Data Governance & Personal Privacy
At JadeMetricData, we treat personal data with the same rigorous analytical integrity we apply to our enterprise metrics. This policy outlines how we collect, process, and protect your information as of March 29, 2026.
1. Information Collection and Parameters
We collect data necessary for providing professional intelligence services. This includes contact information provided via our inquiry forms (Name, Email, Corporate Entity) and technical metrics related to your interaction with our digital platforms.
When you engage with JadeMetricData, we may collect:
- Identity Data: Full name and professional title.
- Contact Data: Business email address and telephone number.
- Technical Metrics: IP addresses, browser types, and session duration data collected through server logs.
- Inquiry Data: Specific details regarding your enterprise data requirements.
Our Commitment to Intelligence Ethics
We believe that metrics should serve human decisions without compromising individual privacy. We operate under a "Data-Minimalism" framework, ensuring we only retain the data that is essential for operational excellence.
Zero Sale Policy
We never trade or sell your personal or professional data to third-party brokers.
Encryption Standards
All information is protected by industry-standard TLS encryption during transit.
2. Usage of Your Data
We use your data to facilitate our strategic consultancy services. This includes responding to inquiries, providing analytical reports, and improving the functionality of our digital tools.
Specifically, the metrics derived from your usage help us optimize our content delivery networks and ensure our service remains accessible and performant across the Shanghai region and globally.
3. Data Safeguards and Storage
JadeMetricData employs administrative, technical, and physical safeguards. We store information on secure servers with restricted access. Access to your personal data is limited to authorized personnel who require the information to perform their specific job functions.
"Security is not a static state, but an ongoing process of monitoring and adjustment. At JadeMetricData, we perform monthly audits of our access logs and security protocols."
4. PIPL and Regional Provisions
For our clients and visitors based in Greater China, we comply specifically with the Personal Information Protection Law (PIPL). We ensure that any cross-border data transfer follows the requisite security assessments and standardized contracts stipulated by the Cyberspace Administration of China (CAC).
Our primary data hub specifically for the Shanghai 30 operations is localized to provide the highest level of efficiency and compliance.
5. Your Control and Rights
You have the right to access, rectify, or request the deletion of your personal data. To exercise these rights, please contact our data officer using the details provided below.
Precision is our standard, privacy is our baseline.
Questions Regarding Your Data?
Our compliance team is available during standard business hours to address any concerns regarding our handling of enterprise metrics or personal information.