Operational safeguards
Data Security
Shenzhen Hide and Seek Technology Co., Ltd. protects advertising data through a least-privilege operating model, access controls, credential separation, audit logs, and bounded automation rules.
Credential handling
API credentials and refresh tokens are treated as confidential secrets. They are not embedded in public code, published in client-side files, or shared through public communication channels.
Least-privilege access
API access is requested only for the capabilities needed to retrieve advertising data and manage our own advertising campaigns. Access is limited to authorized operators and internal systems.
Automation limits
Automated changes are controlled by daily budget limits, bid-adjustment limits, account-level rules, and action logs. Initial integrations are validated in read-only mode before write operations are enabled.
Monitoring and logs
Operational logs record report retrievals, rule decisions, and account changes. Logs support troubleshooting, review, and compliance checks.
Data sharing
Advertising data is not sold, rented, or used to serve third-party advertisers. Service provider access, when required, is limited to infrastructure and operational support.
Contact
Security questions can be sent to admin@hideandseektech.com.