1)获得您明确同意或基于您的主动选择,我们可能会公开披露您的个人信息;
2)如果我们确定您出现违反法律法规或严重违反平台相关协议及规则的情况,或为保护平台用户或公众的人身财产安全免遭侵害,我们可能依据法律法规或征得您同意的情况下披露关于您的个人信息,包括相关违规行为以及平台已对您采取的措施。
1)与国家安全、国防安全有关的;
2)与公共安全、公共卫生、重大公共利益有关的;
3)与犯罪侦查、起诉、审判和判决执行等司法或行政执法有关的;
4)出于维护您或其他个人的生命、财产等重大合法权益但又很难得到本人同意的;
5)您自行向社会公众公开的个人信息;
6)从合法公开披露的信息中收集个人信息的,如合法的新闻报道、政府信息公开等渠道。
请知悉,根据适用的法律,若我们对个人信息采取技术措施和其他必要措施进行处理,使得数据接收方无法重新识别特定个人且不能复原,则此类处理后数据的共享、转让、公开披露无需另行向您通知并征得您的同意。
1)我们采用HTTPS加密传输协定传输装置数据到云端;
2)设备之间数据以128/256-bit AES、XTEA加密方式传输;
3)透过ECDH自动产生AES加密金钥;
4)采用ECDSA数字签名验证身份;
5)以扰乱机制(Scrambling)传输影像数据。
1)导入ISO 27001 / ISMS信息安全管理制度;
2)修订资料保护与公司隐私权政策;
3)资料收集与使用同意书/声明内容调整;
4)更新资料泄漏处理程序;
5)研拟个资事故紧急应变程序。
在以下情形中,按照法律法规要求,我们将无法响应您的请求:
1)与国家安全、国防安全有关的;
2)与公共安全、公共卫生、重大公共利益有关的;
3)与犯罪侦查、起诉、审判和执行判决等有关的;
4)有充分证据表明个人信息主体存在主观恶意或滥用权利的;
5)响应您的请求将导致您或其他个人、组织的合法权益受到严重损害的;
6)涉及商业秘密的。
1)适用的法律有明确规定;
2)获得您的明确授权;
3)您通过互联网进行跨境交易等个人主动行为。
针对以上情形,我们会确保依据本隐私权政策对您的个人信息提供足够的保护。
1、我们可能适时修订本政策内容,以适应最新法律法规的要求。
2、我们将在变更生效前,在官网公告或以其他方式通知您,让您可以详阅更新后的完整内容。
3、在该情况下,如您仍选择继续使用我们的服务,即表示同意首经修订的政策约束。
感谢您花时间阅读我们的隐私政策
In the course of using the Products and services, we need/may need to collect and use your personal information, including:
The phone number, verification code, and account password are used to create platform accounts.
Fill in the above information when using the client application, we will verify your identity based on the information you provide,
Make sure you're being served.
Based on your specific operations during software installation and/or use,
Receives and records the device information (including the device model, operating system version, device Settings, unique device identifier, and hardware and software features such as the device environment) and device location information (including the GPS location authorized by you and the sensor information such as the WLAN access point, Bluetooth, and base station).
If you do not provide this information, relevant functions will not be enabled, but the normal use of the account will not be affected.
Camera/camera-based permission: Before enabling the client application to remotely control a smart device, we need to obtain the permission to use the camera/camera on your mobile device so that we can scan a QR code to add a smart device.
Access permission for photo albums (photo library/video library) : You can enable access permission for photo albums to capture videos and pictures of smart devices in real time.
We will store the captured video files and pictures on mobile devices for your subsequent viewing and use.
You understand and agree that the above functions may require you to enable the access rights of your location information (geographic location), camera (camera), photo album (photo library), microphone (voice), speaker, and system storage space information on your mobile device to collect and use the information involved in these permissions.
You can view the status of the above permissions in the system Settings of your mobile device, and you can decide to turn these permissions on or off at any time.
Please note that you open any permissions that represents your authorization we can collect and use personal information to provide corresponding service for you, once you close any permissions that represents your cancel the authorization, we will no longer be based on corresponding permission to continue to collect and use personal information, also is unable to provide you with the permission of the service.
However, your decision to turn off permissions does not affect previous information collection and use based on your authorization.
To make your access experience easier, we store cookies, Flash cookies, or other local storage provided by the browser (or associated application) that usually contains identifiers, site names, and some numbers and characters on your computer or mobile device (collectively, "Cookies").
With cookies, websites can store data such as your login details.
You may modify your acceptance of cookies or reject our cookies if your browser or browser add-on services allow it.
However, if you do so, it may affect your secure access to our site in some circumstances and may require you to change user Settings every time you visit our site.
In addition to cookies, we also use web beacons, pixel tags, Etags and other similar technologies on our websites.
For example, we may send you an email that contains an address link to the content of our website, and if you click on that link, we will track that click to help us understand your product or service preferences so that we can proactively improve our customer service experience.
A website beacon is usually a transparent image embedded in a website or email.
With the help of the pixel labels in the E-mail, we can tell whether the E-mail is open or not.
If you do not wish your activities to be tracked in this way, you can always unsubscribe from our mailing list.
An ETag (entity tag) is an HTTP protocol header that is passed between an Internet browser and an Internet server in place of a Cookie.
ETag can help us avoid unnecessary server load, improve service efficiency, save resources, energy, and at the same time, we may record your identity through ETag, so that we can further understand and improve our products or services.
Most browsers provide the function of clearing cached data. You can clear cached data in the browser Settings function.
Note, however, that if you disable ETag, you may not enjoy a relatively better product or service experience.
We will not share your personal information with companies, organizations and individuals other than service providers, except in the following cases:
1) Sharing under legal circumstances: We may share your personal information in accordance with laws and regulations, litigation and dispute resolution requirements, or according to the requirements of administrative and judicial organs.
2) Sharing with express Consent: Upon obtaining your express consent, we will share your personal information with other parties.
3) Sharing at your choice: When you enable the function of sharing smart devices through the client application, we will share the information of the smart terminals you add to the terminal users specified by you according to your choice.
We will not transfer your personal information to any company, organization or individual except in the following circumstances:
1) Transfer with express consent: Upon obtaining your express consent, we will transfer your personal Information to other parties;
2) in the service provider, mergers, acquisitions or bankruptcy liquidation or other situations involving mergers, acquisitions or bankruptcy liquidation, such as involving personal information transfer, we will request the new holder you personal information of the company, the organization continue to be bound by this policy, otherwise we will ask the company, organization or individual to ask for a grant to you.
We will only disclose your personal information in the following circumstances:
1) With your express consent or upon your active choice, we may publicly disclose your personal information;
2) if we determine your violation of the laws and regulations or a serious breach of relevant agreements and rules of platform, or to protect the platform users or the personal property safety of the public from the infringement, we can according to the laws and regulations or under the condition of your consent to disclose personal information about you, including related violations and the platform has the measures taken to you.
In any of the following circumstances, sharing, transferring, or publicly disclosing your personal information does not require prior authorization from you:
1) Related to national security and national defense security;
2) Related to public security, public health or major public interests;
3) related to judicial or administrative law enforcement such as criminal investigation, prosecution, trial and judgment enforcement;
4) For the purpose of protecting the life, property and other major legitimate rights and interests of you or other individuals, but it is difficult to get my consent;
5) Your personal information disclosed to the public by yourself;
(6) Collect personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels.
Please note that, in accordance with applicable laws, if we take technical and other necessary measures to process personal information in such a way that the recipient of the data cannot re-identify a specific individual and cannot recover the data, the sharing, transfer or public disclosure of such processed data does not require further notice to you and your consent.
1. We have taken reasonable and feasible security measures in line with industry standards to protect your information from unauthorized access, public disclosure, use, modification, damage or loss of your personal information.
Such as:
1) We use HTTPS encryption transmission protocol to transmit device data to the cloud;
2) Data between devices is transmitted in 128/256-bit AES and XTEA encryption mode;
3) Automatically generate AES encryption keys through ECDH;
4) Using ECDSA digital signature to verify identity;
5) To transmit image data with the Scrambling mechanism.
2, we have the industry advanced data as the core, around the data life cycle of the data security management system, from the organizational construction, system design, personnel management, product technology and other aspects of multi-dimensional improve the security of the entire system.
Our critical information systems are currently GDPR compliant and ISO27001 certified.
3. Continuously adjust the existing working standards and procedures to ensure the confidentiality, integrity and availability of the data, and promptly notify the authorities and users within 72 hours as required by laws and regulations upon the occurrence of personal privacy violations:
1) Import ISO 27001 / ISMS information security management system;
2) Revise the data protection and privacy policy of the company;
3) Data collection and use consent/statement content adjustment;
4) Update the processing procedures for data leakage;
5) Develop an emergency response procedure.
You can manage your information in the following ways:
1. Query and Change your Information: You have the right to query and change your personal information through the client application or log in to the website and click Account Settings to query and modify your account information.
2. Change the scope of your authorization: To enable some functions of the client application, you need to obtain your authorization on the mobile device. You can modify the authorization in the relevant system Settings of the mobile device.
When you withdraw your authorization, we will no longer process the relevant personal information and the corresponding functions may not be enabled properly.
However, your decision to withdraw your consent will not affect the processing of personal information that has previously been carried out based on your authorization.
3. Responding to your feedback request: In order to ensure security, we may require you to verify your identity before processing your request, so you need to provide written proof or other relevant information to prove your identity.
In the following circumstances, we will not be able to respond to your request in accordance with laws and regulations:
1) Related to national security and national defense security;
2) Related to public security, public health or major public interests;
3) Those related to criminal investigation, prosecution, trial and execution of judgments;
4) There is sufficient evidence to show that the subject of personal information has subjective malice or abuse of rights;
5) Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations;
6) Involving trade secrets.
According to the requirements of data security protection laws and regulations applicable in different countries, the measures for the global transfer of information are as follows:
Personal information collected and generated during operations in China shall be stored in China, except in the following cases:
1) The applicable laws are clearly stipulated;
2) Obtain your express authorization;
3) You take the initiative to conduct cross-border transactions through the Internet.
In light of the above circumstances, we will ensure that your personal information is adequately protected in accordance with this Privacy Policy.
1. We may revise this policy in due course to meet the requirements of the latest laws and regulations.
2. We will notify you on the official website or in other ways before the change takes effect, so that you can read the complete content after the update.
3. Under such circumstances, if you choose to continue to use our services, you agree to be bound by the first revised Policy.
Thank you for taking the time to read our privacy policy