Purpose of the data: Yan Shuang collects certain personal data that are introduced by the users willingly on the different forms (“Contact” and “Order”) that exist on the web site YANSHUANG.ES. The data are used with the following purpose:
Obligatoriness of data: required fields are identified as such through the use of an asterisk (*) or though explicit indication of their necessity (mandatory). In the event of not filling the requested fields, it wouldn’t be possible to manage the request sent by users.
Access, rectification, cancellation and opposition rights: interested individuals may exercise their access, rectification, cancellation and opposition rights and revoke the consent given in any case for treatment and/or cession of their data, at any moment by requesting it by mail toYan Shuang, in the following address: Calle Lomo Juan Díaz 26, Candelaria, SANTA CRUZ DE TENERIFE, 38540 - ESPAÑA; or by referring an e-mail message to the following electronic address: firstname.lastname@example.org. In any case, the request must be accompanied by a copy of the final document crediting identity of the data holder.
Responsible of treatment: Cinco Candelaria S.L., whose domicile is indicated on the previous clause, is the responsible for the treatment of data. Yan Shuang has properly registered its files in the Spanish Agency for Data Protection, which can be viewed at www.agpd.es.
Users should abstain from providing other people’s data, unless they are explicitly authorized by them to give them. Yan Shuang could address the users at any time to ask them to certify existence and content of the indicated authorizations.
Safety: Yan Shuang ensures full confidentiality and privacy of the treated personal data, adopting security measures of technical and/or organizational nature, necessary to avoid alteration, lost, treatment or unauthorized access to data, ensuring this way their safety.Yan Shuang will not answer in any event for incidents that may arise around personal data when they derive from an attack or unauthorized access to the systems in a way that might be impossible to detect by the safety measures implemented.
Veracity of data: Users are responsible for veracity of the given data, committing themselves not to enter fake data and to proceed to their modification if it were necessary. .