...

Privacy and Cookie Policy

Hello everyone! We are Ray Magnet Factotry, welcome to visit our website!

We attach great importance to the privacy and data security of our users, and ensuring their privacy and data security is an important responsibility of ours.

In order to protect your privacy and security, as well as comply with most privacy laws and regulations in the world, this Privacy and Cookie Policy is hereby written to inform everyone about our privacy usage.

This Privacy and Cookie Policy will mainly introduce the following points:

Service owners and data controllers

This is the agreement contract between Ray Magnet Factotry (hereinafter referred to as “us”, “us”, and “our”) and the user (hereinafter referred to as “you”, “your”, “user”).

https://raymagnet.net/ It’s the company website

Our email addresses will be displayed on the contact page (this page has been hidden to prevent spam emails).

If you have any questions, need to cancel our permission to use your privacy or delete your data, or find that we have violated this Privacy and Cookie Policy, please contact us promptly.

The Information We Collect

In the process of using our services, in order to conduct analysis, statistics, improve service quality, and prevent junk content or inappropriate behavior, we will collect the following necessary information.

In order to better protect user privacy and personal information, we will only collect information necessary for providing services.

The information you voluntarily provided

If we collect or share your personal information except as required by laws and regulations, relevant departments, or with your permission, it will be considered a violation of this privacy policy. You can contact us.

Cookie

Our service uses cookies to improve user experience and service security, or to make certain personalized settings

Prevent spam and inappropriate behavior.

We will not share your cookies. Your cookies will be securely stored in your browser, and the encrypted unique identifier used for account login will also be saved on the server.

You have the right to choose to delete or disable cookies, but disabling specific cookies may result in some services not functioning and being used properly.

All cookies containing sensitive information such as account login identifiers are set to Secure mode and will only be transmitted from the browser when accessed via HTTPS.

Cookies used

Cookie Name Category Storage Duration Storage Purpose
canvas_cookie_consent Functional 1 year Stores the user's cookie consent preference.
cookies-consent Functional 1 year Stores the user's cookie consent to remember their choice on future visits.
perf_Def_Ref Functional Session A temporary cookie used to ensure the proper loading and display of the website.
wordpress_logged_in Functional/Essential 1 year Stores a user's authentication details to keep them logged in to the WordPress dashboard.
wordpress_sec Functional/Essential 1 year A security cookie used to protect against unauthorized access and maintain user login.
wp-settings-4 Functional 1 year Used to store the user's personal dashboard settings in WordPress.
wp-settings-time-4 Functional 1 year Used to store the last time the user's settings were updated.

Cookies are necessary for providing services and will not be used for functional, analytical, statistical, or marketing purposes.

Privacy, Security, and Encryption

Our service uses strong encryption algorithms such as HTTPS, SSL certificates, TLS>=1.2, HSTS security protocol, CSP content security protocol, and AES-256 to encrypt and securely transmit and store your data. For your safety, you should add “https://” as a prefix to the URL (e.g., https://raymagnet.net/).

The HSTS information header will be stored in the browser after the first visit to our website, and the validity period is based on your browser settings.

If you see security error prompts in your browser while using the service, including but not limited to “Not (completely) secure,” “Certificate error,” “Certificate invalid,” or “Privacy error,” please contact us to resolve the issue and ensure the security of your data and personal information.

All collected non-public information will be encrypted and stored in the core server nodes within Indonesia.

The data centers we use have all passed GDPR compliance certification.

We will do our best to protect data and personal information security, but even with advanced security facilities, we cannot guarantee that all data can be transmitted and stored 100% securely.

When the server is hacked and a data breach occurs, we will notify you within 3 days (72 hours), inform the relevant departments, and activate our emergency plan to handle the corresponding data. We will do our best to take corresponding remedial measures to avoid the expansion of the security incident. Meanwhile, according to Article 18 of the Service Agreement, the server will urgently disconnect from the internet to ensure the security of user information.

How will we view and process your data?

We will review and read all publicly displayed comments for manual review, response, and anti spam review purposes.

When we reply to your email message, we will review the message content, real name, email address, phone number, and company name in order to respond.

To locate and fix bugs and code errors, we will review anonymous error logs.

We will only read the operation logs recorded by the system for investigation and evidence collection when there are (D) DoS/CC attacks, hacker intrusions, service interruptions/crashes, or requests from relevant departments in the service.

We may review statistical data at any time to track user and visitor traffic.

Without permission, we will not read your non-public displayed data and personal information, including but not limited to data and personal information stored in Ken’s Learning Planner and Ken’s Learning IoT.

Third party services, API interfaces, and platforms

We will not share any other data collected by us and our servers with third-party services and platforms without permission, except for information necessary for providing services.

In order to provide complete service functionality, our service is using the following third-party API interfaces:

When using our services, these API interface platforms may collect certain information, including but not limited to:

For more information, please refer to the corresponding third-party privacy policy.

We will not transfer your information and data to third parties unless we give notice and obtain your consent.

When our services are acquired or merged by a third party, we will provide notice, clearly stating the name of the recipient of the information and data, and requiring the recipient to continue to comply with this privacy policy. After the notification is released, the information and data will be transferred 7 days later. During this period, you have the right to refuse to transfer, delete information and accounts, and stop using the service.

Log

Our server will save and record log files containing time, URL links, IP addresses, and port numbers. This document is only used for our own investigation and evidence collection of downtime accidents and improper behaviors such as illegal bypassing of security mechanisms (intrusion).

When there is an error in the front-end or back-end code, the server also logs it for locating and fixing the code error.

Our email system may record email sending logs and encrypted email sending information to track down hacker intrusions and other inappropriate behavior, and check for HTML code errors.

Duration of data storage

We may retain some data on the server for anti spam purposes, analysis and statistics, and subscription services.

The following information will be saved on the server until you request deletion:

When our service ceases operation, we will notify and delete or anonymize the personal information and data collected within a reasonable period of time (7 days).

Viewing, correcting, deleting information, and revoking privacy permission

According to the CCPA privacy protection laws in California, USA, “selling”, “in the process of selling”, “selling”, or “sold” means selling, renting, publishing, publicizing, disseminating, making visible, transmitting, or orally communicating, as well as using written, electronic, or other means to obtain consumer personal information from another company or third party for monetary or other valuable consideration.

According to CCPA and the Personal Information Protection Law of the People’s Republic of China, you have the right to send us an application email through the contact information in Chapter 1 of this policy to request access or correction of your personal information, cancel your permission to use our privacy, terminate our disclosure of your personal information, and delete or correct comments on our website, especially for residents of California, USA and China.

Your application email should include:

*The information you apply for will be collected and processed according to your application and this privacy policy.”

 

After receiving your application, we will respond within 7 days. But if our learning tasks are heavy, we will respond within 45 days. This application is completely free, and we will respond to you in understandable language.

If you find that we have violated your privacy and we have violated this Privacy Policy, please contact us promptly. We will delete the relevant data within 7 days, and if the learning task is heavy, it will be deleted within 45 days.

According to our service agreement, CCPA, and Article 16 of the Personal Information Protection Law of the People’s Republic of China, even if you choose to refuse our collection of your data or the use of cookies, or if you send us an application as mentioned above, we will not abuse or discriminate against you unless our service requires the use of such data (such as necessary cookies).

You can view, modify, correct, and delete account data at any time in the corresponding functional section or “Settings.” You can also log out of your account by following the on-screen instructions in “Settings.”

You can choose to delete all cookies, revoke consent to the use of cookies, and send a request in your browser on the following page:

Permission

Without permission, our service will not collect sensitive information or use sensitive permissions on devices or browsers, including but not limited to:

Our website will only use the necessary permissions to provide services, and will only use the corresponding permissions when needed. We cannot apply for non essential permissions in advance or excessively, nor refuse to provide services due to users choosing to refuse certain non essential permissions.

You have the right to choose whether to enable the corresponding permissions in the device or browser settings.

Your right to data

You have the right to control our use of your data.

You can disable cookies in your browser settings or enable the feature to send ‘Do Not Track’.

You can also send us an application to view, modify, correct, and delete your data (see Chapter 10 for details).

Privacy Protection And Rights of Minors and Guardians

If you are a minor, before using this website, we request that you ask your parents or other guardians to carefully read this policy and, with the explicit consent of your parents or other guardians, use the services or provide information to us. It is worth noting that our website is specifically designed for working with adults. If you are a minor, please do not use it.

If you are the parent or other guardian of a minor, please pay attention to whether the minor under your guardianship is using our services after obtaining your authorisation and consent. When you have any questions about the personal information of minors under your guardianship, please apply to view, modify, correct or delete their personal information and data following the provisions of Chapter 10 of this policy.

Location and backup of data storage

Our server node and core node are located in Asia.

Under normal circumstances, you will be assigned to the nearest edge server node by DNS or a load-balancing scheduler. You can view the server node number assigned to you at the bottom of the website or in the HTTP header.

In rare cases of force majeure, when all server nodes in a region are overloaded or unable to operate normally, you may be temporarily dispatched to edge nodes in other countries/regions.

In order to ensure the security of user data and in accordance with relevant laws and regulations, non-public user data and information collected will generally be stored within Asia (Indonesia); that is, only transmitted, stored, and backed up between domestic servers.

When overseas/foreign users/visitors visit our website and use our services, only necessary data and cookies will be transmitted to the corresponding edge nodes and user locations.

If overseas/foreign users have objections to the storage and transmission location or method of this data, or have not complied with the laws and regulations of your location, please contact us through the contact information displayed in Article 1 of this policy to have your data processed specially.

All cross-sea/cross-border data transmission will use strong encryption algorithms such as HTTPS, SSL certificates, TLS 1.3, and AES-256 to ensure that the data is not stolen or tampered with by hackers and complies with most privacy laws and regulations in the world.

Server data backup is only conducted in Asia (Indonesia), and in principle, non-public user data in the backup data must not flow out of Asia (Indonesia).

To prevent data loss and promptly restore data in case of accidental loss, the data stored on the server will be backed up regularly.

Data backup will be carried out in the following manner:

After the data is deleted, the corresponding data may be verified with a unique ID code from the backup and deleted several days to weeks later.

Law

We have the right to change this privacy policy at any time to comply with the latest and current privacy laws and regulations.

According to Article 9 of Chapter 2 of the General Data Protection Regulation (GDPR) of the European Union, we may collect and process personal information without seeking your permission in the following situations, but we will inform you as soon as possible:

The information collected due to legal regulations or requirements of relevant departments will be encrypted and stored on our server for the prescribed period and processed strictly under the corresponding requirements. The collection and processing process may exceed the information listed in Articles 2 and 3 of this policy.

Change

We have the right to change this policy at any time, comply with the latest laws and regulations, better explain our use of privacy and data, support and adapt to the latest privacy protection technology developments.

When we formulate a new privacy policy, we will notify through email and the orange announcement area on our website.

When we update our rules and policies, continuing to use our services means that you agree to the new version of the rules and policies. If you do not agree, please unsubscribe from our content and stop using our services before it takes effect.

Regarding this policy

We will comply with the contents of this policy to protect your privacy.

In order to better protect user privacy in real-time, we will regularly review this privacy policy.

Please supervise together. If you find that we have violated this policy and infringed upon your privacy, or have any questions about this policy, please contact us through the contact information in Chapter 1 to help understand, make corrections, and delete unauthorized collected data as soon as possible.

The final interpretation of this policy belongs to us personally.

Definition and Explanation of Nouns

Personal Information

All kinds of information related to identified or identifiable natural persons recorded in electronic or other ways, excluding anonymized information.

IP Address

Internet protocol address, the virtual address of a region or device on the Internet/Internet (Internet).

It can be IPv4 (such as 123.45.67.89) and IPv6 (such as 2401:1234:5678:90ab:: cd: ef).

Cookie

A small text file stored in a browser or app (usually encrypted) that can contain login information, personal preferences, activity records, and other content.

User agent string

The string information automatically sent by web browsers and mobile apps to the server is used to identify the type, version, and language of the browser and operating system.

URL link

Used to determine the string for each page on the website, such as https://www.kenstudyjourney.cn/zh-cn/about/

log

The text file stored on the server, including the folder location of the code file, access time, IP address, port number, domain name, etc.

It will be used to locate factors, bugs, and abusive behavior that cause service interruptions (downtime).

permission

Users have control over whether the website can access and use sensors or personal information on their devices. It can be a camera, microphone, address book, photo album, GPS positioning service, etc. Permissions can be modified in device/browser settings.

API interface

API is an application programming interface that can be combined with other programs to input and return data, providing extended functionality for services.

For example, our service will use Evan Technology’s API interface and send the user’s IP address to obtain the approximate location of the IP address.

anonymization

The process of processing personal information that cannot identify specific natural persons and cannot be restored.

Data backup

The measures taken to prevent data loss by transferring copies of data to different storage media (backup servers, external HDD or SSD hard drives, internal computers, etc.).

Edge node

A server node that serves nearby users and is only responsible for caching and distributing files and public data, as well as forwarding non-public user data. Internet connection is required.

Core node

The node responsible for core business such as data storage, encryption, decryption, and computation.

Scroll to Top
Seraphinite AcceleratorOptimized by Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.