Operational safeguards

Data Security

Shenzhen Hide and Seek Technology Co., Ltd. protects advertising data through a least-privilege operating model, access controls, credential separation, audit logs, and bounded automation rules.

Credential handling

API credentials and refresh tokens are treated as confidential secrets. They are not embedded in public code, published in client-side files, or shared through public communication channels.

Least-privilege access

API access is requested only for the capabilities needed to retrieve advertising data and manage our own advertising campaigns. Access is limited to authorized operators and internal systems.

Automation limits

Automated changes are controlled by daily budget limits, bid-adjustment limits, account-level rules, and action logs. Initial integrations are validated in read-only mode before write operations are enabled.

Monitoring and logs

Operational logs record report retrievals, rule decisions, and account changes. Logs support troubleshooting, review, and compliance checks.

Data sharing

Advertising data is not sold, rented, or used to serve third-party advertisers. Service provider access, when required, is limited to infrastructure and operational support.

Contact

Security questions can be sent to admin@hideandseektech.com.