Because of orders increasing sharply in this peak season ,and we’re keeping the best quality , so some orders will be delayed 2-3 days to ship out , please know & understand .
We apologize for any inconvenience this delays may cause , and please contact us by email or online messager if you’re urgently and we’ll do adjustment for rush production .
No price is ever displayed on your shipping label for orders that shipped via YunExpress, 4PX, J&T, YDH, or DHL. However, for orders that shipped via EMS, there’s a price shown on the outside of the package due to shipping regulations.
Regarding orders that shipped via FedEx to other countries except for the US, there’s no price shown on the shipping label. However, there’s an invoice attached due to shipping regulations.
Our Car Pet Seat Cover can be installed in 2 different ways. In this video, you’ll see the most casual way to use it. Of course, you can just hang one side of the pet seat cover.
Fujian Zhongchao Technology Co., Ltd. Data Security and Personal Information Protection Regulation
Document Number: IS-POL-2024-001
Version: V2.0
Effective Date: May 28, 2024
Developed by: R&D Department & Legal & Compliance Department
1. Introduction and Purpose
To ensure the data security of the POPCUSTOMS application (hereinafter referred to as “the App”) operated by Fujian Zhongchao Technology Co., Ltd. (hereinafter referred to as “the Company”), and to fully comply with relevant laws and regulations such as the Cybersecurity Law of the People’s Republic of China, the Data Security Law of the People’s Republic of China, and the Personal Information Protection Law of the People’s Republic of China, this regulation is hereby established.
This regulation is a mandatory internal document for the Company’s data security management. It aims to define data classification standards, protection measures, operational procedures, and responsibility attribution, ensuring that all data processing activities operate within a secure and compliant framework. All employees, contractors, and third-party partners who have access to Company data and user personal information must strictly adhere to this regulation.
2. Core Principles
Lawfulness and Compliance: All data collection and processing activities must have a legal basis and obtain explicit user authorization.
Data Minimization: Only the minimum types and amount of data necessary to achieve specific, explicit, and legitimate purposes shall be processed.
Accountability: The responsibilities and obligations of various departments and positions regarding data security protection shall be clearly defined.
Security Safeguards: Technical and administrative measures commensurate with technological developments and business risk levels shall be adopted to ensure data security.
Lifecycle Control: Security management shall be implemented throughout the entire data lifecycle, including collection, storage, use, processing, transmission, provision, disclosure, and deletion.
3. Data Classification and Protection Levels
The Company classifies processed data as follows and implements corresponding protection measures:
Data Level
Definition
Examples
Protection Requirements
Level 3:Highly Sensitive Data
Data that, if leaked, may lead to discrimination or serious harm to personal safety and property.
National ID numbers, bank card numbers, biometric information, precise location data, unencrypted passwords.
Mandatory encryption in transit and at rest; Access requires separate authorization and dynamic two-factor authentication (2FA); Access logs are retained permanently and audited weekly.
Level 2: Sensitive Data
General personal information, the leakage of which may harm personal privacy.
Name, phone number, shipping address, order information, device identifiers (IMEI/OAID).
Encryption in transit; Encryption of sensitive fields at rest; Access follows the principle of least privilege; Access logs are retained for 6 months.
Level 1: Internal Data
Non-public internal data generated from business operations, not directly identifying individuals.
Logical isolation storage; Access is controlled by corporate network and permissions.
Level 0: Public Data
Publicly available information that can be used freely.
Product descriptions, company news, help center articles.
Routine management.
Routine management.
4. Technical Security Measures
Encryption Technology:
Encryption in Transit: All communication between clients and servers mandates the use of TLS 1.3 protocol, with insecure cipher suites disabled.
Encryption at Rest:
User passwords are stored using the bcrypt algorithm (work factor 12) with salting.
Highly sensitive data (e.g., national ID numbers) is encrypted at the database level using the AES-256 algorithm.
Access Control:
Principle of Least Privilege: Strictly enforced. Employees can only access data absolutely necessary for their duties. Access requests require written approval from department heads and the Data Protection Officer (DPO).
Account Security: Complex password policies with mandatory periodic changes are enforced. Two-factor authentication (2FA) is enabled for access to core systems and admin panels.
Logging and Auditing: Immutable logs are maintained for all backend administrative operations and database queries (especially those involving user data). The security team conducts a comprehensive audit of access logs monthly.
Secure Development and Testing:
Security requirements are integrated into the Software Development Lifecycle (SDLC). Code security audits and Privacy Impact Assessments (PIA) are mandatory before new features are launched.
Penetration testing is conducted quarterly by third-party security firms or an internal red team. All identified critical vulnerabilities must be remediated within 72 hours.
5. Organizational and Administrative Measures
Data Protection Officer: A Data Protection Officer is appointed to oversee the implementation of this regulation and ensure compliance.
Employee Training: All new employees must undergo onboarding training on data security and privacy protection, with annual refresher training conducted. Training records are maintained.
Third-Party Management: All integrated third-party SDKs (e.g., Alipay, WeChat Login) undergo technical compliance assessments and must sign Data Protection Agreements clarifying their responsibilities. A list of key third parties is provided in the Appendix.
Data Breach Response:
A 7×24 Security Incident Response Team is established.
Upon detection of a suspected data breach, the emergency response process is immediately activated: Contain -> Assess -> Notify -> Remediate.
If a breach is confirmed, reporting obligations to regulators and affected users will be fulfilled within the timeframe required by law (e.g., 72 hours).
6. Data Retention and Deletion
User personal information is retained for the minimum period necessary to achieve the processing purposes.
After a user actively cancels their account, their personal data will be deleted from business systems within 30 days, and from all backups during the subsequent backup cleanup cycle (not exceeding 60 days in total).
Data that exceeds the retention period will be anonymized, making it impossible to identify specific individuals and irreversible.
7. Audit and Update
This regulation is reviewed at least annually in full, or updated promptly in response to changes in laws, regulations, or business operations.
All revised versions are tracked by version number and published after approval by management.
8. Contact Us
If you have any questions about this policy or wish to exercise your personal information rights (access, correction, deletion, withdrawal of consent, etc.), please contact us via:
Company Name: Fujian Zhongchao Technology Co., Ltd.
Email: support@popcustoms.cn
Customer Service Tel: +86 13305962420 (Weekdays 8:30~12:00, 14:00~18:00 GMT+8)
We commit to responding to and processing your requests within 15 business days.