Privacy Policy

Last Update:Nov 26, 2022
 
High speed rabbit Limited (“we”, “us”), as the operator of Whitehat VPN, understands the importance of your personal information to you and will protect your personal information and privacy in accordance with laws and regulations. We have formulated this Privacy Policy with a special note: We expected you to read and understand this Privacy Policy carefully before using White Hat VPN and related services so that you can make an appropriate choice.

This Privacy Policy will help you understand:
We will collect and use your information in accordance with the Privacy Policy, but we will not collect your personal information in a coercive manner only because you are greed to this privacy Policy.
1. How do we collect and use your personal information
2. How do we share, transfer, and publicly disclose your personal information
3. How do we store your personal information
4. How can we secure your personal information
5. Manage your personal information
6. The protection of minor
7. The revision and notification of Privacy Policy
8. Contact us

1.How do we collect and use your personal information

When you open the White Hat VPN App for the first time, we will receive and record information about the devices you use after obtaining your authorization. The information includes device attributes (such as IMEI, IMSI, device model, operating system version, device Settings, unique device identifier software/hardware features, and device serial number information) and device connection information (such as MAC address, IP address, telecom carrier, access date and time) to ensure the security of your account and transaction.

1.1 Information we may collect and its use
(1) In order to provide you with basic services, we will collect and use the necessary information, complying with the principles of proper, legal, and necessary.
(2) In order to provide you with better network acceleration experience, we will obtain a rough geographical location from you.
(3) In order to provide you will better network acceleration experience, we will collect your IP information. The above information is solely for the purpose of judging the quality of your current mobile network and the communication quality of your carrier, so as to provide you with better accelerated services. We guarantee that your IP information will not be leaked.
(4) In order to provide you with better accelerated services, we will obtain system logs from you.
(5) In order to store data during application running, we will apply for storage space permission from you.
(6) In order to identify the uniqueness of the device, it is necessary to obtain the device information from you for statistics and data analysis.
(7) During application operation, in order to ensure operation quality and efficiency, we will collect installed application information or running process information, overall application operation, usage and frequency, application crash, overall installation and usage, performance data, and application sources.

1.2 Device information and log information
a. In order to ensure the safety of software services and quality of operations, we will collect information including hardware model, operating system version number, international mobile device identification number, unique device identifier, network device hardware address, IP address, WLAN access point, Bluetooth, base station, software version number, network access mode, network access type, network access status, network quality data, operation logs, usage logs, and service logs.
b. To prevent malicious programs and ensure the quality and efficiency of operations, we will collect information including installation or running processes information, the overall operation, the overall usage, and the overall frequency of applications, application crashes report, the overall installation usage, performance data, and application sources.


1.3 Personal information collection and use purpose change

Please be aware that as our business evolves, changes may be made to the functionality and services provided by White Hat VPN. In principle, when the new function or service is related to the function or service we currently provide, the personal information collected and used will be directly or reasonably related to the original processing purpose. If we collect or use your personal information that is not directly or reasonably related to the original purpose of processing, we will inform you again and obtain your consent.

1.4 Personal information collected and used with consent shall be exempted by law
Please understand that under the following circumstances, according to laws, regulations and relevant national standards, we do not need your authorization to collect and use your personal information:
a. Those directly related to national security or national defense security;
b. Those directly related to public safety, public health or vital public interest;
c. Those directly related to crime investigation, prosecution, trial and execution of judgment;
d. To protect the major legitimate rights and interests of the personal information subject or other individuals, such as life and property, but it is difficult to obtain the consent of the individual;
e. The personal information collected is disclosed to the public by you;
f. Your personal information collected from legally disclosed information, such as legal news reports, government information disclosure and other channels;
g. It is necessary to enter into or perform the contract as required by you;
h. Necessary for maintaining the safe and stable operation of the software and related services, such as discovering and disposing of faults in the software and related services;
i. necessary for the legitimate reporting of the news;
j. When it is necessary for an academic research institution to carry out statistical or academic research in the public interest, and provide the results of academic research or description to the public, it de-identifies the personal information contained in the results;
k. Other circumstances stipulated by laws and regulations.

2. How do we share, transfer and publicly disclose personal information

2.1 the Sharing principle
A. Principle of authorization consent: Without your consent, we will not share your personal information, unless the shared personal information is de-identified and the sharing third party is unable to re-identify the natural person subject of such information. If a third party uses the information for purposes beyond the scope of the original license consent, they need to obtain your consent again.
B. Principle of proper, legitimate and minimum necessary: The data to be shared must have a proper and legitimate purpose, and the data to be shared must be only necessary to achieve the purpose.

2.2 the transfer principle
A. We will not transfer your personal information to any other third party, except with your express consent.
B. With the continuous development of our business, we may carry out mergers, acquisitions and asset transfers, and your personal information may be transferred accordingly. In the event of the aforementioned changes, we will require the successor party to protect your personal information in accordance with laws and regulations and security standards no less than those set forth in this Privacy Policy, otherwise we will require the successor party to obtain your authorization and consent again.

3. How do we store personal information

3.1 Storage Location
Your personal information collected and generated during our operations is stored in the UK in accordance with laws and regulations. At present, we will not transfer the above information overseas. If we do, we will follow the relevant national regulations or seek your consent.

3.2 Storage Term
We retain your personal information only for such period as is necessary for the purpose of providing the White Hat VPN and Services. We will retain such information during the period that you do not withdraw or delete the APP. Beyond the necessary period, we will delete or anonymize your personal information, unless otherwise provided by laws and regulations.

4. How can we protect the security of personal information

a. We attach great importance to the security of your personal information and will strive to take reasonable security measures (including technical aspects and management aspects) to protect your personal information and prevent the personal information you provide from being used improperly or being accessed, publicly disclosed, used, modified, damaged, lost or leaked without authorization.
b. We will protect your personal information using encryption technology, anonymization and other reasonable and feasible means that are not lower than industry standards, and use security protection mechanisms to prevent malicious attacks on your personal information.
c. We will establish a special security department, security management system and data security process to ensure the security of your personal information. We adopt strict data use and access policies to ensure that only authorized personnel can access your personal information, and timely conduct security audit of data and technology.
d. Although the above reasonable and effective measures have been taken and the standards required by relevant laws and regulations have been complied with, please understand that due to the limitations of technology and possible malicious means, it is impossible to always guarantee the 100% security of information in the Internet industry even if we try our best to strengthen security measures. We will do our best to ensure the security of the personal information you provide us.

5. Manage your personal information

The corresponding business functions and services will require your information to complete. After you withdraw your authorization, we cannot continue to provide you with the functions and services, and will no longer process your corresponding personal information. However, your decision to withdraw authorization will not affect our previous processing of personal information based on your authorization.

6. The protection of minor

A. If you are a minor under the age of 16, you should read and agree to this Privacy Policy under the supervision and guidance of your parent or other guardian before using the White Hat VPN and related services.
B. We protect minors' personal information in accordance with relevant national laws and regulations, and will only collect, use, share or disclose minors' personal information when permitted by law, with the consent of parents or other guardians, or when it is necessary to protect minors; If we find that personal information about a minor has been collected without the prior, verifiable consent of a parent or other guardian, we seek to remove the information as soon as possible.
C. If you are the guardian of a minor, please contact us through the contact information published in this Privacy Policy if you have any questions about the personal information of the minor.

7. The revision and notification of Privacy Policy

In order to provide better service to you, White Hat VPN and related services will be updated from time to time and change. We will timely to revise this privacy policy. The revision of the privacy policy is equal to the effectiveness of this privacy policy. Without the permission of you clear, we won't cut you on the basis of the current work should enjoy the rights of this privacy policy.

8.Contact us

high speed rabbit Limited
Address: UNIT 1804 SOUTH BANK TOWER, 55 UPPER GROUND, LONDON, SE1 9EY
Contact information: Email: contact@WhiteHatVPN     Tel: +852 4404 8772