安徽恒隽科技有限公司隐私与数据处理

生效日期:2025年1月29日 官方访问链接https://hengjuan.product-demo.cn/

本政策由安徽恒隽科技有限公司(以下简称“我们”)制定,旨在规范通过亚马逊销售伙伴API(SP-API)收集、处理、存储、使用、共享及处置亚马逊相关数据的行为,严格遵守亚马逊《数据保护政策(DPP)》、《可接受使用政策(AUP)》,以及欧盟GDPR、美国CCPA、中国《个人信息保护法》等适用法律法规。本政策仅适用于我们基于亚马逊SP-API为卖家提供服务过程中涉及的数据管理活动,如有冲突,优先遵循亚马逊官方政策要求。

一、数据范围与定义

1.1 数据范围

我们仅通过亚马逊官方授权的SP-API接口(包括但不限于Products API、Orders API、Fulfillment API等)获取数据,不通过爬虫、第三方工具等非授权渠道收集任何亚马逊相关数据。数据来源仅限于使用我们服务的亚马逊卖家(以下简称“授权卖家”)的明确授权及亚马逊平台依法提供的信息。

1.2 核心数据定义

二、数据全生命周期管理

2.1 数据收集

我们仅为向授权卖家提供约定服务的目的,收集必要的亚马逊数据,遵循“最小必要”原则:

  1. 经授权卖家确认同意后,通过SP-API接口收集订单处理、商品上架、物流对接所需的最小范围数据;
  2. 收集过程全程通过HTTPS/TLS 1.2+协议加密传输,确保数据在传输中不被篡改或泄露;
  3. 不收集与服务无关的任何数据,不强制要求授权卖家提供超出服务范围的信息。

2.2 数据处理

数据处理严格限定于服务目的,且采取必要的安全控制措施:

  1. 对PII数据采取实时脱敏处理,如隐藏买家电话后4位、地址详细门牌号,脱敏后的数据仅用于订单履约、税费核算及法律文件生成,不用于其他用途;
  2. 数据处理过程遵循亚马逊DPP要求,不进行二次开发、商业分析或反向工程;
  3. 建立数据处理活动记录,详细记录数据字段、处理目的、处理时间及负责人,每季度更新并留存备查。

2.3 数据存储

我们采用严格的存储安全控制,确保数据静态安全:

  1. PII数据采用AES-256加密算法静态存储,与非PII数据分库隔离存储,存储服务器部署于合规云服务商(如阿里云、AWS),实施网络分段和访问控制;
  2. PII数据存储期限严格控制在订单交付后30天内,除非法律法规另有强制要求,逾期将按NIST 800-88标准进行永久性安全删除;
  3. 非PII数据存储期限不超过18个月,到期自动清理,确因业务需要延长存储的,需经授权卖家确认并符合亚马逊政策;
  4. 亚马逊凭证信息加密存储于专用加密配置中心,采用密钥管理系统(KMS)管理,每180天强制轮换一次,不硬编码于代码或明文存储;
  5. 建立地理分散的备份机制,备份数据同样采用加密存储,定期开展备份恢复测试,确保数据可用性。

2.4 数据使用

数据仅用于为授权卖家提供约定的SP-API相关服务,具体包括:

  1. 商品多站点上架、价格本地化配置及库存同步;
  2. 订单接收、物流信息对接及履约状态同步;
  3. 生成符合法规要求的税费发票、物流单据等文件;
  4. 为提升服务稳定性,对API调用日志、系统运行数据进行统计分析(不含任何敏感信息)。

我们承诺不将亚马逊数据用于任何未经授权卖家同意的用途,不用于自身商业推广或向第三方提供数据服务。

2.5 数据共享

我们严格限制数据共享范围,除非符合以下情形,否则不向任何第三方共享亚马逊数据:

  1. 经授权卖家书面同意,向为完成服务所必需的分包商(如物流服务商、税务服务商)共享最小范围数据,且分包商需通过我们的年度第三方风险评估,签署数据保护协议,承担同等安全责任;
  2. 根据法律法规、司法机关或监管机构的强制要求,在合理范围内提供必要数据;
  3. 向亚马逊及其关联方、代理人提供数据,以配合亚马逊的合规审核、安全检测,且符合亚马逊DPP要求。

2.5.1 数据共享补充细则

我们仅在为授权卖家提供服务且履行法定义务的前提下开展数据共享行为,共享活动严格遵循以下要求:

  1. 共享对象仅限具备完善数据安全保障能力的合作方,且合作方业务范围与共享数据的使用目的高度匹配,无无关数据共享行为;
  2. 与所有数据共享合作方签订正式数据保密及数据保护协议,明确双方数据安全责任,要求合作方严格按照本政策及相关法规处理共享数据;
  3. 不将授权卖家的亚马逊数据出售、出租、转让给任何无业务关联的第三方,不将数据用于合作方自身的商业运营;
  4. 建立数据共享台账,详细记录共享数据的字段、范围、共享对象、共享目的及共享期限,台账留存期限不少于24个月,可应亚马逊及监管机构要求提供核查。

2.6 数据处置

数据达到存储期限或不再需要时,采取安全处置措施,确保数据不可恢复:

  1. PII数据到期后,通过数据覆盖、物理删除等方式按NIST 800-88标准永久性销毁,包括所有备份副本;
  2. 收到亚马逊删除通知或授权卖家终止服务后,30天内完成所有相关数据的安全删除,90天内清除所有在线可访问实例,并可应要求提供书面销毁证明;
  3. 数据处置过程留存记录,包括处置时间、方式、负责人,留存期限不少于12个月。

2.7 数据保护技术措施

为全方位保障授权卖家数据及亚马逊相关数据的安全,我们采用传输层、存储层、访问层三重加密防护体系,结合行业领先的安全技术手段,构建全链路数据安全防护屏障,具体措施如下:

  1. 传输层防护:所有数据在客户端与服务端、服务端与亚马逊SP-API接口之间的传输,均采用TLS 1.2及以上版本加密协议,确保数据在传输过程中不被窃取、篡改或监听;
  2. 存储层防护:除PII数据采用AES-256对称加密算法静态存储外,所有敏感业务数据均采用混合加密方案,密钥通过RSA-2048非对称加密算法进行管理,密钥存储与业务数据物理隔离;
  3. 访问层防护:实施数据访问的“最小权限+多因素认证”双重管控,员工仅能访问其工作必需的数据,所有数据访问操作均触发实时日志记录,异常访问行为将立即触发系统告警;
  4. 环境层防护:所有数据存储及处理系统均部署于私有网络环境,通过防火墙、WAF(Web应用防火墙)、入侵检测系统(IDS)构建网络安全边界,拒绝所有非授权的外部网络访问;
  5. 运维层防护:所有系统运维操作均通过专用运维终端进行,采用跳板机登录机制,无直接服务器访问权限,运维操作全程录像并留存日志,日志留存期限不少于12个月。

2.8 授权卖家及数据主体数据权利行使

授权卖家作为亚马逊数据的授权方,及数据主体(如亚马逊买家)依据《个人信息保护法》《GDPR》《CCPA》等适用法规,享有对相关数据的访问、更正、删除、可携等法定权利,我们将依法为权利行使提供必要协助,具体行使方式如下:

  1. 数据访问权:授权卖家可随时请求查阅、复制自身授权我们处理的亚马逊业务数据及数据处理记录,数据主体可请求查阅自身被我们处理的个人身份信息;
  2. 数据更正权:授权卖家及数据主体发现我们处理的相关数据存在错误、不完整的,可请求我们予以更正、补充;
  3. 数据删除权:授权卖家终止服务后可请求删除所有相关业务数据,数据主体可请求删除其个人身份信息(符合法律、法规及亚马逊政策保留要求的除外);
  4. 数据可携权:授权卖家可请求我们将其业务数据以结构化、通用、机器可读的格式导出,便于数据迁移或自主管理;
  5. 权利行使方式:授权卖家及数据主体可通过本政策“四、合规与责任”中公示的电话、邮箱提交书面权利行使申请,申请中需明确权利行使类型、相关数据信息及身份验证材料;
  6. 响应时限:我们在收到有效申请后,将在15个工作日内完成核查并响应处理,若申请事项复杂,将在30个工作日内告知处理进度及预计完成时间。

三、安全控制措施

3.1 网络与访问安全

  1. 实施网络防火墙、访问控制列表,拒绝未经授权的IP地址访问,限制公共访问权限仅开放给经批准的用户;
  2. 为所有系统访问人员分配唯一ID,禁止使用通用、共享或默认账户,实行“账户锁定”机制——10次登录失败后自动锁定账户;
  3. 遵循最小权限原则,精细化分配数据访问权限,仅向必要人员授予对应权限,每季度审查一次访问权限列表,离职员工权限24小时内禁用并移除;
  4. 所有系统访问强制启用多因素认证(MFA),密码需满足至少12位字符,混合大小写、数字及特殊字符,最长有效期365天,保留最近10次密码历史记录。

3.2 监控与日志管理

  1. 部署SIEM(安全信息与事件管理)工具,对API调用、数据访问、系统操作进行实时监控,配置异常行为告警规则(如多次未授权访问、异常数据批量提取);
  2. 日志记录范围包括事件状态、时间(UTC+0)、来源IP、用户账户、API接口名称、操作类型,不包含PII数据,日志留存期限不少于12个月;
  3. 日志仅允许授权安全团队访问,访问行为全程审计,禁止篡改或删除日志。

3.3 漏洞与风险管理

  1. 每月开展一次漏洞扫描,每年委托具备资质的第三方机构进行一次渗透测试,每次应用发布前进行代码漏洞扫描;
  2. 漏洞按严重程度分级处置:高危漏洞7天内修复,高风险漏洞30天内修复,中风险漏洞90天内修复,低风险漏洞180天内修复或纳入系统升级计划;
  3. 使用专用漏洞管理平台跟踪整改进度,实时更新漏洞状态(待处理→处理中→已修复→已验证),每月生成整改报告提交管理层审核;
  4. 建立风险评估流程,高级管理层每年审查一次,评估潜在威胁与漏洞,制定应对措施;每半年及重大系统变更后,审核并更新事件响应计划。

3.4 事件响应

  1. 指定专门的事件管理联系人(IMPOC),建立24小时响应机制,发现数据库入侵、未授权访问、数据泄露等安全事件后,24小时内通过邮件(3p-security@amazon.com)通知亚马逊;
  2. 事件处置流程:立即隔离受影响系统→保存证据(日志、入侵痕迹)→修复漏洞→通过干净备份恢复数据→开展根本原因分析(RCA)→实施纠正措施防止复发;
  3. 按法律法规要求通知受影响方及监管机构,不代表亚马逊与第三方沟通,事件处置记录留存备查。

四、合规与责任

4.1 合规承诺

安徽恒隽科技有限公司定期组织员工开展亚马逊政策、数据安全及隐私法规培训,在与处理数据的员工签订的劳动合同中加入保密条款,明确数据保护责任。建立数据主体访问请求(DSAR)处理流程,及时响应授权卖家及数据主体的查询、更正、删除请求,符合适用法规要求。

4.2 政策更新

本政策将根据亚马逊SP-API政策更新、法律法规变化及业务调整适时修订,更新后将通过官网(https://hengjuan.product-demo.cn/)公示,公示后7天生效。授权卖家继续使用我们的服务,即视为接受修订后的政策。

4.3 联系方式

如对本政策有疑问,或需反馈数据安全相关问题、行使数据相关法定权利,可通过以下方式联系我们:

邮箱:766240847@qq.com

电话:18056019328


Anhui Hengjuan Technology Co., Ltd. Privacy and Data Processing Policy

Effective Date: January 29, 2025 Official Access Link: https://hengjuan.product-demo.cn/

This policy is formulated by Anhui Hengjuan Technology Co., Ltd. (hereinafter referred to as "we") to regulate the collection, processing, storage, use, sharing and disposal of Amazon-related data through Amazon Selling Partner API (SP-API). It strictly complies with Amazon's Data Protection Policy (DPP), Acceptable Use Policy (AUP), as well as applicable laws and regulations such as the EU GDPR, US CCPA, and China's Personal Information Protection Law. This policy only applies to data management activities involved in providing services to sellers based on Amazon SP-API. In case of any conflict, Amazon's official policies shall prevail.

I. Scope and Definition of Data

1.1 Data Scope

We only obtain data through officially authorized Amazon SP-API interfaces (including but not limited to Products API, Orders API, Fulfillment API), and do not collect any Amazon-related data through unauthorized channels such as web crawlers or third-party tools. The data source is limited to the explicit authorization of Amazon sellers using our services (hereinafter referred to as "authorized sellers") and information legally provided by Amazon platforms.

1.2 Core Data Definitions

II. Full-Lifecycle Data Management

2.1 Data Collection

We only collect necessary Amazon data for the purpose of providing agreed services to authorized sellers, following the principle of "minimum necessity":

  1. After obtaining confirmation and consent from authorized sellers, collect the minimum scope of data required for order processing, product listing and logistics docking through SP-API interfaces;
  2. The entire collection process is encrypted and transmitted via HTTPS/TLS 1.2+ protocol to ensure data is not tampered with or leaked during transmission;
  3. Do not collect any data irrelevant to the services, and do not force authorized sellers to provide information beyond the scope of services.

2.2 Data Processing

Data processing is strictly limited to service purposes, and necessary security control measures are adopted:

  1. Implement real-time desensitization of PII data, such as hiding the last 4 digits of buyers' phone numbers and detailed house numbers of addresses. The desensitized data is only used for order fulfillment, tax calculation and legal document generation, not for other purposes;
  2. Data processing complies with Amazon DPP requirements, without secondary development, commercial analysis or reverse engineering;
  3. Establish records of data processing activities, detailing data fields, processing purposes, processing time and responsible persons, updated quarterly and retained for inspection.

2.3 Data Storage

We adopt strict storage security controls to ensure static data security:

  1. PII data is stored at rest with AES-256 encryption algorithm, stored in separate databases from non-PII data. Storage servers are deployed on compliant cloud service providers (such as Alibaba Cloud, AWS) with network segmentation and access control implemented;
  2. The storage period of PII data is strictly controlled within 30 days after order delivery. Unless otherwise required by laws and regulations, permanent and secure deletion shall be carried out in accordance with NIST 800-88 standards upon expiration;
  3. The storage period of non-PII data shall not exceed 18 months, and it shall be automatically cleaned up upon expiration. If storage needs to be extended for business reasons, it shall be confirmed by authorized sellers and comply with Amazon policies;
  4. Amazon credential information is encrypted and stored in a dedicated encrypted configuration center, managed by a Key Management System (KMS), and forced to be rotated every 180 days, not hard-coded in code or stored in plaintext;
  5. Establish a geographically dispersed backup mechanism. Backup data is also stored with encryption, and regular backup recovery tests are carried out to ensure data availability.

2.4 Data Use

Data is only used to provide agreed SP-API-related services to authorized sellers, including:

  1. Multi-site product listing, localized price configuration and inventory synchronization;
  2. Order reception, logistics information docking and fulfillment status synchronization;
  3. Generating tax invoices, logistics documents and other files that comply with regulatory requirements;
  4. Statistical analysis of API call logs and system operation data (excluding any sensitive information) to improve service stability.

We commit not to use Amazon data for any purpose not agreed by authorized sellers, nor for our own commercial promotion or providing data services to third parties.

2.5 Data Sharing

We strictly restrict the scope of data sharing. Unless in the following circumstances, we will not share Amazon data with any third party:

  1. With the written consent of authorized sellers, share the minimum scope of data with subcontractors necessary for completing services (such as logistics service providers, tax service providers). Subcontractors must pass our annual third-party risk assessment, sign a data protection agreement, and assume equal security responsibilities;
  2. Provide necessary data within a reasonable scope in accordance with the mandatory requirements of laws and regulations, judicial authorities or regulatory agencies;
  3. Provide data to Amazon, its affiliates and agents to cooperate with Amazon's compliance audits and security testing, in line with Amazon DPP requirements.

2.5.1 Supplementary Rules for Data Sharing

We only conduct data sharing activities for the purpose of providing services to authorized sellers and performing legal obligations, and all sharing activities strictly comply with the following requirements:

  1. Sharing objects are limited to partners with sound data security protection capabilities, and the partner's business scope is highly matched with the use purpose of shared data, without irrelevant data sharing;
  2. Sign a formal data confidentiality and data protection agreement with all data sharing partners, clarify the data security responsibilities of both parties, and require partners to process shared data in strict accordance with this policy and relevant regulations;
  3. Do not sell, lease or transfer the Amazon data of authorized sellers to any third party without business relevance, and do not use the data for the own commercial operation of partners;
  4. Establish a data sharing ledger, detailing the fields, scope, sharing objects, sharing purposes and sharing period of shared data. The ledger shall be retained for no less than 24 months and can be provided for verification at the request of Amazon and regulatory authorities.

2.6 Data Disposal

When data reaches the storage period or is no longer needed, take secure disposal measures to ensure data is irrecoverable:

  1. Upon expiration of PII data, permanently destroy it in accordance with NIST 800-88 standards through data overwriting, physical deletion and other methods, including all backup copies;
  2. Upon receiving Amazon's deletion notice or termination of services by authorized sellers, complete secure deletion of all relevant data within 30 days, clear all online accessible instances within 90 days, and provide written destruction certification upon request;
  3. Retain records of data disposal processes, including disposal time, method and responsible person, for a retention period of not less than 12 months.

2.7 Data Protection Technical Measures

To fully protect the security of authorized sellers' data and Amazon-related data, we adopt a triple encryption protection system for transmission layer, storage layer and access layer, combined with industry-leading security technical means to build a full-link data security protection barrier. The specific measures are as follows:

  1. Transmission layer protection: All data transmission between client and server, server and Amazon SP-API interface adopts TLS 1.2 and above encryption protocols to ensure that data is not stolen, tampered with or monitored during transmission;
  2. Storage layer protection: In addition to PII data stored at rest with AES-256 symmetric encryption algorithm, all sensitive business data adopts a hybrid encryption scheme. The key is managed through RSA-2048 asymmetric encryption algorithm, and the key storage is physically isolated from business data;
  3. Access layer protection: Implement dual control of "minimum privilege + multi-factor authentication" for data access. Employees can only access the data necessary for their work. All data access operations trigger real-time log recording, and abnormal access behavior will immediately trigger system alarm;
  4. Environment layer protection: All data storage and processing systems are deployed in a private network environment, and a network security boundary is built through firewalls, WAF (Web Application Firewall) and IDS (Intrusion Detection System) to reject all unauthorized external network access;
  5. Operation and maintenance layer protection: All system operation and maintenance operations are carried out through dedicated operation and maintenance terminals, using jump server login mechanism, no direct server access rights, the whole process of operation and maintenance operations is recorded and logs are retained, and the log retention period is not less than 12 months.

2.8 Exercise of Data Rights by Authorized Sellers and Data Subjects

Authorized sellers as the authorizer of Amazon data, and data subjects (such as Amazon buyers) have statutory rights such as access, correction, deletion and portability to relevant data in accordance with applicable laws and regulations such as the Personal Information Protection Law, GDPR and CCPA. We will provide necessary assistance for the exercise of rights in accordance with the law, and the specific exercise methods are as follows:

  1. Right to data access: Authorized sellers may request to view and copy the Amazon business data and data processing records authorized to us for processing at any time, and data subjects may request to view their personal identifiable information processed by us;
  2. Right to data correction: If authorized sellers and data subjects find that the relevant data processed by us is incorrect or incomplete, they may request us to correct and supplement it;
  3. Right to data deletion: Authorized sellers may request to delete all relevant business data after terminating the service, and data subjects may request to delete their personal identifiable information (except in compliance with the retention requirements of laws, regulations and Amazon policies);
  4. Right to data portability: Authorized sellers may request us to export their business data in a structured, general and machine-readable format for easy data migration or independent management;
  5. Method of exercising rights: Authorized sellers and data subjects may submit a written application for exercising rights through the phone and email published in "IV. Compliance and Responsibilities" of this policy. The application shall clearly specify the type of right exercise, relevant data information and identity verification materials;
  6. Response time limit: After receiving a valid application, we will complete the verification and respond to the processing within 15 working days. If the application matter is complex, we will inform the processing progress and expected completion time within 30 working days.

III. Security Control Measures

3.1 Network and Access Security

  1. Implement network firewalls and access control lists to reject access from unauthorized IP addresses, and restrict public access rights only to approved users;
  2. Assign a unique ID to each system access person, prohibit the use of generic, shared or default accounts, and implement an "account lockout" mechanism—automatically lock the account after 10 failed login attempts;
  3. Follow the principle of least privilege, refine data access rights, only grant corresponding rights to necessary personnel, review the access rights list quarterly, and disable and remove the rights of resigned employees within 24 hours;
  4. Force multi-factor authentication (MFA) for all system access. Passwords must be at least 12 characters long, mixed with uppercase and lowercase letters, numbers and special characters, with a maximum validity period of 365 days, and retain the last 10 password history records.

3.2 Monitoring and Log Management

  1. Deploy a SIEM (Security Information and Event Management) tool to conduct real-time monitoring of API calls, data access and system operations, and configure alert rules for abnormal behaviors (such as multiple unauthorized access attempts, abnormal batch data extraction);
  2. Log records include event status, time (UTC+0), source IP, user account, API interface name and operation type, excluding PII data. The log retention period is not less than 12 months;
  3. Logs are only accessible to authorized security teams, with full audit of access behaviors, and tampering or deletion of logs is prohibited.

3.3 Vulnerability and Risk Management

  1. Conduct vulnerability scans monthly, entrust qualified third-party institutions to conduct penetration tests annually, and perform code vulnerability scans before each application release;
  2. Classify and dispose of vulnerabilities according to severity: critical vulnerabilities repaired within 7 days, high-risk vulnerabilities repaired within 30 days, medium-risk vulnerabilities repaired within 90 days, low-risk vulnerabilities repaired within 180 days or included in the system upgrade plan;
  3. Use a dedicated vulnerability management platform to track remediation progress, update vulnerability status in real time (Pending → In Progress → Remediated → Verified), and generate monthly remediation reports submitted to management for review;
  4. Establish a risk assessment process, reviewed annually by senior management to evaluate potential threats and vulnerabilities and formulate response measures; review and update the incident response plan every six months and after major system changes.

3.4 Incident Response

  1. Designate a dedicated Incident Management Point of Contact (IMPOC), establish a 24-hour response mechanism, and notify Amazon via email (3p-security@amazon.com) within 24 hours of detecting security incidents such as database hacks, unauthorized access and data leaks;
  2. Incident disposal process: immediately isolate the affected system → preserve evidence (logs, intrusion traces) → fix vulnerabilities → restore data from clean backups → conduct Root Cause Analysis (RCA) → implement corrective measures to prevent recurrence;
  3. Notify affected parties and regulatory authorities in accordance with legal requirements, do not communicate with third parties on behalf of Amazon, and retain incident disposal records for inspection.

IV. Compliance and Responsibilities

4.1 Compliance Commitment

Anhui Hengjuan Technology Co., Ltd. regularly organizes employees to receive training on Amazon policies, data security and privacy laws and regulations. Confidentiality clauses are included in labor contracts with employees handling data to clarify data protection responsibilities. We establish a process for handling Data Subject Access Requests (DSAR) to promptly respond to inquiries, corrections and deletion requests from authorized sellers and data subjects, in line with applicable regulatory requirements.

4.2 Policy Updates

This policy will be revised in a timely manner according to updates to Amazon SP-API policies, changes in laws and regulations and business adjustments. Updated versions will be published on the official website (https://hengjuan.product-demo.cn/) and take effect 7 days after publication. Authorized sellers continuing to use our services are deemed to accept the revised policy.

4.3 Contact Information

For questions about this policy, or to report data security-related issues and exercise statutory rights related to data, please contact us through the following methods:

Email: 766240847@qq.com

Phone: 18056019328