Privacy Policy

NewCoin (hereinafter referred to as "NewCoin," "we," or "the Platform") attaches great importance to user privacy protection and strictly fulfills data protection responsibilities. This Privacy Statement explains how we collect, use, store, and protect users' personal information, as well as your rights and obligations when using NewCoin services. Please read this Privacy Statement carefully before using our services.

I. Scope of Application

This Privacy Statement applies to all services provided by NewCoin, including but not limited to:

  • NewCoin websites, mobile applications, clients, mini-programs, and other applications

  • APIs (Application Programming Interfaces) and related digital asset trading functions

  • Independently operated platforms and collaborative projects within the ecosystem

Using NewCoin services constitutes your agreement to the collection and use of your personal information in accordance with this Privacy Statement. This Statement takes effect alongside your service agreement, terms of use, and other contractual documents.

II. Collection and Use of Personal Information

1. Purpose of Collection We collect and process your personal information to provide secure, efficient, and personalized services, including but not limited to:

  • Identity verification and Customer Identification (KYC)

  • Providing digital asset trading, payment, and transfer services

  • Communicating with users and providing customer support

  • Risk control, fraud prevention, and prevention of unauthorized use

  • Optimizing product and service functionalities

2. Types of Personal Information Collected Personal information that may be collected includes:

  • Contact information (name, email address, phone number)

  • Identity information (government-issued ID, passport number, KYC verification information)

  • Device information (IP address, MAC address, browser or operating system details)

  • Transaction and account information (bank account details, transaction records)

  • Other information provided by users (e.g., data for personalized services)

We do not collect sensitive information that infringes upon user human rights. Any collection of sensitive information requires prior explicit user consent.

III. Use and Sharing of Personal Information

We will not provide personal information to third parties without user consent, except in the following circumstances:

  • When required by laws, regulations, or regulatory authorities

  • When the user explicitly consents to disclosure

  • When the user violates platform rules or terms of use

  • When necessary to protect the legitimate rights and interests of the user or the Platform

  • For fee settlement, statistical analysis, or academic research (in anonymized form)

We may share personal information with subsidiaries and partners to improve service experiences, but we will notify you in advance and seek your consent.

IV. User Rights and Management

Users can log into their accounts at any time to modify personal information or submit modification/deletion requests via email or written form (excluding identity verification information).

Users may terminate services or stop the use of their personal information at any time but must provide identity verification information.

Users can manage mobile device permissions, including:

  • Camera and Gallery: Accessed only when changing profile pictures; we do not scan or store other photos.

  • Fingerprint Recognition: Used solely for quick login verification; data is stored locally on the device and not transmitted to the Platform or third parties.

V. Use of Cookies

We use Cookies to provide customized services and improve user experience.

You can choose to accept, reject, or be asked each time about Cookie usage via your browser settings.

Rejecting Cookies may affect some service functionalities.

VI. Information Security Protection Measures

  • Personnel Management: Minimize personnel handling personal information and conduct security training.

  • Technical Protection: Data encryption, access control, firewalls, and intrusion detection systems.

  • Internal Management: Develop and implement personal information security management plans.

  • Regular Inspections: Conduct periodic self-assessments to ensure security measures operate effectively.

VII. Protection of Children's Privacy

We do not collect information from children under the age of 13 without parental or guardian consent.

If we discover that we have inadvertently collected children's information, we will take immediate measures to delete such data.

VIII. Contact Us

If you have any questions, complaints, or inquiries regarding personal information protection or privacy management, please contact us via:

  • Customer Service Center

We are committed to processing your request and responding as soon as possible.

Last updated