Data transmission visualization
Data Governance

Privacy Architecture

At JadeLogic Systems, we apply the same rigorous logic systems to data protection as we do to our enterprise analytics solutions. This policy outlines how we collect, process, and safeguard personal information within the regulatory landscape of China and international standards.

Effective Date: March 29, 2026 Version: 2.4.0

Data Collection Framework

Direct Engagement Data

When you engage with our consultancy services or request a demonstration of our analytics platforms, we collect specific identifiers required to maintain a professional relationship. This includes your name, corporate email address, telephone number, and job title. We process this information based on the necessity of fulfilling service inquiries or pre-contractual negotiations.

Technical Interaction Metadata

Our systems automatically log technical data to ensure the security and performance of our digital infrastructure. This encompasses IP addresses, browser specifications, and navigation patterns within the JadeLogicSystems.digital domain. This telemetry is vital for identifying system inefficiencies and preventing unauthorized access to our logic systems.

"Data is the foundation of logic. We treat your personal information as a critical asset, ensuring it is never sold, traded, or distributed to third-party marketers."

Processing Objectives

Architectural Optimization

We analyze usage patterns to refine our analytics architectural solutions, ensuring they meet the high-concurrency needs of Chinese enterprise clients.

Legal Verification

Maintaining compliance with the Personal Information Protection Law (PIPL) and other regional cybersecurity regulations in the PRC.

Operational Communication

Providing technical updates, security alerts, and administrative notifications related to your active consultancy projects.

Analytics Refinement

Aggregating anonymized data to benchmark logic performance across different industry sectors in urban hubs like Shanghai.

Abstract data architecture

Data Security

We employ AES-256 encryption at rest and TLS 1.3 for data in transit. Our servers are located in high-security facilities with restricted physical access, monitored 24/7 by our internal security operations center.

  • End-to-end encrypted logic flows
  • Regular penetration testing
  • Strict access control lists (ACL)

Your Individual Data Rights

Access & Rectification

Request a copy of the personal data we hold about you or demand corrections to inaccurate analytical records.

Erasure (Right to be Forgotten)

Request the permanent deletion of your information when it is no longer necessary for the original logic purpose.

Processing Restriction

Limit how we utilize your data during disputes or periods of verification regarding data accuracy.

Consent Withdrawal

Revoke previously granted permissions for data processing, effective immediately for future operations.

Cross-Border Transfers & Partners

As a specialist in logic systems based in China, JadeLogic Systems primarily stores and processes data within the mainland. However, in certain enterprise analytics scenarios involving global infrastructures, data may be transferred abroad.

Such transfers are conducted only under standard contractual clauses (SCCs) and after performing a rigorous Data Protection Impact Assessment (DPIA). We ensure that all international partners maintain security standards equivalent to our own.

We may disclose your information if required by law to comply with a judicial proceeding, court order, or legal process served on our website, or to protect the safety of our systems and users.

Privacy Inquiries

If you have questions regarding this policy or wish to exercise your data rights, our Data Protection Officer is available for direct consultation.

Postal Address

Shanghai 57, China

Email Communications

info@jadelogicsystems.digital

Compliance Line

+86 21 4000 0357