Privacy Policy of SimWorks Cloud Computing

Welcome to use the cloud computing products and services provided by Shandong SimWorks Software Technology Co., Ltd.! Shandong SimWorks Software Technology Co., Ltd. (hereinafter referred to as "We" or "SimWorks") is well aware of the importance of personal information to you. We have always solemnly committed to protecting the personal information and privacy of users (hereinafter referred to as "the User" or "You") who use our products and services (hereinafter referred to as "the Services"). When you use the Services, we may collect and use your relevant personal information (hereinafter referred to as "Personal Information"). This Privacy Policy (hereinafter referred to as "this Policy") applies to the Services we provide for you. We hope to explain to you through this Policy the corresponding rules for collecting and using your Personal Information, as well as the ways we provide you with access, correction, deletion, and protection of the Personal Information, in order to better protect your rights.

This Privacy Policy will help you understand the following contents:

1. How We Collect and Use Your Personal Information

2. How We Use Cookies and Similar Technologies

3. The Personal Information that We May Share, Transfer or Publicly Disclose

4. How We Retain, Store and Protect the Security of Your Personal Information

5. How to Manage Your Personal Information

6. Notification and Revision

7. How to Contact Us

[Special reminder] Before using the Services, please carefully read and understand this Policy (especially the content in bold or underlined) to make appropriate choices. Once you use or continue to use our products or the Services after we update this Policy, it will mean that you agree to this Policy and agree to our processing of your relevant Personal Information as per it.

1. How We Collect and Use Your Personal Information

We collect your Personal Information mainly to make it easier and more satisfactory for you and other users to use the Services. And these Personal Information can help us achieve this goal.

1.1 We will collect and obtain your Personal Information via the following channels:

(1) The Personal Information you provide.

(a) The Personal Information provided to us by you when registering an account for or using the Services.

(b) The Personal Information you share with other parties through the Services, as well as the Personal Information stored during your use of the Services.

Please note that if you disclose your Personal Information within the public area that other users can access in the Services, or in your responses to information uploaded or published by others, such Personal Information may be collected and used by others. When you discover that others have improperly collected or used your Personal Information, you can contact us through the contact information specified in Article 9 [How to Contact Us] hereof.

(2) Your Personal Information shared by others. That is, the shared Personal Information about you provided when using the Services elsewhere.

(3) We have obtained your Personal Information. When you use the Services, we collect, summarize, and record Personal Information.

(a) Login logs: when you log in to the website, will generate login-related log information to ensure the security of your login.

(b) Download logs: when you download materials, will generate download-related log information to ensure that the download materials are searchable.

1.2 We will collect and use your Personal Information of the following types for the following purposes:

(1) Helping you complete registration and login

In order for us to provide you with complete Services, you need to provide basic registration or login Personal Information, including using a mobile phone number to register and log in, and account login. If you only need to use basic services such as browsing, querying, and searching, you may not register as a website user and provide the aforementioned Personal Information.

If you no longer use the Services, please call our customer service personnel to cancel them under the conditions stipulated in the service agreement and the applicable national laws and regulations. You can also contact us through the contact information specified in Article 9 [How to Contact Us] of this Policy to cancel your account, and we will stop providing the Services to you at that time. When your account is cancelled or deleted, all service information and data related to the account will be deleted or anonymized, except as otherwise provided by the applicable laws and regulations.

(2) Providing security

To enhance the security of your use of the Services and those services provided by our partners, protect the personal and property security of you, other users, or the public from infringement, better prevent phishing websites, fraud, network vulnerabilities, computer viruses, network attacks, and network intrusion security risks, and more accurately identify violations of laws and regulations or relevant agreement rules of the Services, we may collect, use, or integrate your account information, transaction information, device information, log information, and Personal Information authorized by you or shared by partners according to law to comprehensively judge your account and transaction risks, conduct identity verification, detection, and prevention of security incidents, and take necessary recording, auditing, analysis, and disposal measures in accordance with law.

(3) Recharging and payment

When you use payment resources, you need to recharge online. You can choose the payment services provided by third-party payment agencies such as Alipay and WeChat. The recharge and payment functions themselves do not collect your Personal Information, but we need to share your order number and transaction amount information with these payment agencies to confirm your payment instructions and complete the payment.

(4) Other users

Please note that if we wish to use your Personal Information for any other purpose not specified herein or for any additional Personal Information not mentioned, we will separately request your consent in advance (by checking, pop-up, in-site messaging, email, SMS). Once you agree, such additional use will be considered as part of this Policy, and such additional personal information will also be subject to this Policy.

According to the applicable laws and regulations, collecting your personal information does not require your authorized consent in the following circumstances:

(a) Where your Personal Information is related to the fulfillment of legal and regulatory obligations by personal information controllers.

(b) Where your Personal Information is directly related to national security and national defense security.

(‌c) Where your Personal Information is directly related to public safety, public health and major public interests.

(d) Where your Personal Information is directly related to criminal investigation, prosecution, trial and execution of judgment.

(e) Where it is required to protect the significant legitimate rights and interests of the Personal Information owner or other individuals, such as life and property, but it is difficult to obtain the authorized consent of the owner.

(f) Where the Personal Information involved is publicly disclosed by the Personal Information owner to the public on their own.

(g) Where it is necessary to sign and perform contracts as required by the Personal Information owner. Note: The main function of the protection policy for Personal Information is to disclose the scope and rules for Personal Information controllers to collect or use personal information, and it shall not be regarded as a contract.

(h) Where the Personal Information is collected from legally disclosed information, such as legitimate news reports, government information disclosures, and other channels.

(i) Where it is necessary to maintain the safe and stable operation of the provided products or services, such as discovering and dealing with product or service malfunctions.

2. How We Use Cookies and Similar Technologies

We or our third-party partners may obtain and use your information through cookies or similar technologies, and store such information as log information.

By using Cookies, we provide the User with a simple and easy-to-use online experience. A Cookie is a small amount of data that is sent from a network server to your browser and stored on your computer's hard drive. We use Cookies to benefit our users. For example, in order to make the login process faster, you can choose to store the username in a Cookie. This will make it more convenient and efficient for you to log in next time. Cookies can help us determine the page and content you are connecting to, the time you spend on a specific service, and the service you have chosen.

Cookies enable us to serve you better and faster, and make your experience with the Services simpler and more practical. However, you shall be able to control whether and how Cookies are accepted by your browser. Please refer to the files attached to your browser for more information on this matter.

We and our third-party partners may collect and use your information through Cookies or similar technologies, and store such information as well. We use our own Cookies or similar technologies, which may be used for the following purposes:

(1) Remembering your identity. We can use Cookies or similar technologies to help us identify you as our registered user, or save information you provide us about your preferences or other information.

(2) Analyzing your usage of the Services. We can use Cookies or similar technologies to understand what activities you use the Services for, or which Services are the most popular.

(3) Optimizing resource recommendations. Cookies or similar technologies help us recommend resources related to you based on your information and make general recommendations.

While using Cookies or similar technologies for the aforementioned purposes, we may also provide a summary of non-personally identifiable information collected through Cookies or similar technologies to other partners for analyzing how you and other users use the Services and recommending it.

You can reject or manage Cookies or similar technologies through a browser or user selection mechanism. But please note that if you disable Cookies or similar technologies, we may not be able to provide you with the best service experience, and some services may not be able to be used properly. Meanwhile, you will still receive resource recommendations, but their relevance to you will decrease.

3. The Personal Information that We May Share, Transfer or Publicly Disclose

3.1 Sharing

We will not share your Personal Information with any third party other than us without your consent, except in the following circumstances:

(1) Where we provide you with our services. We only share your information within SimWorks to achieve the functionality of our services, allowing you to use the Services you need normally, and we may only provide your Personal Information for the payment agencies that provide payment services, merchants who join the platform and the partners who provide data services (including online advertising monitoring, data statistics and data analysis).

(2) Where it is necessary to share your Personal Information with our affiliates. In order for us to provide you with consistent services based on a unified account system and facilitate your unified management, system and account security, your Personal Information may be necessary to be shared between us and our affiliates.

(3) Where it is necessary to share your Personal Information to achieve the purpose as stated in Article 1 "How do we collect and use Personal Information?" of this Policy.

(4) Where it is necessary to share your Personal Information to fulfill our obligations and exercise our rights under this Policy or any other agreement we have reached with you.

(5) Where it is necessary to share your Personal Information with our partners and third parties who entrust us for promotion in order to enable them to understand the coverage and effectiveness of the promotion. For example, we can inform the clients how many people have seen their promotional information or purchased the clients' products after seeing such information, or provide them with unidentifiable statistical information to help them understand their audience or customers.

(6) Within the scope permitted by laws and regulations, in order to comply with laws, protect ourselves and our affiliates or partners, you or other users, or the public interest, property or safety from damage, such as to prevent illegal activities such as fraud and reduce credit risk, we may exchange information with other companies and organizations. However, this does not include information sold, rented, shared or otherwise disclosed for profit purposes in violation of the commitments made in this Policy.

(7) Where we share your Personal Information with others according to your legal needs or with your authorization or consent;

(8) Where we provide your Personal Information for others at the lawful request of your guardian.

(9) Where we provide your Personal Information for others pursuant to the single service agreement signed with you (including the online electronic agreement and corresponding platform rules) or other legal documents.

(10) Where we provide your Personal Information for others based on academic research.

(11) Where we provide your Personal Information based on social public interests in line with laws and regulations.

We will only share your Personal Information for legitimate, allowable, necessary, specific and clear purposes. We will sign strict confidentiality agreements with companies, organizations and individuals with whom we share Personal Information, requiring them to handle the information as per our instructions, this Policy, and any other relevant confidentiality and security measures.

3.2 Transfer

As our business continues to develop, we may engage in merger, acquisition, asset transfer, or similar transactions, and your information may be transferred as part of such transactions. We will require new companies or organizations that hold your Personal Information to continue to be bound by this Policy. Otherwise, we will require such companies or organizations to get your authorization and consent again.

3.3 Public disclosure

We will only disclose your Personal Information in the following circumstances, provided that we take the security measures in line with industry standards:

(1) Where, as required by you, we disclose the information you have specified with the disclosure method that you have explicitly agreed to.

(2) Where it is required by laws, regulations, mandatory administrative enforcement or judicial requirements to provide your Personal Information, we may disclose your Personal Information by information types and with the disclosure method required. On the premise of complying with the laws and regulations, when we receive the request for disclosure of information mentioned above, we will require the information recipient to present corresponding legal documents, such as subpoenas or investigation letters. We firmly believe that the information to be provided by us shall be kept as transparent as possible within the scope permitted by laws. We have carefully reviewed all requests to ensure that they have legal basis and are limited to data that law enforcement agencies have the legal right to obtain for specific investigative purposes.

3.4 Third-party SDK

We inform you of the relevant third-party SDKs for access and their usage purposes as follows:

SDK name Collected personal information Purpose of use Official website link Link to SDK Privacy Policy
WeChat Pay 1. Product information: the name, number, unit price and total requested price of the ordered product. 2. Order information: order number, product name and product description. Assist the User in making payments through WeChat Pay within mobile applications. https://pay.weixin.qq.com/wiki/doc/api/index.html https://pay.weixin.qq.com/index.php/public/apply_sign/protocol_v2
Alipay Collect commonly used device information (SIM card serial number/MAC address) and network information (WIFI list) 1. Help the User use Alipay for payment in mobile applications. 2. Used for the security risk control during the login and payment of the User. https://opendocs.alipay.com/open/54/cyz7do https://opendocs.alipay.com/open/01g6qm
Alibaba Short Message Service SDK device name, device model, system version SMS notification of successful user invoicing https://help.aliyun.com/zh/sms/ https://terms.alicdn.com/legal-agreement/terms/privacy_policy_full/20230922101800634/20230922101800634.html

3.5 Entrusted processing

In order to better serve you, we may entrust third-party partners to process your Personal Information. We will only entrust third-party partners to process your Personal Information for legitimate, allowable, necessary, specific and clear purposes. We will strictly limit the information processing purposes of the trustee and require them to take sufficient data security measures. In the joint processing scenario, we will also sign relevant agreements with our partners pursuant to legal and regulatory requirements, and fulfill relevant Personal Information protection obligations. We will entrust the main users of the SMS service provider to send you the SMS required for registration and login, as well as relevant business notifications. Scope of entrusted information: mobile phone number; entrustment method: direct entrustment; type of agent: SMS service provider.

In the following circumstances, sharing, transferring or publicly disclosing your information does not require your prior authorization and consent:

(1) Where this is related to the fulfillment of legal and regulatory obligations by Personal Information controllers.

(2) Where this is directly related to the national security and national defense security.

(3) Where this is directly related to the public safety, public health and major public interests.

(4) Where this is directly related to criminal investigation, prosecution, trial and execution of judgment.

(5) Where this is for the purpose of protecting the significant legitimate rights and interests of the owner of the Personal Information or other individuals, such as life and property, but it is difficult to obtain the authorization and consent of the owner.

(6) Where the owner of the Personal Information discloses the Personal Information to the public on their own.

(7) Where the Personal Information is collected from legally disclosed information, such as legitimate news reports, government information disclosures, and other channels.

According to laws and regulations, sharing, transferring and disclosing Personal Information that has been de-identified and processed, and ensuring that the data recipient cannot recover and re-identify the information owner, will not constitute external sharing, transferring or public disclosure of Personal Information. The storage and processing of such data will not require a separate notice to you and your consent.

4. How We Retain, Store and Protect the Security of Your Personal Information

Generally, we only retain your Personal Information for the shortest amount of time necessary to achieve our goals. The Personal Information used to identify your personal identity and reflect related activities will be retained when the User cancels the account, unless legally required or allowed to be retained for a longer period of time. According to the Electronic Commerce Law of the People's Republic of China, the storage duration of commodity and service information and transaction information shall not be less than three years from the date of completion of the transaction. According to the Cybersecurity Law of the People's Republic of China, the technical measures to monitor and record network operation status and network security events shall be taken, and the relevant network logs shall be retained no less than six months as required. The criteria for determining the aforementioned deadline include:

(1) completing the purpose of transactions related to you, maintaining corresponding transaction and business records, and responding to possible inquiries or complaints from you.

(2) ensuring the safety and quality of the Services provided by the platform to you.

(3) whether you agree to retain them for longer time.

(4) whether there is any other special agreement regarding the retention duration.

If we terminate our services or operations, we will promptly cease the collection of your Personal Information and comply with the applicable laws and regulations to notify you in advance. After the termination of our services or operations, we will delete or anonymize your personal information, except as otherwise provided by laws, regulations or regulatory authorities.

The personal information collected and generated during our operations within the territory of the People's Republic of China will be stored within the territory of China, except in any of the following circumstances:

(a) where there are clear provisions in laws and regulations.

(b) where your authorization and consent are obtained.

(‌c) where the Services you are using involve cross-border transactions and require the provision of your Personal Information to overseas parties.

In response to the above circumstances, we will ensure that your Personal Information is provided with sufficient protection pursuant to this Policy and the applicable national laws and regulations.

We attach great importance to information security and have established a dedicated security team, taking all reasonable and feasible measures to protect your Personal Information:

• Data security technology measures

We will adopt security measures that comply with industry standards, including establishing reasonable rules and regulations and security technologies to prevent unauthorized access, use, and modification of your Personal Information, and to avoid data damage or loss.

Our services adopt various encryption technologies. In some services, we will use encryption technology to protect your Personal Information, encrypt and save your Personal Information with encryption technology, and isolate it through isolation technology.

When using Personal Information, we will use various data desensitization techniques to enhance the security of information during display and correlation calculation.

We will also adopt strict data access control and multiple identity authentication technology to protect Personal Information and prevent data from being used in violation of regulations.

• Other security measures we take to protect Personal Information

We manage and regulate the storage and use of Personal Information by establishing a data classification and grading system, data security management standards, and data security development standards.

We implement comprehensive security control over data through information contact confidentiality agreements, monitoring and auditing mechanisms. We will also hold security and privacy protection training courses to enhance employees' awareness of security and the importance of protecting information.

• We only allow the employees and partners who need to know your Personal Information to access your Personal Information, and have established strict access control and monitoring mechanisms for this purpose. We also require all personnel who may have access to your Personal Information to fulfill corresponding confidentiality obligations. If these obligations are not fulfilled, legal responsibility may be pursued or our cooperation relationship may be terminated.

• We will take all reasonable and feasible measures to ensure that unrelated Personal Information is not collected.

• The Internet is not an absolutely secure environment, and the way of communication with other users such as e-mail, instant messaging, social software or other service software cannot be determined whether it is fully encrypted. We recommend that you use complex passwords when using such tools, and pay attention to protecting your information.

• Though the Internet environment is not completely safe, we will try our best to ensure the security of the Personal Information you send to us.

• Security incident handling

When communicating with third parties through the Services or purchasing goods and Services, it is inevitable for you to disclose your own information, such as contact information or postal address, to the counterparty or potential counterparty. Please protect your own information properly and only provide it to others where necessary.

To address the potential risks of Personal Information leakage, damage and loss, we have established multiple systems that clarify the classification and grading standards for security incidents and vulnerabilities, as well as corresponding processing procedures. We have also established a dedicated emergency response team for safety incidents. Pursuant to safety incident disposal standards, we have initiated safety plans for different safety incidents, conducted loss control, analysis, positioning, developed remedial measures, and collaborated with relevant departments to trace and combat them.

In the event of an unfortunate information security incident, we will promptly inform you pursuant to legal and regulatory requirements: the basic situation and possible impacts of the security incident, the measures we have taken or will take to dispose of it, suggestions for you to independently prevent and reduce risks, and remedial measures for you. We will also promptly inform you of the relevant situation of the incident by email, by mail, by phone, by push, and any other means. If it is difficult to inform the information owners one by one, we will take reasonable and effective measures to publish an announcement. Furthermore, we will also proactively report the handling of information security incidents pursuant to regulatory requirements.

Please understand that, due to technological limitations and risk prevention limitations, we cannot always fully guarantee information security even if we have tried our best to take proper security measures. You need to understand that the system and communication network you use to access the Services may encounter problems due to any situation beyond our control.

Please be sure to properly keep your account, password and other identity elements. When you use the Services, we will check your identity through your account, password and other identity elements. Once you disclose the aforementioned information, you may suffer losses and may have adverse effects on you. If you find that your account, password, and/or other identity elements may or have been leaked, please contact us immediately so that we can take appropriate measures in a timely manner to avoid or reduce related losses.

5. How to Manage Your Personal Information

5.1 Access

In principle, you can access your Personal Information with the following methods:

(1) Account Information: You can log in to workbench.simworks.net or access the "Personal Center" to access and view the Personal Information in your account (including but not limited to username and phone number).

(2) Transaction and order information: Search for your transaction information (including but not limited to amount, order number, payment status, and time) in "Bill-Overview of Bill" and "Bill-Job Bill".

5.2 Correction

We encourage you to update and modify your Personal Information to make it more accurate and effective. When you discover that the Personal Information we process about you is incorrect or incomplete, and your identity is verified, and the correction does not affect the objectivity and accuracy of the information, you have the right to make corrections or supplements to the incorrect or incomplete information.

You can change your password information through "Personal Center - Security Information".

5.3 Deletion

In addition, in any of the following circumstances, you can request us to delete relevant Personal Information by calling our customer service personnel:

(1) Where our handling of Personal Information violates laws and regulations;

(2) Where we collect and use your Personal Information without your consent;

(3) Where our handling of Personal Information violates our agreement with you;

(4) Where you no longer use our products or services, or if you cancel your account;

(5) Where we no longer provide you with products or services.

5.4 Obtaining copies of Personal Information

You can log in to workbench.simworks.net or visit the "Personal Center" to access and view personal information in your account (including but not limited to username and phone number), and obtain a copy of your Personal Information by taking a screenshot from your computer.

5.5 Publicity and sharing

Our multiple services allow you to publicly share your relevant information not only with your social network, but also with all users who use the Services. The information you upload or publish while using the Services, your responses to information uploaded or published by others, uploading or publishing your information via email or in public areas not visible to specific users in the Services, as well as location data and log information related to this information. The information you disclose or share may remain in the public domain as long as you do not delete it. Even if you delete the shared information, the information may still be independently cached, copied or stored by other users or third parties beyond our control, or saved in the public domain by other users or such third parties. We will not be responsible if you disclose or share information via the above-mentioned channels, which results in your information leakage. Therefore, we remind and kindly request you to carefully consider whether to disclose or share your information via the channels mentioned above.

5.6 Cancellation

Cancellation method

Call our customer service personnel to cancel the account. Customer service hotline: 19805411994

(Customer service working hours: 09:00-12:00 13:00-18:00)

Account cancellation is an irreversible operation. Please carefully consider and fully understand the following rules. In general, we will cancel your account within fifteen working days after receiving your cancellation request and verifying your user identity. If you have any questions, comments or suggestions, please contact our customer service personnel for consultation and we will provide you with necessary assistance.

Unable to log in

After the account is successfully cancelled, you will not be able to log in and use the account (even if you register with the same phone number and use the services).

(1) You will be unable to log in and use this account, and all personal information and historical information of the account will not be retrieved.

(2) You will be unable to log in and use all of our products and applications associated with this account.

Information erased and unable to recover

After the account is successfully cancelled, all the assets, rights, records and other contents of the account (including but not limited to the following) will be deemed as voluntary abandonment by you.

(1) All usage records under this account, including but not limited to historical records, download records and consumption records, will be cleared and cannot be used or restored.

(2) The account balance, coupons and purchased data under this account will be cleared and thereby cannot be used or restored.

Other provisions

(1) In the account cancellation period, if the account is involved in disputes, including but not limited to complaints, tip-off, lawsuits, arbitration, investigations by national authorities, we shall have the right to terminate the cancellation of the account on our own without your consent.

(2) The act of canceling an account does not imply any exemption or mitigation of the account's behavior and related responsibilities prior to its cancellation.

You can always choose whether to disclose information. Some information is necessary for using the Services, but the provision of most other information is up to you. You can change the scope of your authorization for us to continue collecting information or revoke your authorization by deleting information, disabling device functions, etc.

After you revoke your authorization, we cannot continue to provide you with the Services corresponding to the revocation, and we will no longer process your corresponding information. But your decision to revoke the authorization will not affect the information processing previously carried out based on your authorization.

5.8 Response to your above request

We will take appropriate technical measures to ensure that you can enquire, supplement, correct or delete your Personal Information, or apply for us to supplement, correct or delete relevant information through feedback or complaint channels related to product or service releases. After receiving your application, we will handle it as per procedures. To ensure security, according to the procedures, you may need to provide a written request or prove your identity in any other way. We may first request you to verify your identity before processing your request. We will not collect any fee for your reasonable request in principle, but for the request that is repeated multiple times and beyond reasonable limits, we will collect certain fees as appropriate. We may reject the request that is unreasonably repetitive, require excessive technical expertise (such as developing new systems or fundamentally changing current practices), pose risks to the legitimate rights and interests of others, or are highly impractical.

If you are unable to access, correct, or delete your Personal Information, or if you need to access, correct, or delete other Personal Information generated by your use of our products, or if you believe that we have violated any laws and regulations or any agreement with you regarding the collection or use of Personal Information, you can contact us via the official feedback channels of our publicly available products or services.

In any of the following circumstances, we will not be able to respond to your request:

(1) Where this is related to the fulfillment of legal and regulatory obligations by Personal Information controllers.

(2) Where this is directly related to the national security and national defense security.

(3) Where this is directly related to the public safety, public health and major public interests.

(4) Where this is directly related to criminal investigation, prosecution, trial and execution of judgment.

(5) Where the personal information controller has sufficient evidence to indicate that the owner of the Personal Information has subjective malice or abuse of rights.

(6) Where this is for the purpose of protecting the significant legitimate rights and interests of the owner of the Personal Information or other individuals, such as life and property, but it is difficult to obtain the authorization and consent of the owner.

(7) Where the response to a request from an owner of the Personal Information will result in serious damage to the legitimate rights and interests of the owner of Personal Information or other individuals or organizations.

(8) Where this involves trade secrets.

6. Notification and Revision

In order to provide you with better services, we may modify the terms of this Policy in a timely manner based on the updates of the services and relevant requirements of laws and regulations, and such modifications shall form a part of this Policy. When there is a change in this Policy, the updated policy will be displayed to you in advance on the website by announcement, pop-up, or by any other appropriate means. Without your consent, we will not limit the relevant rights you are entitled to under this Policy.

7. How to Contact Us

The products and services covered by this Privacy Policy are operated by Shandong SimWorks Software Technology Co., Ltd., with a registered address at Room 1714 and 1715, Yuanyang Haichaohui West District, 6 Building, Tangye Street, Jinan City, Shandong Province and its contact phone number is 19805411994.

If you have any questions, suggestions or comments about this Policy, or if you find that your Personal Information may be leaked, you can contact us with any of the following methods:

(1) Email: info@simworks.net

(2) Customer service hotline: 19805411994

Working hours:

Monday to Friday: 09:00-12:00 13:00-18:00

If your call is not answered in a timely manner, you can take a leave of absence, and your leave of absence issue will be resolved within the second working day.

(3) Tip-off/Complaint hotline: 19805411994

(4) Tip-off email: info@simworks.net

To ensure the security of your information, we need to first verify your identity and credentials. We have established a customer complaint management mechanism. Generally, we will respond to your questions, comments or suggestions within fifteen working days after receiving them and verifying your user identity. If you are not satisfied with our response, you can also file a complaint with the competent consumer right protection authority or file a lawsuit with a court with jurisdiction.