy.

    We will issue an updated version on the TYC Finance website (see item 2 of the first part of this privacy policy for its definition) or remind you of relevant content updates in other ways. Please also visit the TYC Finance website to keep abreast of the latest privacy policy. For major changes, we will also provide more noticeable notifications (including we will notify you through the announcement on the TYC Finance website and even provide you with pop-up prompts).

    The major changes referred to in this privacy policy include but are not limited to:

    1. Significant changes have taken place in our service model. Such as the purpose of processing personal information, the type of personal information processed, the way of using personal information, etc.;

    2. Significant changes have taken place in our ownership structure and organizational structure. Such as changes in owners caused by business adjustments, bankruptcy mergers, etc.;

    3. The main objects of personal information sharing, transfer or public disclosure have changed;

    4. Your right to participate in the processing of personal information and how to exercise it has undergone major changes;

    5. When the department responsible for handling personal information security, contact information and complaint channels change;

    6. When the personal information security impact assessment report shows that there is a high risk.

    (2) How do you contact us

    If you have any comments, suggestions or matters that need to be consulted on this privacy policy, you can get in touch with our personal information protection officer:

    Contact email: info@tycfinance.com

    You can also get in touch with us through our online customer service and other methods (if any) we provide from time to time and fully describe your opinions, suggestions or matters that need to be consulted. We will verify your identity after 15 Respond to your request within working days and try to resolve it.

    10. Dispute Resolution

    If you are dissatisfied with our response, especially if we believe that our personal information processing has harmed your legitimate rights and interests, you can also seek a solution by filing a lawsuit in a court with jurisdiction in the defendant’s domicile, as well as other channels permitted by Chinese law.

     

    All the information provided on this website is for reference only and is not stock and securities investment advice. TYC Finance Limited does not assume any legal liability.

    TYC FINANCE Copyright All Rights Reserved