This Privacy Policy applies to users accessing or using JMI ( including all sub-sites, microsites, and related mobile applications, collectively referred to as the “Service”), This policy explains how we collect, use, store, and disclose your personal information in compliance with U.S. laws. By using the Service, you agree to the terms of this policy. Changes will be posted on this page, with material updates notified via email or pop-up. For questions, contact support@jm-information.com.
Scope:
- Applies only to JMI’s direct services, excluding third-party partners or embedded third-party services (e.g., ads, analytics tools).
- Third-party privacy policies must be reviewed separately.
I. Information We Collect
1. Personal Information
- Collection Scenarios: Account registration, customer support inquiries, transactions.
- Details Collected:
- Identity: Name, company name, job title.
- Contact: Business email, phone number, address.
- Payment: Credit card number, transaction records (transmitted via encryption).
- Account: Login credentials, preferences.
2. User Data
- Collection Scenarios: Service usage, software/app interactions.
- Details Collected:
- Usage Logs: Feature frequency, operation logs, response times.
- Device Info: Model, OS version, IP address.
- Behavior: Page dwell time, click paths, form inputs.
3. Web Tracking Information
- Tools: Cookies, Web Beacons, pixel tags, Clear GIFs.
- Data Collected:
- Browsing: Referral sources, page sequence, bounce rate.
- Device ID: IP address (anonymized), device fingerprint.
- Email Engagement: Open rates, link clicks.
- Cookie Management:
- Disable via browser settings (may limit functionality like login persistence).
- Third-party cookies used by partners for ads; manage preferences here.
II. How We Use Information
1. Core Purposes
- Service Delivery: Account verification, service provisioning, technical support.
- Experience Optimization: Analyze behavior to improve features and fix issues.
- Security: Monitor unauthorized access, fraud, or attacks.
- Legal Compliance: Respond to subpoenas, regulatory audits (e.g., tax).
2. Data Analysis & Sharing
- Aggregated Data: De-identified data used for:
- Market trends (e.g., industry reports).
- Product development (e.g., feature prioritization).
- Ad performance (e.g., conversion rates).
- Third-Party Sharing Restrictions:
- Shared only with contractors bound by NDAs (e.g., cloud providers, customer support vendors).
- Prohibited from using data for independent marketing.
3. Legal Exceptions
- Disclose minimally necessary data to:
- Comply with law enforcement investigations.
- Prevent imminent threats to safety or property.
- Court orders or arbitration awards.
III. Your Rights & Choices
1. Access & Correction
- Process: Log in → Profile → Edit. For historical data, email support@jm-information.com with ID proof.
2. Right to Erasure (EU Residents)
- Applicable: Non-legally retained data (e.g., completed transactions retained for 6 years).
- Exceptions: Legal retention periods (e.g., contract disputes: 10 years).
3. Right to Object
- Scenarios:
- Processing based on “legitimate interest” (e.g., market research) you oppose.
- Direct marketing (opt-out anytime).
- Action: Submit written objection to support@jm-information.com with account details.
4. Data Portability
- Format: CSV/JSON files (your submitted data only).
- Exclusions: Third-party integrated data (e.g., API-based payment records).
5. Withdraw Consent
- Impact: May disable consent-dependent features (e.g., personalized recommendations).
- Effective Time: 24 hours post-confirmation.
IV. Data Disclosure & Third Parties
1. Disclosure Recipients
Data Type | Recipients | Conditions |
---|---|---|
Personal | Affiliates | For service integration (e.g., CRM) |
User Data | Service Providers | Signed DPA required |
Aggregated | Investors/Partners | De-identified |
2. Cross-Border Transfers
- EU Data: Transferred to U.S. under EU-U.S. Privacy Shield or Standard Contractual Clauses (SCCs).
- China Data: Stored in Mainland China; cross-border transfers permitted only for approved scenarios.
V. Security & Liability
1. Technical Protections
- Encryption: TLS 1.2+ for transmission; AES-256 for storage.
- Access Controls: Role-based permissions (RBAC); audit logs retained 180 days.
2. Liability Exclusions
- No liability for breaches due to force majeure (e.g., natural disasters, APT attacks).
- No liability for user-caused leaks (e.g., shared passwords).
VI. Policy Updates & Contact
- Latest Version: Check “Last Updated” date at the bottom.
- Dispute Resolution: Governed by Delaware Superior Court.
- Contact:
- Support: support@jm-information.com