The Privacy Policy Agreement
2024 version
Acknowledgement
Louis Thai International Group Sdn Bhd (hereinafter referred to as “Louis Thai International” or the “Company”) is well aware of the importance of user information protection to users, and will do our best to protect user information security. Louis Thai International Group Sdn Bhd (hereinafter referred to as the ‘Louis Thai”, “We”, “Us”, or “Our”) respects and protects the safety and reliability of the personal information of users (hereinafter referred to as “you” or “user”).
Louis Thai International Group Sdn Bhd is committed to maintaining your trust in Louis Thai abide by the following principles to protect your personal information and we will take security protection measures in accordance with the law. Protect users’ information and privacy security, and will abide by the following principles:
- the principle of consistency of rights and responsibilities;
- the principle of clear purpose;
- the principle of choice and consent;
- the principle of minimum sufficiency;
- the principle of ensuring security;
- the principle of subject participation;
- the principle of openness and transparency etc.
When users use Louis Thai technologic and software system related products or services, we will collect, save, use, share, disclose and protect users’ information in accordance with this Privacy Policy. We hope to introduce to users how we handle user information through this Privacy Policy. Therefore, we remind users to carefully read and fully understand this Privacy Policy when browsing relevant information on this website or enjoying related services, and only use related products and services after confirming full understanding and agree. When you check “Have read and agree to the Registration Service Agreement and Privacy Policy” and click to register now, you are deemed to have fully understood and agreed to the entire content of this “Privacy Policy”. This “Privacy Policy” will be used when you register. It takes effect simultaneously when successful.
- Definition
- Louis Thai products or services refer to the user’s ordering of our products and supporting services from Louis Thai and its affiliates, and the subsequent purchase one or more times through web pages, emails, official accounts, text messages, phone calls and other feasible methods. Provide products, promotion and publicity services to users.
- Related parties refer to companies, organizations or individuals that have any contact with us due to cooperation, investment or control (or joint control) relationships.
- Third parties refer to other companies, organizations or individuals outside the scope of related parties agreed in this Privacy Policy.
- This policy will help you understand the following:
- What information that we collect from you?
- How we uses your information
- How do we control your information?
- How we shares or transmits your information
- How does us protect your information?
- How does us protect the personal information of minors.
- How to update this policy?
- At the same time, Louis Thai promises that we will take appropriate security protection measures to protect your personal information in accordance with mature security standards in the industry. When you use Louis Thai services (including but not limited to users’ downloading, installation, use, browsing, account acquisition and login of all Louis Thai service content, software, clients, etc.), Louis Thai will follow this Privacy Policy (hereinafter referred to as “This Policy”) collects and uses your personal information.
- Louis Thai recommends that you carefully read and understand the entire content of this policy before using Louis Thai services. If you do not agree with any content of this policy, please stop using Louis Thai’s services immediately.
- Scope of application of the “Privacy Policy”
- The “Privacy Policy” applies to the storage, analysis, transmission, use, processing, backup, deletion and protection of user information in the process of selling products and providing services by third party and their affiliates. If the information cannot identify the user’s identity or in combination with other information, it does not belong to the legal sense;
- when the user’s information can identify the user’s identity alone; or
- in combination with other information, we will not be able to establish contact with any specific information
- when the data is combined with other users’ information, the information will be treated and protected as the user’s information in accordance with this privacy policy during the period of combined use.
- The “Privacy Policy” applies to the storage, analysis, transmission, use, processing, backup, deletion and protection of user information in the process of selling products and providing services by third party and their affiliates. If the information cannot identify the user’s identity or in combination with other information, it does not belong to the legal sense;
- Scope and methods of user information collection
- When a user registers on the Louis Thai website (https://www.louisthai.com) and enjoys related services, the user understands and agrees that we may collect, store and use the following data related to user information.
- If the user do not provide or agree to our collection of relevant information, you may not be able to become our users or order our products and enjoy some of the services we provide, or you may not be able to achieve the intended effects of the relevant services.
- The information filled in and/or provided by the user, including: name, mobile phone number, email address, address (not precise address), and questionnaire information related to providing services to the user, can identify the user alone or in combination with other information.
- Identity information
- Information obtained under different terminals: When the user grants specific permissions during software installation and use, our system will receive and record the device-related information used by the user, such as;
- device name
- operating syste
- browser and versio
- device type
- unique device identifier
- other software and hardware feature information
- device location-related information, such as;
- IP address
- GPS location
- other sensor information
- information obtained from different terminals, such as; user nickname user avatar, etc.
- Information obtained under different terminals: When the user grants specific permissions during software installation and use, our system will receive and record the device-related information used by the user, such as;
- Our system may associate the above information in order to provide users with consistent services on different devices.
- Log information: When users use related services, our system will automatically collect the user’s usage from the services and save them as relevant network logs. For example: user’s IP address, browsing information, access records, click information, language used, date and time of accessing the service, cookies, Web Beacon, etc.
- Device or application information: including configuration information, device version number, device identification code, etc. provided by the mobile device, browser or other programs used by the user. In order to provide users with better services and improve the service experience, We may record hardware and software data such as hardware model, operating system version number, International Mobile Equipment Identity (IMEI), and network device hardware address (MAC).
- We using products integrate Umeng+SDK. Umeng+SDK needs to collect the user’s device Mac address and unique device identification code (IMEI/android ID/IDFA/OPENUDID/GUID, SIM card IMSI information) to provide statistical analysis services, and calibrate report data accuracy through geographical location to provide basic anti-cheating capabilities. We also have access to the following third-party SDKs
- Mobile analysis data in some mobile applications, we uses mobile analysis software. This software may record the following information, such as the frequency of user use of the application, events that occur within the application, cumulative usage, performance data and application The location where the program crash occurred. We and third-party service providers use technologies such as cookies, tags, and scripts, these technologies are used to analyze trends, administer the website, track users’ website activities, and collect statistical information about the entire user population. We will receive individual or aggregate analysis reports collected through the above technologies.
- Support information for user accounts: Based on user consultation records, troubleshooting records and troubleshooting processes (such as communication or call records) generated by users using our services, the system will record and analyze this information is used to respond to users’ help requests in a more timely manner and to improve services.
- User information obtained from third parties, may obtain user-related information from third parties through legitimate channels, and use the user information obtained from third parties in compliance with relevant laws and regulations.
- Information that is exempted from the collection and use of consent in accordance with the law: including information directly related to national security, national defense security, public safety, public health, and public interests; disclosed or provided when necessary in accordance with the mandatory requirements of relevant laws and regulations , or directly related to criminal investigation, prosecution, trial and judgment execution; necessary to protect the life, property and other legitimate rights and interests of our other customers
- companies and their affiliates, or the safety of rights protection products or services; users themselves user information disclosed to the public, or user information collected by our from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels; necessary to sign or perform contracts according to user requirements; academic research institutions When it is necessary to carry out statistical or academic research based on public interests, and when the results of academic research or description are provided to the outside world, the user information contained in the results will be de-identified; other circumstances stipulated by laws and regulations.
- The above information range is not the user information content that we will necessarily collect. The selectively collect the necessary information related to providing services to users within the above information range based on the service content provided by us.
- Use of cookies and similar technologies
- Users understand and agree that when users register on the official website of Louis Thai and enjoy related services provided by us, in order to enable us to better provide services to users, we may use related technologies to collect and store information. During this process, one or more Cookies or anonymous identifiers may be sent to the user’s computer or mobile device; Cookies or anonymous identifiers usually include an identifier, a site name, and some numbers and characters. With the help of Cookie technology, the website can store data information such as user browsing history.
- Many web browsers have a Do Not Track function, which can issue Do Not Track requests to websites. But if the user’s browser has Do Not Track enabled, then we will respect the user’s choice.
- We will not use cookies and related similar technologies for any purpose other than those stated in this Privacy Policy. Users can retain or delete cookies according to their own preferences, or clear all cookies saved in user web pages.
- User information storage
- Information storage location: In accordance with the provisions of laws and regulations, we store user information collected and generated during domestic operations within the territory of the Law of Malaysia, Malaysian Communications And Multimedia
- Storage period: If the user does not make a request for modification or deletion, we will store the user information safely and effectively, and only use the user information when necessary to provide services to the user, unless otherwise provided by laws and regulations.
- Use of user information
- In order to achieve the purpose of providing our related services, we will use the collected user information in accordance with the “Privacy Policy” and the authorization agreement. If there are any other uses beyond this, we will obtain the user’s consent in advance. Specifically, we will use the collected user information for the following purposes:
- In order to provide you with services, we and its affiliates and partners will send you information, notifications or conduct business communications with you, including but not limited to verification codes necessary to ensure the completion of the service, when using the service necessary push notifications.
- We may design, develop and promote new products and services based on user information statistics; we will collect statistics on the use of our services and may share these statistical information with the public or third parties. Parties or partners provide specific products or services to users, but these statistical information do not contain any of your identifying information.
- In order to improve the security of your use of the services provided by us and its affiliates and partners, ensure the safety of the operating environment and identify abnormal account status, and protect the personal and property safety of you or other users or the public from infringement, better To effectively prevent security risks such as phishing websites, fraud, network vulnerabilities, computer viruses, network attacks, and network intrusions, and more accurately identify violations of laws and regulations or US-related agreements and rules, we may use your member information and integrate equipment Information, relevant network logs, and information legally shared by our affiliates and partners to determine your account and transaction risks, conduct identity verification, detect and prevent security incidents, and take necessary recording, auditing, analysis, and disposal measures in accordance with the law.
- After we de-identify user information through technical means (in order to reduce the risk of other organizations or individuals identifying users through de-identified personal information, we will take corresponding management measures to de-identify the user information) The data is stored separately from the information that can be used to recover the identification of the user), the user agrees and understands that in this case we have the right to use the de-identified information, and on the premise of not disclosing the user’s information, we have the right to De-identified information is analyzed and commercially exploited.
- The user knows and agrees that unless the user sends a modification or deletion notice to us and the process is completed by us, all the information provided by the user when using our related services will be used when the user uses our related services. During this period, we will continue to be authorized to use it within the scope consistent with this Privacy Policy.
- Users know and agree that we will collect statistics on users’ use of our services and may share these statistical information with third parties to show the overall usage trends of our related services. However, these statistics will not include any user information.
- In order to achieve the purpose of providing our related services, we will use the collected user information in accordance with the “Privacy Policy” and the authorization agreement. If there are any other uses beyond this, we will obtain the user’s consent in advance. Specifically, we will use the collected user information for the following purposes:
- Sharing, transfer and public disclosure of user information
- We will treat user information with a high degree of diligence. We will share user information with third parties after obtaining the user’s consent or authorization, including the following situations:
- After obtaining the user’s consent, we may share user information with our affiliates. We will share the user information with the necessary users based on the actual needs for providing services to the user and subject to the purposes stated in this privacy policy. Information is shared with related parties. If due to business needs, it is really necessary to use user information beyond the scope of the aforementioned authorization, the user’s authorization and consent will be sought again.
- In order to achieve the relevant purposes stated in this Privacy Policy, some of our services will be provided to users by third parties. In order to facilitate users to enjoy such services, we will use user information in accordance with the principles of legality, legitimacy, necessity, specificity, and clear purpose to assist third parties in providing services to users.
- We will investigate the data security capabilities of third parties and require third parties to take necessary confidentiality and security measures to store, use and process user information to ensure that user information is not leaked.
- As our business continues to develop, we may engage in mergers, acquisitions, asset transfers or similar transactions, and user information may be transferred as part of such transactions. When the aforementioned changes occur, we will require the new user information controller to continue to protect user information in accordance with laws and regulations and security standards no lower than those required by this Privacy Policy.
- We will not share user information with any third party other than us and its affiliates without the user’s prior consent, except in the following circumstances:
- Obtain explicit authorization or consent from the user in advance;
- Shared by users to third parties;
- Directly related to national security, national defense security, public safety, public health, and public interests;
- Disclosure or provision is necessary in accordance with the mandatory requirements of relevant laws and regulations, or is directly related to criminal investigation, prosecution, trial and judgment execution, etc. Under the premise of complying with laws and regulations, when we receive the aforementioned request to disclose information, we will require the other party to issue corresponding legal documents, such as a subpoena or a letter of investigation. We will carefully review all requests to ensure that they have legal basis and are limited to data that administrative and judicial departments have the legal right to obtain for specific investigation purposes;
- To the extent permitted by laws and regulations, it is necessary to protect the life, property and other legitimate rights and interests of other our users, companies and their affiliates, or the safety of rights protection products or services, such as finding, preventing, and handling fraud, etc. Illegal activities and credit risk reduction, etc.;
- Collect user information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels;
- Necessary to sign or perform a contract according to the user’s requirements;
- When it is necessary for an academic research institution to conduct statistical or academic research based on public interests, and when providing the results of academic research or description to the outside world, the information contained in the results will be de-identified;
- Other situations stipulated by laws and regulations.
- We will treat user information with a high degree of diligence. We will share user information with third parties after obtaining the user’s consent or authorization, including the following situations:
- User information security protection
- We attach great importance to the security of user information and will strive to adopt various reasonable security measures (including technical aspects and management aspects) that comply with industry standards to protect user information and prevent the information provided by users from being improperly used or accessed without authorization. Public disclosure, use, modification, damage, loss or leakage.
- We will use reasonable and feasible means such as encryption technology and anonymization to protect user information, and use trusted protection mechanisms to prevent user information from being maliciously attacked.
- We will establish a dedicated information security working group, security management system, and data security process to ensure the security of user information. We adopt a strict data use and access system to ensure that only authorized personnel can access user information, and conduct security audits of data and technology in a timely manner.
- Although the above reasonable and effective measures have been taken and the standards required by relevant legal regulations have been complied with, users should understand that due to technical limitations and various possible malicious means, in the Internet industry, even if every effort is made to strengthen security measures , and it is impossible to always guarantee the absolute security of information. We will try our best to ensure the security of the information provided to us by users. Users know and understand that the systems and communication networks used by users to access our services may have problems due to factors beyond our control. Therefore, we strongly recommend that users take proactive measures to protect the security of their information.
- We will formulate an emergency response plan and immediately activate the emergency plan when a user information security incident occurs, and strive to prevent the impact and consequences of any security incident from expanding. Once a user information security incident (leakage, loss, etc.) occurs, we will promptly inform users in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, and the user’s discretion Suggestions on preventing and reducing risks, remedial measures for users, etc. We will promptly notify users of the incident-related information through push notifications, emails, letters, text messages, etc. When it is difficult to inform them one by one, we will issue announcements in a reasonable and effective manner. At the same time, we will also report the handling of user information security incidents in accordance with the requirements of relevant regulatory authorities.
- We would like to remind users that the information protection measures provided in this Privacy Policy only apply to products or services provided by us and its related parties. We have no ability or obligation to protect any information submitted by users in applications and websites other than our related services. Regardless of whether users log in or browse the above software, websites or platforms based on our links or guidance, we are not responsible for this. any legal liability.
- Management of user information
- We attach great importance to the management of user information and do our best to protect users’ rights to modify (update or correct), delete and withdraw authorization of user information.
- If users need to modify (update or correct), delete or withdraw the information provided by users to us, users can contact us through the service email [support@louisthai.com] contact us. We make relevant applications and we will provide users with access, modification, deletion and termination authorization services based on their needs. If a user applies to delete information and terminates the authorization for us to provide relevant services to the user, we will delete the relevant information from our system and no longer provide relevant services to the user. However, the user’s decision to terminate authorization will not affect the previous activities based on the user’s authorization. information processing.
- When the user’s information falls under any of the following circumstances, we may not be able to respond to the user’s request in accordance with legal and regulatory requirements:
- Related to national security and national defense security;
- Related to public security, public health, major public interests, etc.;
- Related to criminal investigation, prosecution, trial and execution of judgments;
- There is sufficient evidence that the user has subjective malice or abused his rights;
- Responding to the user’s request will cause serious damage to the legitimate rights and interests of the user or other individuals or organizations;
- Involving business secrets;
- Other situations stipulated by laws and regulations.
- Terms of use for minors
- If the user is a minor under the age of 18, he should read and agree to this Privacy Policy under the supervision and guidance of the user’s legal guardian before using our products or services. The company protects the personal information of minors in accordance with relevant national laws and regulations and will only collect, use or publicly disclose the personal information of minors when permitted by law, with explicit consent from parents or other guardians, or when necessary to protect children. Users and their guardians are responsible for the authenticity of the information provided by the user. If we cannot determine that the user is a minor from the information provided by the user, then we are not responsible for protecting the privacy rights of minors.
- Effectiveness and changes of privacy policy
- In order to provide users with better services, our related services will be updated and changed from time to time. We will revise the “Privacy Policy” from time to time. Such revisions form part of the “Privacy Policy” and have the same effect as the “Privacy Policy” effectiveness. However, in principle we will not reduce the rights that users should enjoy based on this Privacy Policy that is currently in effect.
- After this Privacy Policy is updated, we will explain the specific changes to the Privacy Policy through announcements or other appropriate means so that users can learn about the latest version of this Privacy Policy in a timely manner. Users know and agree that we do not need to inform users anymore Make individual notifications. If you do not agree to the modifications, you should contact us immediately and stop using the Service. If you continue to use us, you will be deemed to agree and accept the modifications.
- Application of law and dispute resolution
- The establishment, effectiveness, performance and interpretation of this Agreement shall be governed by the laws of Malaysia; if there is no express provision in the law, prevailing industry practices may apply. If the relevant terms of this agreement conflict with the laws of Malaysia, these terms will be reinterpreted completely in accordance with the legal provisions, and other terms will still have legal effect and influence on both parties.
- If any dispute arises between Party A and Party B during the performance of this Agreement, they shall resolve it through negotiation. If negotiation fails, both parties may bring a lawsuit to the people’s court with jurisdiction over the place where us is domiciled.
- Others
- The titles of this Privacy Policy are for convenience and reading only and do not affect the meaning or interpretation of any provisions in this Privacy Policy.
- If users have comments or suggestions about this Privacy Policy or its functions related to the collection, storage, use, sharing, disclosure, and protection of user information, users can provide feedback or complaints through the feedback channel. We will provide feedback to users as soon as possible after receiving their opinions and suggestions.
- We have established a special feedback channel for information protection. Users can contact us through the following methods: Service email [support@louisthai.com]
- The copyright of this Privacy Policy belongs to us. The company reserves the right to final interpretation and modification to the extent permitted by law.