Privacy and Cookie Policy
Hello everyone! We are Ray Magnet Factotry, welcome to visit our website!
We attach great importance to the privacy and data security of our users, and ensuring their privacy and data security is an important responsibility of ours.
In order to protect your privacy and security, as well as comply with most privacy laws and regulations in the world, this Privacy and Cookie Policy is hereby written to inform everyone about our privacy usage.
This Privacy and Cookie Policy will mainly introduce the following points:
- What information and data will we collect and share;
- Our purpose of collecting information and data;
- Your rights to data, such as viewing, deleting information and data;
- Your data storage location;
- Storage time of information and data
Service owners and data controllers
This is the agreement contract between Ray Magnet Factotry (hereinafter referred to as “us”, “us”, and “our”) and the user (hereinafter referred to as “you”, “your”, “user”).
https://raymagnet.net/ It’s the company website
Our email addresses will be displayed on the contact page (this page has been hidden to prevent spam emails).
If you have any questions, need to cancel our permission to use your privacy or delete your data, or find that we have violated this Privacy and Cookie Policy, please contact us promptly.
The Information We Collect
In the process of using our services, in order to conduct analysis, statistics, improve service quality, and prevent junk content or inappropriate behavior, we will collect the following necessary information.
In order to better protect user privacy and personal information, we will only collect information necessary for providing services.
The information you voluntarily provided
- Name/Nickname;
- Comment Content;
- E-mail Address
- Device Screen
- Device Password
If we collect or share your personal information except as required by laws and regulations, relevant departments, or with your permission, it will be considered a violation of this privacy policy. You can contact us.
Cookie
Our service uses cookies to improve user experience and service security, or to make certain personalized settings
Prevent spam and inappropriate behavior.
We will not share your cookies. Your cookies will be securely stored in your browser, and the encrypted unique identifier used for account login will also be saved on the server.
You have the right to choose to delete or disable cookies, but disabling specific cookies may result in some services not functioning and being used properly.
All cookies containing sensitive information such as account login identifiers are set to Secure mode and will only be transmitted from the browser when accessed via HTTPS.
Cookies used
| Cookie Name | Category | Storage Duration | Storage Purpose |
|---|---|---|---|
| canvas_cookie_consent | Functional | 1 year | Stores the user's cookie consent preference. |
| cookies-consent | Functional | 1 year | Stores the user's cookie consent to remember their choice on future visits. |
| perf_Def_Ref | Functional | Session | A temporary cookie used to ensure the proper loading and display of the website. |
| wordpress_logged_in | Functional/Essential | 1 year | Stores a user's authentication details to keep them logged in to the WordPress dashboard. |
| wordpress_sec | Functional/Essential | 1 year | A security cookie used to protect against unauthorized access and maintain user login. |
| wp-settings-4 | Functional | 1 year | Used to store the user's personal dashboard settings in WordPress. |
| wp-settings-time-4 | Functional | 1 year | Used to store the last time the user's settings were updated. |
Cookies are necessary for providing services and will not be used for functional, analytical, statistical, or marketing purposes.
Privacy, Security, and Encryption
Our service uses strong encryption algorithms such as HTTPS, SSL certificates, TLS>=1.2, HSTS security protocol, CSP content security protocol, and AES-256 to encrypt and securely transmit and store your data. For your safety, you should add “https://” as a prefix to the URL (e.g., https://raymagnet.net/).
The HSTS information header will be stored in the browser after the first visit to our website, and the validity period is based on your browser settings.
If you see security error prompts in your browser while using the service, including but not limited to “Not (completely) secure,” “Certificate error,” “Certificate invalid,” or “Privacy error,” please contact us to resolve the issue and ensure the security of your data and personal information.
All collected non-public information will be encrypted and stored in the core server nodes within Indonesia.
The data centers we use have all passed GDPR compliance certification.
We will do our best to protect data and personal information security, but even with advanced security facilities, we cannot guarantee that all data can be transmitted and stored 100% securely.
When the server is hacked and a data breach occurs, we will notify you within 3 days (72 hours), inform the relevant departments, and activate our emergency plan to handle the corresponding data. We will do our best to take corresponding remedial measures to avoid the expansion of the security incident. Meanwhile, according to Article 18 of the Service Agreement, the server will urgently disconnect from the internet to ensure the security of user information.
How will we view and process your data?
We will review and read all publicly displayed comments for manual review, response, and anti spam review purposes.
When we reply to your email message, we will review the message content, real name, email address, phone number, and company name in order to respond.
To locate and fix bugs and code errors, we will review anonymous error logs.
We will only read the operation logs recorded by the system for investigation and evidence collection when there are (D) DoS/CC attacks, hacker intrusions, service interruptions/crashes, or requests from relevant departments in the service.
We may review statistical data at any time to track user and visitor traffic.
Without permission, we will not read your non-public displayed data and personal information, including but not limited to data and personal information stored in Ken’s Learning Planner and Ken’s Learning IoT.
Third party services, API interfaces, and platforms
We will not share any other data collected by us and our servers with third-party services and platforms without permission, except for information necessary for providing services.
In order to provide complete service functionality, our service is using the following third-party API interfaces:
- NetEase Enterprise Email
- Official website: https://qy.163.com;
- Shared information: email address and content;
- Location of API interface (data will be sent to): China (CN);
- Purpose: Use website domain names to send and receive emails;
- Sharing method: IMAP and SMTP interface transmission;
- Privacy Policy: NetEase Enterprise Mailbox Privacy Policy
When using our services, these API interface platforms may collect certain information, including but not limited to:
- Your email address (shared to NetEase Enterprise Email for sending emails)
For more information, please refer to the corresponding third-party privacy policy.
We will not transfer your information and data to third parties unless we give notice and obtain your consent.
When our services are acquired or merged by a third party, we will provide notice, clearly stating the name of the recipient of the information and data, and requiring the recipient to continue to comply with this privacy policy. After the notification is released, the information and data will be transferred 7 days later. During this period, you have the right to refuse to transfer, delete information and accounts, and stop using the service.
Log
Our server will save and record log files containing time, URL links, IP addresses, and port numbers. This document is only used for our own investigation and evidence collection of downtime accidents and improper behaviors such as illegal bypassing of security mechanisms (intrusion).
When there is an error in the front-end or back-end code, the server also logs it for locating and fixing the code error.
Our email system may record email sending logs and encrypted email sending information to track down hacker intrusions and other inappropriate behavior, and check for HTML code errors.
Duration of data storage
We may retain some data on the server for anti spam purposes, analysis and statistics, and subscription services.
The following information will be saved on the server until you request deletion:
- Your name
- Your phone number
- Your company name
- Your email address and content
- Your comment (pending review or approved)
When our service ceases operation, we will notify and delete or anonymize the personal information and data collected within a reasonable period of time (7 days).
Viewing, correcting, deleting information, and revoking privacy permission
According to the CCPA privacy protection laws in California, USA, “selling”, “in the process of selling”, “selling”, or “sold” means selling, renting, publishing, publicizing, disseminating, making visible, transmitting, or orally communicating, as well as using written, electronic, or other means to obtain consumer personal information from another company or third party for monetary or other valuable consideration.
According to CCPA and the Personal Information Protection Law of the People’s Republic of China, you have the right to send us an application email through the contact information in Chapter 1 of this policy to request access or correction of your personal information, cancel your permission to use our privacy, terminate our disclosure of your personal information, and delete or correct comments on our website, especially for residents of California, USA and China.
Your application email should include:
- Theme: “Withdrawal of Website Privacy Usage License/Correction of Website Personal Information”;
- Your real name;
- Your email address;
- The country and city/province/state where you reside;
- Specific application content;
*The information you apply for will be collected and processed according to your application and this privacy policy.”
After receiving your application, we will respond within 7 days. But if our learning tasks are heavy, we will respond within 45 days. This application is completely free, and we will respond to you in understandable language.
If you find that we have violated your privacy and we have violated this Privacy Policy, please contact us promptly. We will delete the relevant data within 7 days, and if the learning task is heavy, it will be deleted within 45 days.
According to our service agreement, CCPA, and Article 16 of the Personal Information Protection Law of the People’s Republic of China, even if you choose to refuse our collection of your data or the use of cookies, or if you send us an application as mentioned above, we will not abuse or discriminate against you unless our service requires the use of such data (such as necessary cookies).
You can view, modify, correct, and delete account data at any time in the corresponding functional section or “Settings.” You can also log out of your account by following the on-screen instructions in “Settings.”
You can choose to delete all cookies, revoke consent to the use of cookies, and send a request in your browser on the following page:
- Cancel your cookie permission, clear the cancellation of cookies
- If the user unfortunately passes away, their relatives have the right to contact us through the methods described in this article, and to send requests for viewing, correcting, deleting their information and data for their own legitimate and legitimate interests.
Permission
Without permission, our service will not collect sensitive information or use sensitive permissions on devices or browsers, including but not limited to:
- Non essential cookies;
- Microphone;
- Camera and photo album;
- GPS and other positioning services;
- Contact person/contact list;
- Files and folders on your device;
Our website will only use the necessary permissions to provide services, and will only use the corresponding permissions when needed. We cannot apply for non essential permissions in advance or excessively, nor refuse to provide services due to users choosing to refuse certain non essential permissions.
You have the right to choose whether to enable the corresponding permissions in the device or browser settings.
Your right to data
You have the right to control our use of your data.
You can disable cookies in your browser settings or enable the feature to send ‘Do Not Track’.
You can also send us an application to view, modify, correct, and delete your data (see Chapter 10 for details).
Privacy Protection And Rights of Minors and Guardians
If you are a minor, before using this website, we request that you ask your parents or other guardians to carefully read this policy and, with the explicit consent of your parents or other guardians, use the services or provide information to us. It is worth noting that our website is specifically designed for working with adults. If you are a minor, please do not use it.
If you are the parent or other guardian of a minor, please pay attention to whether the minor under your guardianship is using our services after obtaining your authorisation and consent. When you have any questions about the personal information of minors under your guardianship, please apply to view, modify, correct or delete their personal information and data following the provisions of Chapter 10 of this policy.
Location and backup of data storage
Our server node and core node are located in Asia.
Under normal circumstances, you will be assigned to the nearest edge server node by DNS or a load-balancing scheduler. You can view the server node number assigned to you at the bottom of the website or in the HTTP header.
In rare cases of force majeure, when all server nodes in a region are overloaded or unable to operate normally, you may be temporarily dispatched to edge nodes in other countries/regions.
In order to ensure the security of user data and in accordance with relevant laws and regulations, non-public user data and information collected will generally be stored within Asia (Indonesia); that is, only transmitted, stored, and backed up between domestic servers.
When overseas/foreign users/visitors visit our website and use our services, only necessary data and cookies will be transmitted to the corresponding edge nodes and user locations.
If overseas/foreign users have objections to the storage and transmission location or method of this data, or have not complied with the laws and regulations of your location, please contact us through the contact information displayed in Article 1 of this policy to have your data processed specially.
All cross-sea/cross-border data transmission will use strong encryption algorithms such as HTTPS, SSL certificates, TLS 1.3, and AES-256 to ensure that the data is not stolen or tampered with by hackers and complies with most privacy laws and regulations in the world.
Server data backup is only conducted in Asia (Indonesia), and in principle, non-public user data in the backup data must not flow out of Asia (Indonesia).
To prevent data loss and promptly restore data in case of accidental loss, the data stored on the server will be backed up regularly.
Data backup will be carried out in the following manner:
- Between different core server nodes;
- Between the core server node and the headquarters/branch;
After the data is deleted, the corresponding data may be verified with a unique ID code from the backup and deleted several days to weeks later.
Law
We have the right to change this privacy policy at any time to comply with the latest and current privacy laws and regulations.
According to Article 9 of Chapter 2 of the General Data Protection Regulation (GDPR) of the European Union, we may collect and process personal information without seeking your permission in the following situations, but we will inform you as soon as possible:
- Necessary for the conclusion and performance of a contract to which an individual is a party;
- It is necessary to implement human resource management in accordance with the labor rules and regulations formulated in accordance with the law and the collective contracts signed in accordance with the law;
- Necessary for fulfilling statutory duties or obligations;
- Necessary to respond to sudden public health emergencies or to protect the life, health, and property safety of natural persons in emergency situations;
- To carry out news reporting, public opinion supervision and other activities for the public interest, and to process personal information within a reasonable range;
- Process personal information that individuals have voluntarily disclosed or other legally disclosed information within a reasonable range;
- Other circumstances stipulated by laws and administrative regulations;
The information collected due to legal regulations or requirements of relevant departments will be encrypted and stored on our server for the prescribed period and processed strictly under the corresponding requirements. The collection and processing process may exceed the information listed in Articles 2 and 3 of this policy.
Change
We have the right to change this policy at any time, comply with the latest laws and regulations, better explain our use of privacy and data, support and adapt to the latest privacy protection technology developments.
When we formulate a new privacy policy, we will notify through email and the orange announcement area on our website.
When we update our rules and policies, continuing to use our services means that you agree to the new version of the rules and policies. If you do not agree, please unsubscribe from our content and stop using our services before it takes effect.
Regarding this policy
We will comply with the contents of this policy to protect your privacy.
In order to better protect user privacy in real-time, we will regularly review this privacy policy.
Please supervise together. If you find that we have violated this policy and infringed upon your privacy, or have any questions about this policy, please contact us through the contact information in Chapter 1 to help understand, make corrections, and delete unauthorized collected data as soon as possible.
The final interpretation of this policy belongs to us personally.
Definition and Explanation of Nouns
Personal Information
All kinds of information related to identified or identifiable natural persons recorded in electronic or other ways, excluding anonymized information.
IP Address
Internet protocol address, the virtual address of a region or device on the Internet/Internet (Internet).
It can be IPv4 (such as 123.45.67.89) and IPv6 (such as 2401:1234:5678:90ab:: cd: ef).
Cookie
A small text file stored in a browser or app (usually encrypted) that can contain login information, personal preferences, activity records, and other content.
User agent string
The string information automatically sent by web browsers and mobile apps to the server is used to identify the type, version, and language of the browser and operating system.
URL link
Used to determine the string for each page on the website, such as https://www.kenstudyjourney.cn/zh-cn/about/
log
The text file stored on the server, including the folder location of the code file, access time, IP address, port number, domain name, etc.
It will be used to locate factors, bugs, and abusive behavior that cause service interruptions (downtime).
permission
Users have control over whether the website can access and use sensors or personal information on their devices. It can be a camera, microphone, address book, photo album, GPS positioning service, etc. Permissions can be modified in device/browser settings.
API interface
API is an application programming interface that can be combined with other programs to input and return data, providing extended functionality for services.
For example, our service will use Evan Technology’s API interface and send the user’s IP address to obtain the approximate location of the IP address.
anonymization
The process of processing personal information that cannot identify specific natural persons and cannot be restored.
Data backup
The measures taken to prevent data loss by transferring copies of data to different storage media (backup servers, external HDD or SSD hard drives, internal computers, etc.).
Edge node
A server node that serves nearby users and is only responsible for caching and distributing files and public data, as well as forwarding non-public user data. Internet connection is required.
Core node
The node responsible for core business such as data storage, encryption, decryption, and computation.