We values user privacy and takes all precautions to protect the information we collect from unauthorized access, modification or disclosure. The following is a detailed description of the privacy and data handling policy.
Amazon PII information is only used for our self-fulfillment order label printing, how Amazon data is
collected
We deploy the web application to our web VPC server, at the same time, we also have our database VPC server, when we need to print the self-fulfillment order label, we click the "Sync Order" button, please check the photo below, so that we need The buyer's name, address, and phone number are obtained through the API interface of MWS, and then we store the obtained buyer data on the database server.

processed
We store general data and Amazon PII data separately, and encrypt PII data use the 2048-bit RSA algorithm. We will only obtain order data for nearly 30 days. We have deployed our Windows Service on our server, and our windows server automatic program will be automatically delete the over 30-day PII data.
stored
We store the Amazon data in our company's internal virtual private cloud server, the Amazon data is also stored encrypted, we use the Microsoft SQL Server 2020 to store the data, We have a very complex password to connect the database, we strictly control data access and only the web server can access the database server, we also disabled the permission to copy database files.
used
We only use the Amazon PII data for self-fulfillment order label printing, please check the photo below, we never communicate buyer by phone or send irrelevant parcel to our buyers, we respect every buyers privacy rights, we will retain the buyer PII data temporary for 30 days.


shared
We never share the Amazon data to others or publicly, we adopts RBAC (Role-Based Access Control) mode of authority management.
In RBAC, permissions are associated with roles, and users get the permissions of these roles by becoming members of appropriate roles.
In our application, the user's permission to access data is restricted through the setting of field read and write data permissions in role management. When creating a data model, annotate the sensitive data model so that the data of the model is encrypted during transmission.
disposed.
We will use our Window service C#.Net based application to delete the amazon data over 30 days, we only keep the amazon data for 30 days, and the disposed data can not be recovered. We will check the windows service whether dispose the data according the schedule every day, if we the application is not running, we will check the problem and update the automatic application in 24 hours.