Your trust is very important to us. We are aware of the importance of the security of user information. We will take security measures in accordance with laws and regulations to protect your information in a secure and controlled manner.
1. Ownership of rights
The intellectual property rights in all our products, services, technologies and all programs (hereinafter referred to as Technical Services) belong to us or their right holders. Unless we state otherwise, we own all rights (including but not limited to copyright) to publish documents and other information (including but not limited to text, graphics, pictures, photos, audio, video, icons, colours, layouts, and electronic documents)., Trademark rights, patent rights, trade secrets and all other related rights). No one may use any of the above without our permission (Including but not limited to monitoring, copying, re-broadcasting, displaying, mirroring, uploading, downloading any content within us through programs or equipment). If you are authorized to Browse, copy, print and distribute our internal information content, such content must not be used for commercial purposes and all information content and use of any part of it must include this statement of rights.
2. Limitation of Liability
We hereby remind you that your use of our Services is subject to the laws of the United States and that you should not compromise online security or use our Services to engage in activities that violate the reputation, privacy, intellectual property rights or other legal rights of others. Notwithstanding the foregoing, we are not responsible for the purpose or use of your use of our Services.
3. Intellectual Property Protection
1. Scope of application
2. Information collection and use
2.1 The information you provide to us includes:
2.1.1. Equipment information: We will receive and record information about the Smart Device you are using in accordance with the specific permissions you have granted during the installation and use of the Software (for example, information about the Smart Device after we have completed the network configuration, including device model, operating system version, device hardware and software functionality information such as settings and unique device identifiers).
2.1.2. Log information: When you use our services or the services provided by the App, we will automatically collect detailed usage of our services and save them as relevant web logs. For example, your IP address, browser type, telecom operator, language used, date and time of access, and a record of the web pages you visit, etc. When using our services, the smart device service provider provides us with the information.
2.1.3 Information about the operation of the Smart Device, Bluetooth and other information about the Smart Device.
2.1.4. Please note that separate equipment information, equipment operation information, etc. are information that does not identify a specific natural person.
If we combine such non-personal information with other information to identify a specific natural person, or with personal information, such non-personal information will be treated as personal information during the combined use period and we will anonymize and de-identify such personal information unless we have your authorization or are required by law or regulation to do so.
2.2 We use the user information submitted by you and collected by us for the following purposes:
2.2.1. To provide you with services, and to maintain and improve services;
2.2.2. To promote and introduce products to you under the premise permitted by laws and regulations.
2.2.3. we may use your personal information to prevent, detect, investigate fraud, compromise security, unlawful or violate agreements, policies or rules with us or our affiliates in order to protect the legitimate interests of you, our other users, us or our affiliates
2.2.4. We may combine information from a certain service with information from other services in order to provide services, personalized content and suggestions to you.
2.2.5. Other uses permitted by you.
3. Public disclosure of user information
3.1 We will only disclose your User Information publicly under the following circumstances:
3.1.1 We may disclose your User Information publicly with your explicit consent or based on your voluntary choice.
3.1.2 To protect the personal and property of users of our Platform and its affiliates, or the public from harm, we may disclose your User Information in accordance with applicable law or our relevant agreements and rules.
3.1.3 In connection with national security and defense.
3.1.4 In connection with public safety, public health and vital public interest.
3.1.5 In connection with criminal investigations, prosecutions, trials and enforcement of judgments.
4. Management of user information
4.1 You can ask us to delete User Information if
4.1.1. if we are processing User Information in breach of laws and regulations.
4.1.2. if we have collected and used your User Information without your express consent.
4.1.3. if our processing of personal information is in material breach of our agreement with you. For security reasons, you may need to provide a written request or otherwise prove your identity. We may ask you to verify your identity before processing your request.
5. Security of user information
5.1. We take the security of your information very seriously. We strive to protect your User Information by implementing a variety of reasonable physical, electronic and managerial security measures to prevent unauthorized access, public disclosure, use, modification, destruction or loss of User Information. We will use encryption technology to enhance the security of user information; we will use trusted protection mechanisms to prevent malicious attacks on user information; we will deploy access control mechanisms to ensure that only authorized personnel have access to user information; and we will conduct security and privacy protection training courses to raise staff awareness of the importance of protecting user information.
5.2. After the unfortunate occurrence of a user information security incident (leakage, loss, etc.), we will, in accordance with the requirements of laws and regulations, promptly inform you of the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, suggestions for you to prevent and reduce risks on your own, and remedial measures for you. We will inform you of the incident in a timely manner by email, letter, telephone, push notification and other means, and when it is difficult to inform users one by one of the information subjects, we will take reasonable and effective ways to issue announcements.
5.3. At the same time, we will report on the handling of user information security incidents as required by regulatory authorities.
5.4. If our products and services cease to operate, we will take reasonable steps to protect the security of your user information, including promptly ceasing activities that continue to collect user information; delivering or publishing notice of the cessation of operations to users on a case-by-case basis; and deleting or anonymizing the personal information held.
5.5. we will notify you again and obtain your express consent when we use user information beyond the stated purpose of collecting user information or beyond direct or reasonable contact.
6. Protection of Minors
7.4. Material modifications referred to in this policy include, but are not limited to
7.4.1. a material change to our service model. For example, the purposes for which user information is processed, the types of user information, the uses of user information, etc.
7.4.2. a material change in our control and organisational structure. e.g. business restructuring, bankruptcy or merger, etc.
7.4.3. there is a change in the primary recipients of the User Information shared, transferred or publicly disclosed
7.4.4. there is a material change in your rights to participate in the processing of user information and how you exercise them.
7.4.5. when there is a change in the department responsible for handling user information security, contact details and complaint channels
7.4.6. When the user information security impact assessment report indicates a high risk.
ur right to participate in user information processing and the way you exercise it.
8. How to contact us