Terms & Conditions

Service Agreement
Privacy Policy
Refund Instructions
Automatic Renewal Agreement
Delivery Policy

Privacy Policy

Privacy Policy

Thorfast Booster is a network acceleration service product provided by Kylin Technology Co., Ltd. (hereinafter referred to as "Thorfast" or "the Company") for you. Thorfast highly respects your personal information and data. We are well aware of the significance of your personal information and will take corresponding security protection measures in accordance with relevant laws and regulations, and do our best to ensure the security and reliability of your personal information and data, and strive to keep your personal information safe and controllable. In light of this, Thorfast, the provider of the acceleration service (or simply "we"), has formulated the "Privacy Policy" (hereinafter referred to as "this Privacy Policy") and reminds you:

When you use the services we provide, you agree to be bound by this policy and the specific privacy information terms set in the individual service (hereinafter referred to as "specific terms"). In this case, both this policy and the specific terms will be effective for you. If there is any inconsistency between the specific terms and this policy, the specific terms shall prevail within the scope of their application. If a certain individual service provided by us does not apply to this policy, it will be clearly indicated in the service that this policy does not apply.

Before using this service, please read and fully understand this policy carefully, especially the terms marked in bold/underline. You should pay special attention to them. Only after confirming your full understanding and agreement should you start using the service. If you do not agree with the content of this policy, it may result in the service not functioning properly or not achieving the intended service effect. You should immediately stop accessing/using the service.

This policy will help you understand the following:

I. How We Collect and Use Personal Information

II. How We Use Cookies or Similar Technologies

III. Personal Information We May Share, Transfer, and Disclose

IV. How We Store, Transfer, and Protect Personal Information

V. How to Manage Your Personal Information

VI. Third-Party Services

VII. Protection of Minors

VIII. Revision and Notification

IX. How to Contact Us

Appendix: Regional Requirements

I. How We Collect and Use Personal Information

1. We will adhere to the principles of legality, propriety, and necessity, and based on the purposes stated in this privacy protection guideline, collect, use, and store your personal information that you voluntarily provide or that is generated during your use of the Thorfast accelerator. During your use of the Thorfast service, we will collect the information you voluntarily provide or that is generated due to the use of the service in the following ways, in order to provide services to you, optimize our services, and ensure the security of your account. If the use of your personal information exceeds the purpose stated at the time of collection and is directly or reasonably related, we will inform you again and obtain your explicit consent before using your personal information.

Business/Function Scenario

Possible Personal Information Fields/Types of System Permissions Obtained

Purpose of Collection/Obtainment

Registration and Login

Name/phone number/email/dynamic verification code

To identify you as a Thorfast user and complete login, so as to provide customized and continuous experience, and communicate with you about your account
To comply with legal obligations related to account creation and maintenance, such as:
- Implementing age assurance and verification measures
- Verifying your identity and protecting your information

Device MAC address, unique device identifier, network and technical information

Third-party platform account

Location information

Usage data and preferences
Communication with us
Location information

Local Game Detection

Registry information query permission

To identify locally installed games that support acceleration by reading the installation and startup paths of game applications in the registry, so as to quickly scan and add games to your acceleration list, and support their direct startup through this software

IP address query permission

To determine your region and network operator, so as to provide you with accurate acceleration line information

VPN permission

To normally obtain game traffic, realize game data transmission, and provide corresponding acceleration services for specific applications or games

PC Game Acceleration

Current device information and running process query permission

To verify the legitimacy of game processes by reading the list of locally running processes to obtain game process names and signature information, and provide acceleration services for specific games

Administrator permission

To normally install or run game acceleration components and provide corresponding acceleration services for specific games

Location information, IP address query permission

To determine your region and network operator, so as to provide you with accurate acceleration line information;

Registry information query permission

To identify locally installed games that support acceleration, so as to quickly scan and add games to your acceleration list, and support their direct startup through this software;

Local time reading

To verify with the system server time and assist in locating acceleration problems

VPN permission

To normally obtain game traffic, realize game data transmission, and provide corresponding acceleration services for specific games;

Search/Download/Install Games

Storage space permission

To store application caches and facilitate you to upload and download files such as resources necessary for software operation

Searched content, clipboard, download records

To provide efficient search services and personalized recommendation services

Order Placement, Payment and Delivery

Order amount, virtual property information, transaction and consumption records

To help you successfully complete the purchase of goods/services, ensure transaction security, query order information/transaction records, provide customer service, etc.

Transaction amount, order placement time, order merchant, order number, payment method, payment account, payment status information

To complete order payment and ensure transaction security

Information related to WeChat, Alipay, GooglePay, ApplePay, paypal;

To complete the binding of WeChat/Alipay/PayPal/GooglePay/ApplePay and fund settlement

Customer Service, Dispute Handling and Self-service

Necessary personal identity information, content related to your communication with us

To promptly feedback the results of your complaints, appeals or inquiries

Some personal information, including but not limited to account nickname, phone number, name, email, registration information and other relevant information

To realize Thorfast account information query and problem feedback

Game acceleration data

To promptly analyze and follow up on your feedback issues

2. We will not share or sell your information to any third party unless required by law. We may use your information to provide our services, improve our products, and communicate with you about important updates and promotions.

3. Data retention: We will retain personal data for a reasonable period necessary to achieve the collection purpose, including fulfilling any legal, regulatory, tax, accounting or reporting obligations. If there is a reasonable possibility of a complaint or legal claim, we may retain your personal data for a longer period.

4. Data security: We have taken appropriate management, technical and physical measures to protect your information from accidental or unauthorized loss, abuse, access, disclosure, alteration or destruction. If we discover any unauthorized disclosure of your information, we will notify you in accordance with legal requirements and take measures to protect your information.

5. For compliance with relevant laws, regulations and policies of relevant authorities, Thorfast users are required to undergo real-name authentication to continue using the accelerator service. We will collect your real-name identity information (including name, ID number, passport number, etc.) upon your consent or when you voluntarily provide it. This information is sensitive and refusing to provide real-name identity information may result in restrictions on your use of this product.

6. Exceptions for obtaining consent:

According to relevant laws and regulations, the following circumstances require no consent from you to process your information:

(1) Necessary for entering into or performing a contract to which you are a party;

(2) Necessary for fulfilling legal duties or obligations;

(3) Necessary in response to a public health emergency or in emergency situations to protect your or others' life, health and property safety;

(4) To handle your personal information in a reasonable scope for news reporting, public opinion supervision, etc., in the public interest;

(5) To handle your publicly disclosed or already legally disclosed personal information;

(6) Other circumstances as required by laws and regulations and regulatory authorities.

II. How We Use Cookies or Similar Technologies

1. We or our third-party partners may obtain and use your information through Cookies or similar technologies, and store such information as log data.

2. By using Cookies, we provide users with a simple, easy, and personalized online experience. A Cookie is a small amount of data that is sent from a web server to your browser and stored on your computer's hard drive. We use Cookies to benefit our users. For example, to make the login process of the Thorfast virtual community faster, you can choose to store your username in a Cookie. This way, it will be more convenient and faster for you to log in to Thorfast's services next time. Cookies help us provide better and faster services and make your experience on this service more personalized. However, you should be able to control whether and how your browser accepts Cookies. Please refer to the accompanying files of your browser for more information.

3. We and third-party partners may collect and use your information through Cookies or similar technologies, and store it.

4. We may use our own Cookies or similar technologies for the following purposes:

(1) Remember your identity. For example: Cookies or similar technologies help us identify your identity as a registered user of ours, or save the information you provide us about your preferences or other information;

(2) Analyze your use of our services. We can use Cookies or similar technologies to understand the activities you perform using our services or which services are the most popular;

(3) Ad optimization. Cookies or similar technologies help us provide you with relevant advertisements based on your information rather than general advertising.

5. While we use Cookies or similar technologies for the purposes described above, we may also aggregate and provide non-personally identifiable information collected through Cookies or similar technologies to advertisers and other partners for analyzing how you and other users use our services and for advertising purposes. There may be advertisers and other partners on this service who place Cookies or similar technologies. These Cookies and/or similar technologies may collect non-personally identifiable information about you to analyze how users use these services, send you advertisements that may interest you, or evaluate the effectiveness of advertising. These third-party Cookies or similar technologies collect and use this information not subject to this policy, but rather subject to their own information protection statements. We are not responsible for these third-party Cookies or similar technologies.

6. You can reject or manage Cookies or similar technologies through your browser or user selection mechanisms. However, please note that if you disable Cookies or similar technologies, we may not be able to provide you with the best service experience, and some services may not function properly. At the same time, you will still receive advertisements, but the relevance of these advertisements to you will decrease.

III. Personal Information We May Share, Transfer or Disclose

(1) Sharing

.1. We highly value the protection of your personal information. We will share personal data with affiliated companies, suppliers, or agents that serve the purposes stipulated in this privacy policy. In such cases, these companies must comply with our data privacy and security requirements. We only share information on the basis of disclosing the minimum necessary information.

.2. To better protect the physical and mental health of minors and guide them to surf the Internet healthily, we will disclose to their guardians the login accounts, login duration, consumption transaction records, and behavioral information of minors, for reminder, confirmation, and handling, based on the provisions of laws and regulations or the requests of the guardians of minors.

.3. To enhance the security of your use of the Thorfast service, protect the personal and property safety of you and other users or the public, better prevent phishing websites, fraud, network vulnerabilities, computer viruses, network attacks, and network intrusions, and more accurately identify violations of laws and regulations or rules of the Thorfast-related agreements, we may use or integrate your account information, device information, and software usage information. With your authorization or in accordance with the law, the information shared or disclosed will be used for identity verification, detection, and prevention of security incidents, and necessary recording, auditing, analysis, and disposal measures will be taken in accordance with the law.

(II) Transfer

.1. As our business continues to develop, we may undergo mergers, acquisitions, asset transfers or similar transactions, and your information may be transferred as part of such transactions. We will require the company or organization holding your personal information to continue to be bound by this policy. Otherwise, we will require that company or organization to obtain your authorization and consent again.

.2. With your explicit consent, we will transfer your personal information to third parties.

(III) Disclosure

1. We will disclose your personal information only under the following circumstances, and with security protection measures in line with industry standards:

.2. According to your request, disclose the information you have specified;

. In cases where we are required to provide your information based on legal, regulatory requirements, mandatory administrative or judicial requirements, we may disclose your information based on the type and method of disclosure required. Under the premise of complying with the law, when we receive a request for disclosure, we will require the recipient to provide the corresponding legal documents, such as subpoenas or investigation letters. We firmly believe that for the information requested from us, transparency should be maintained as much as possible within the legal framework. We have carefully reviewed all requests to ensure they have legal basis and are limited to data obtained by law enforcement agencies for specific investigation purposes and with legal rights.

(IV) Exceptions to obtaining prior consent for sharing, transferring, and disclosing information

The following circumstances do not require prior consent for sharing, transferring, or disclosing your information:

(1) Directly related to national security, defense security;

(2) Directly related to public safety, public health, and major public interests;

(3) Directly related to criminal investigation, prosecution, trial, and judgment execution and other judicial or administrative law enforcement;

(4) To protect your or other individuals' life, property, and other significant legitimate interests but it is difficult to obtain your consent;

(5) Information you have disclosed to the public on your own;

(6) Information collected from legally open disclosure channels, such as legal news reports and government information disclosure;

(7) Related to our fulfillment of legal regulations or rules of the Thorfast-related agreements.

According to the law, sharing, transferring, or disclosing your information that has been anonymized and cannot be restored and re-identified of the information subject does not constitute an external sharing, transfer, or public disclosure of personal information. The storage and handling of such data will not require further notification and consent from you.

IV. How We Store, Transfer and Protect Personal Information

(1) Storage of Personal Information

.1. We maintain main servers around the world to continuously provide our services globally. Your personal information may be stored in the Hong Kong Special Administrative Region.

.2. Unless otherwise stipulated by laws, regulations or regulatory authorities, we only store your personal information for the necessary purposes and for the shortest period of time as required by this policy. If we terminate our services or operations, we will promptly stop collecting your personal information and will comply with relevant legal requirements to notify you in advance. After terminating our services or operations, we will delete or anonymize your personal information, except where otherwise stipulated by laws, regulations or regulatory authorities.

.3. We commit to storing your personal information for a reasonable period of time as required by law; after the expiration of this period, we will delete your personal information or anonymize it.

(2) Transfer of Personal Information

1. Our business may require us to transfer your personal data to countries other than your place of residence. These countries may include the People's Republic of China or other countries and regions. We will take appropriate measures to ensure that the recipients of your personal data fulfill the obligation of confidentiality and ensure that measures such as standard contract terms are implemented. You can obtain these terms by contacting us.

2. Our service providers, affiliated companies and subsidiaries, as well as partners are located in various countries around the world. Your personal information may be transmitted to these countries/regions and processed there. These countries/regions may have different data protection laws from those in your jurisdiction (and in some cases, may not be as protective). These entities commit to processing information in accordance with applicable data protection laws and implementing appropriate security measures to protect your information.

(3) Protection of Personal Information

We attach great importance to information security and have established a dedicated security team. We take all reasonable and feasible measures to protect your personal information:

1. Data security technical measures

We will adopt security protection measures that comply with industry standards, including establishing reasonable system regulations and security technologies to prevent your personal information from being accessed, used, or modified without authorization, and to avoid data damage or loss.

Our services employ various encryption technologies, such as in certain services, we will use encryption technology (such as SSL) to encrypt and store your personal information and isolate it through isolation technology to protect your personal information.

2. When using personal information, such as information display and information association calculation, we will adopt various data de-identification technologies to enhance the security of information during use.

We will also use strict data access permission control and multiple identity authentication technologies to protect personal information and prevent its unauthorized use.

3. Other security measures we take to protect personal information

(1) We have an industry-leading data-centric, data lifecycle-oriented data security management system that enhances the security of the entire system from multiple dimensions such as organizational construction, system design, personnel management, and product technology. We manage and regulate the storage and use of personal information through establishing data classification and grading systems, data security management norms, and data security development norms.

(2) We conduct comprehensive security control over data through confidentiality agreements for information contacts, monitoring and auditing mechanisms.

(3) We will also hold security and privacy protection training courses to enhance employees' security awareness and understanding of our personal information protection policies and related procedures. . We only allow Thorfast employees and partners who need to know this information to access your personal information. We have set up strict access permission control and monitoring mechanisms for this purpose. We also require all personnel who may come into contact with your personal information to fulfill the corresponding confidentiality obligations. If these obligations are not fulfilled, legal liability may be pursued or the cooperation relationship with Thorfast may be terminated.

.(4) The Internet is not an absolutely secure environment. Moreover, the communication methods such as emails, instant messaging, social software, or other service software with other users cannot be determined to be completely encrypted. We recommend that you use such tools with complex passwords and pay attention to protecting your information security. When communicating with third parties through this service or purchasing goods and services, you inevitably have to disclose your information to the transaction counterpart or potential transaction counterpart, such as contact information or postal address. Please properly protect your information and only provide it to others when necessary.

The Internet environment is not 100% secure. We will do our best to ensure or guarantee the security of the personal information you send to us. If our physical, technical, or management protection facilities are damaged, resulting in unauthorized access, public disclosure, tampering, or destruction of personal information, and causing your legitimate rights and interests to be damaged, we will bear corresponding legal responsibilities.

4. Handling of Security Incidents

To address potential risks such as information leakage, damage, and loss, we have formulated several systems, clearly defining the classification and grading standards for security incidents and security vulnerabilities, as well as the corresponding handling procedures. We have also established an emergency response team for security incidents, following the requirements of the security incident handling norms, to activate security plans for different security incidents, carry out cost reduction, analysis, location, formulate remedial measures, and collaborate with relevant departments for traceability and crackdown. We also regularly organize internal training and emergency drills, enabling our relevant staff to master the corresponding emergency handling strategies and procedures.

In the event of an unfortunate information security incident, we will, in accordance with legal requirements, promptly inform you of the basic situation and possible impacts of the security incident, the measures we have taken or will take, suggestions for self-prevention and risk reduction, and remedial measures for you. We will also promptly inform you of the incident-related circumstances through emails, letters, phone calls, push notifications, etc., and when it is difficult to inform each information subject individually, we will adopt reasonable and effective methods to issue announcements. At the same time, we will, in accordance with regulatory requirements, actively report the handling situation of the information security incident.

Please understand that due to technical limitations and the limitations of risk prevention, even though we have tried to strengthen security measures as much as possible, we cannot always ensure 100% security of the information. You need to understand that the system and communication network you use to access this service may encounter problems due to circumstances beyond our control.

Please ensure that you properly safeguard your account, password, and other identity elements. When using this service, we will identify your identity through your account, password, and other identity elements. If you disclose the aforementioned information, you may suffer losses and may be adversely affected. If you discover that your account, password, and/or other identity elements may or have been disclosed, please contact us immediately so that we can take corresponding measures to avoid or reduce the related losses.

V. How to Manage Your Personal Information

(1) Query, Update and Deletion

.1. We encourage you to update and modify your personal information to make it more accurate and effective. We will adopt appropriate technical means or provide contact channels for submitting applications to ensure that you can query, update and correct your personal information or other information provided when using this service within the time limit stipulated by the relevant laws and regulations. For the information collected through COOKIES or similar technologies, we have also explained the selection mechanisms provided to you in the second part of this policy.

.2. Personal Information Deletion: It refers to the act of removing personal information from the system involved in the daily business functions, making it impossible to be retrieved or accessed. You have the right to delete your information at any time. If you want to query, modify or delete your information, please log in to the Thorfast account center and the relevant function pages of each individual service, we have provided relevant operation guidelines and settings for you, you can operate by yourself, if you have any doubts or difficulties during the operation, you can choose to contact us through the feedback channels listed in the chapter, we will provide an answer within 30 working days.

3. In the following situations, you have the right to request us to delete your personal information:

(1) The processing purpose has been achieved, cannot be achieved, or is no longer necessary;

(2) We stop providing the product or service, or the retention period has expired;

(3) You withdraw your authorization;

(4) Our processing of personal information violates the law, administrative regulations or the agreement with you;

(5) Other circumstances stipulated by law, administrative regulations. When you correct, delete your personal information, or apply to cancel your account, we may not be able to immediately correct or delete the corresponding information from the backup system. We will securely store your personal information and limit any further processing of it until the backup can be cleared or anonymized.

(2) Publicity and Sharing

Our many services allow you to not only share your information with your social network, but also with all users who use the service. For example, the information you upload or post on this service, your responses to the information uploaded or posted by others, the information uploaded or published through email or in the publicly visible areas of this service, and the location data and log information related to such information. As long as you do not delete the information you have publicly or shared, the relevant information may remain in the public domain; even if you delete the shared information, the relevant information may still be cached, copied or stored by other users or third parties not under our control, or saved by other users or such third parties in the public domain. If you publicly or share information through the above channels, we will not be responsible for any information leakage caused thereby. Therefore, we remind and ask you to carefully consider whether to publicly or share your information through the above channels.

(3) Account Cancellation

.1. We provide you with the means to cancel your account. If the conditions stipulated in our service terms and relevant laws and regulations are met, you can contact us through the listed feedback channels and we will assist you in canceling your account.

.2. After your account application for cancellation, we will review your cancellation application within 15 working days after counting the virtual assets in your account. If the review is passed, your account will be irretrievably cancelled.

.3. After your account is cancelled, we will stop providing all or part of this service to you, and delete your personal information or anonymize it as per your request, except as otherwise provided by laws and regulations.

(4) Changing the Scope of Your Authorized Consent

1. You can choose whether to disclose your personal information to us. Some personal information is necessary for using this service, but most other information is provided by you. You can change the scope of the information we continue to collect or withdraw your authorization by deleting information, turning off device functions, or canceling your account.

2. After withdrawing your authorization, we cannot continue to provide the service corresponding to the withdrawn authorization, and will no longer process your corresponding information. However, your decision to withdraw the authorization will not affect the information processing based on your authorization previously.

(5) Constraining Automated Decisions by Information Systems

In some business functions, we may make decisions based solely on non-human automated decision-making mechanisms, such as information systems and algorithms. If these decisions significantly affect your legitimate rights and interests, you have the right to request an explanation from us, and we will provide appropriate remedies.

(6) Responding to Your Requests

To ensure security, you may need to provide a written request or prove your identity in other ways. We may first require you to verify your identity before processing your request. For reasonable requests, we generally do not charge fees, but for repeated, excessive, technical requirements (such as developing a new system or fundamentally changing current practices), risks to the rights and interests of others, or very impractical requests (such as those involving information stored on backup tapes), we may refuse to respond.

In the following circumstances, we will not respond to your request:

(1) Related to our fulfillment of legal obligations;

(2) Directly related to national security and defense security; (3) Those directly related to public safety, public health, and significant public interests;

(4) Those directly related to criminal investigation, prosecution, trial, and enforcement of judgments;

(5) Where we have sufficient evidence to prove that you have subjective malice or abused your rights;

(6) Where it is necessary to protect your or other individuals' significant rights and interests such as life and property, but obtaining your consent is very difficult;

(7) Where responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations;

(8) Those involving trade secrets.

VI. Third-party Services

1. This service may access or link to social media or other services provided by third parties (including in the form of websites or other services). Including:

(1) You can use the "Share" button to share certain content of this service to a third-party service, or you can share the content of a third-party service to this service. These functions may collect your information (including your log information) and may install COOKIES on your device, so as to enable the above functions to operate normally;

(2) We provide links through advertisements or other means of our service, allowing you to link to third-party services or websites;

If you register and log in to our products using a third-party account, if you have the need to cancel the account, you need to apply for the cancellation of the account or revoke the authorization for logging into our products to the corresponding third party.

VII. Protection of Minors

1. If you are a minor under the age of 18, before using this product, you should read and agree to this privacy policy under the guidance of your parents or other guardians; if you are the guardian of a minor under the age of 18, before using the related services, you should have your minor read and agree to this privacy policy.

2. We take measures to verify the user's age, requiring verifiable parental consent to process the personal information of minors, and implementing high privacy default settings to protect the privacy of children. These measures include:

  •  Providing specific privacy statements for the service, explaining which personal information we may collect, use and disclose from their children.
  •  Seeking verifiable parental consent to process the personal information of minors in accordance with legal requirements.
  •  Limiting the processing of personal information of minors to the reasonable necessary scope for providing the service.
  •  Providing parental control to achieve visibility and fine control over the privacy settings of minors.

Parents and guardians can withdraw their consent for further processing of their children's personal information at any time, or contact us to request the deletion of the personal information related to their children's accounts. If you believe that your child is using a service that does not process their personal information as you have agreed, please contact us through the contact information stipulated in this agreement.

3. As for this section, "minor", "child" or "child" refers to a minor who has not reached the digital consent age required by the applicable laws in your place of residence, or in other circumstances where they do not meet the legal requirements corresponding to the user's behavior.

.4. If you are the guardian of a minor, when you have other questions about the personal information of the minor you are supervising, please contact us through the contact information disclosed in this privacy policy.

VIII. Revision and Notification

1. To provide you with better services, we may modify the terms of this policy from time to time based on the updates of this service and the relevant requirements of laws and regulations. Such modifications constitute part of this policy. We will announce any changes to this policy on this page. For significant changes, we will also provide more prominent notifications (including website announcements, push notifications, pop-up prompts, or other methods). The changes referred to as significant changes include:

(1) Our service model undergoes major changes. Such as the purpose of processing personal information, the types of personal information processed, and the way personal information is used, etc.;

(2) We undergo significant changes in our ownership structure. Such as business adjustments, bankruptcy mergers, etc., which cause changes in the owner;

(3) The main recipients of personal information sharing, transfer or public disclosure undergo major changes;

(4) The rights of the user in processing personal information and the way they are exercised undergo major changes;

(5) The responsible department for handling personal information security and the contact methods and complaint channels for us undergo major changes;

(6) Other important or circumstances that may significantly affect your personal rights and interests occur.

2. If you do not agree to such changes, you can choose to stop using this service; If you continue to use this service, it indicates that you have fully read, understood and agreed to be bound by the revised policy of this document.

3. Any modifications we make will prioritize your satisfaction. We encourage you to review our privacy policy each time you use this service.

4. We may send you notifications related to the service when necessary (for example, when we suspend a certain service, change or terminate the provision of a certain service due to system maintenance).

5. If you do not wish to continue receiving the messages we push, you can request us to stop the push. For example: request us to stop sending promotional messages according to the SMS subscription guidelines; however, this does not apply if we send messages in accordance with legal requirements or the service agreement of a certain service.

6. We have provided an English translation version of the privacy policy. However, if there is any conflict between the English version or the local language translation and the Chinese version, unless otherwise stipulated by applicable laws, the Chinese version shall prevail.

VIII. How to Contact Us

1. We have established a dedicated department for personal information protection, which will protect your personal information in accordance with this policy. If you have complaints or reports regarding network information security, or if you have any questions, opinions or suggestions regarding this policy, Thorfast's privacy measures, or your information, please contact the personal information protection staff of Thorfast. Contact information: thorfastservice@thorfast.com

2. Generally, we will respond to your questions, opinions or suggestions within fifteen working days after receiving them and verifying your user identity.

Appendix: Regional Requirements

If you are a user located in Australia, Brazil, Canada, Hong Kong Special Administrative Region, India, Macau Special Administrative Region, Singapore, Taiwan Region of China or the United States, the terms listed on this page based on the name of your jurisdiction, in addition to the terms specified in our privacy policy, also apply to you.

Jurisdictional Specific Appendices