Privacy Policy


Shenzhen Ai-thinker Technology Co., Ltd. and its affiliated companies (hereinafter collectively referred to as "we") are committed to protecting your personal privacy.

 

"Ai-thinker Privacy Policy" (hereinafter referred to as "this policy") applies to all products and/or services provided by the Ai-thinker platform, including the U-bases IoT APP (mobile client). When you use our services, we will collect and process your relevant information, so please read this policy carefully and make sure you understand our rules for collecting and processing your personal information (including how to collect, use, save, and share this information), and provide you with ways to access, update, delete and protect this information. When you agree to this Privacy Policy, or start and continue to use our products or services in an appropriate manner without contacting us to express contrary opinions through appropriate means, we will be deemed to have fully understood and agreed to this Policy. During the reading process, if you have any questions, comments, suggestions or complaints, especially if you believe that our personal information processing has harmed your legitimate rights and interests, you can complain/suggest about our services through appropriate regulatory channels, or contact us through the following Contact us via:

 

Email: axy_dev@tech-now.com

 

This policy mainly explains to you:

1. How we collect and use your personal information

2. The permissions we need

3. How we use cookies and similar technologies

4. How do we use SDK

5. How we share, transfer and publicly disclose your personal information

6. How we protect your personal information

7. Your rights

8. How we process children’s personal information

9. How your personal information is transferred globally

10. Storage period of your personal information

11. How to update this policy

12. How to contact us

 

We are fully aware of the importance of personal information to you and will do our best to protect the safety and reliability of your personal information. We are committed to maintaining your trust in us and abiding by the following principles to protect your personal information: principle of consistency of rights and responsibilities, principle of clear purpose, principle of choice and consent, principle of minimum necessity, principle of ensuring security, principle of subject participation, principle of openness and transparency, etc. At the same time, we promise that we will take corresponding security protection measures to protect your personal information in accordance with mature security standards in the industry.

 

Please read and understand this Privacy Policy carefully before using our products or services.

 

1. How we collect and use your personal information

Personal information refers to various information recorded electronically or in other ways that can identify a specific natural person alone or in combination with other information or reflect the activities of a specific natural person.

Our services are provided by third-party partners [such as Jiguang]. In the process of providing such services, the third-party partners need to collect your relevant personal information, including device information [Device information includes: device identifiers (IMEI, IDFA , Android ID, MAC, OAID, IMSI and other related information), application information (application crash information, notification switch status, software list and other related information), device parameters and system information (device type, device model, operating system and hardware related information )], network information [Network information includes: IP address, WiFi information, base station information and other related information. ], geographical location information. In order to provide you with better services, improve technology and enhance user experience, you understand and agree that we have the right to provide your personal information to third-party partners to the extent necessary, and the third-party partners can also collect it on their own for the aforementioned purposes. and use your personal information, and use the collected information and data after de-identification or anonymization for other services and purposes on the premise of protecting your personal information and privacy rights and complying with applicable laws and regulations. When we want to use personal information for other purposes not specified in this policy, we will notify you in advance and obtain your consent. When we want to use the information collected for a specific purpose for other purposes, we will notify you in advance and ask for your consent. Aurora push messaging

We will collect your avatar information for camera and photo album services.

We will collect your location information in order to provide you with WiFi scanning and Bluetooth scanning services and obtain weather and latitude and longitude services.

We will collect your mobile phone number and email address to provide you with services such as login, registration, and password change.

We will collect your WeChat openid and Alipay userid in order to provide you with third-party login services.

We will collect your avatar information in silent/background state.

We will collect your location information in a silent/background state.

We will collect your mobile phone number and email address in silent/background state.

We will collect your WeChat openid and Alipay userid information in silent/background state.

We will only collect and use your personal information for the following purposes described in this policy.

 

(1) Register as an U-Baser IoT user

In order to complete the account creation, you may need to provide the following information to Aixing IoT: your mobile phone number, email address, created username and password.

During the registration process or after completing the account creation, if you provide the following additional information, it will help us provide you with better services and experience: your name, birthday, gender, location, and work industry. If you do not provide this additional information, it will not affect the basic functions of using Aixing IoT products and services.

 

(2) Purchase and delivery of products or services

If you purchase U-Bases IoT products or services from us, in order to successfully complete the transaction, you need to provide the following information: your name, phone number, email address, mailing address, ID number, bank card number, etc. to generate an order. Required identification, payment, and delivery information. If you do not provide this information, you will not be able to purchase Aixing IoT's products and services.

 

Use U-Bases IoT products or services

When you use U-Bases IoT products or services, in order to ensure the normal realization of the corresponding functions of U-Bases IoT products and services, you may need to provide us with the following information about you: the geographical environment and location information of your device, We may also collect device configuration information, shared text or pictures, device operation data (including sensor data, safety system data, device data, control data, which are required when you request U-Bases IoT to provide after-sales service), etc. Your product usage log records, IP addresses connected to our products or services, time information, etc. If you refuse to provide such information, we will not be able to provide you with corresponding services, but it will not affect your use of other functions of U-Bases IoT products and services.

 

(4) Develop data analysis and research to improve our products or services

We will invite you to join U-Bases IoT's product improvement program to help us design new products, new services, or improve our existing products and services. If you agree, we may collect the following information from you for analysis and research on products or services: your account information, device information, diagnostic and usage data. If you choose not to join the product improvement plan temporarily, it will not affect your use of U-Bases IoT products or services.

 

(5) Provide job position information

You may submit your resume information to us through the website. If you agree, we may collect the following information from you to communicate with you about job opportunities, specific positions, etc. at U-Bases IoT: Educational background and work experience data.

 

(6) Safeguard the interests of the country, the public, you and others

You are fully aware that we have the right to collect and use your personal information without obtaining your authorization and consent under the following circumstances:

1. Relevant to national security and national defense security;

2. Relevant to public safety, public health, and major public interests;

3. Relevant to criminal investigation, prosecution, trial and judgment execution;

4. To protect the life, property and other major legitimate rights and interests of the personal information subject or other individuals but it is difficult to obtain the consent of the individual;

5. The personal information collected is disclosed to the public by the personal information subject on his own initiative;

6. Your personal information collected from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels;

7. Necessary to sign a contract according to your requirements;

8. Necessary to maintain the safe and stable operation of the products and/or services provided, such as discovering and handling product and/or service failures;

9. Necessary for legitimate news reporting;

10. When it is necessary for an academic research institution to conduct statistical or academic research based on public interests, and when providing externally the results of academic research or descriptions, the personal information contained in the results will be de-identified;

11. Relevant to our performance of obligations stipulated in laws and regulations;

12. Other situations stipulated by laws and regulations.

 

Your personal information may contain sensitive personal information, such as your race, religious beliefs, personal health status, gender orientation, etc. When you use our products or services, you may upload or publish such sensitive information on public channels. Please handle this type of sensitive personal information with caution.

The above information you provide will continue to be used by us during your use of Aixing IoT products and services. When you cancel your account, we will stop using and delete the above information. If laws and regulations have other requirements for the retention time of information, we will comply with the provisions of the laws and regulations.

The above information will be stored within the territory of the People's Republic of China. If cross-border transmission is required, we will conduct a security assessment in accordance with the requirements of laws and regulations.

When we want to use information for other purposes not specified in this policy, we will ask for your consent in advance.

When we want to use the information collected for a specific purpose for other purposes, we will ask for your consent in advance.

 

2. Permissions we need

(1). Camera permissions: When you modify the user's avatar, you can use the camera to upload pictures

(2). Album permissions: When you modify the user's avatar, you can choose to upload local pictures

(3.) Access to wifi: Obtaining WiFi list and information is to facilitate the discovery of external devices

(4). Access location permission: Due to the security restrictions of the Android system, the user's sensitive location information must be obtained before using WiFi scanning and Bluetooth scanning. This app will not use location information for any other purpose.

(5). Obtain external storage permissions: Obtaining external storage permissions is to store photos and videos taken by users.

(6). Bluetooth permissions: Turn on Bluetooth devices to discover external devices。

 

3. How we use cookies and similar technologies

(1) Cookies

To ensure the normal operation of the website, we will store small data files called Cookies on your computer or mobile device. Cookies usually contain an identifier, the site name, and some numbers and characters. With the help of cookies, the website can verify your identity information, ensure the security of data and services, store data such as your preferences or items in the shopping basket, and provide you with better products and services.

We will not use Cookies for any purpose other than those stated in this policy. You can manage or delete cookies according to your preferences. You can clear all cookies saved on your computer, and most web browsers have the function to block cookies. However, if you do this, you will need to change your user settings yourself each time you visit our website. To learn more about how to change your browser settings, please visit the introduction page of each browser's official website.

 

(2) Cookie similar technologies

In addition to Cookies, we may also use web beacons and pixel tags and other similar technologies on our website. For example, emails we sent you may contain click URLs linked to content on our website. If you click this link, we will track this click to help us understand your product or service preferences and improve customer service. A web beacon is typically a transparent image embedded into a website or email. With the help of pixel tags in emails, we can learn whether the emails have been opened. If you do not want your activities to be tracked in this way, please do not click on images or text links in emails, or you can unsubscribe from our mailing list at any time.

 

4. How do we use SDK

In order to provide and optimize our services, our App may embed third-party SDKs. These third-party SDKs may collect your personal information while cooperating with us to provide you with more comprehensive services. We will take necessary measures to control the collection and use of your personal information by these third-party SDKs to ensure that your personal information is effectively protected. cn.jpush.android (Aurora; Aurora Push) SDK is used to push messages. The app integrates third-party sdk for third-party login and push. To obtain the software installation list, MAC address and other behaviors belonging to the third-party SDK, please refer to the privacy policy of the third-party SDK.

 

Third-party SDK list

 

5. How we share, transfer and publicly disclose your personal information

(1) Sharing

We will not share your personal information with any company, organization or individual other than Ai-thinker, except in the following circumstances:

 1. Sharing with explicit consent: After obtaining your explicit consent, we will share your personal information with other parties.

2. We may share your personal information externally in accordance with laws and regulations, or in accordance with the mandatory requirements of government authorities.

3. Sharing with our affiliates: Your personal information may be shared with our affiliates. We will only share personal information that is necessary and subject to the purposes stated in this Privacy Policy. If the affiliated company wants to change the purpose of processing personal information, it will ask for your authorization and consent again.

4. Sharing with authorized partners: Only to achieve the purpose stated in this policy, some of our services will be provided by authorized partners. We may share some of your personal information with partners to provide better customer service and user experience. For example, when you purchase our products online, we must share your personal information with logistics service providers to arrange delivery, or arrange for partners to provide services. We will only share your personal information for legal, legitimate, necessary, specific, and clear purposes, and we will only share personal information necessary to provide services. Our partners have no right to use the shared personal information for any other purpose.

 

Currently, Ai-thinker's authorized partners include our suppliers, service providers and other partners. We send information to suppliers, service providers and other partners who support our business globally, including providing technical infrastructure services, providing transaction and communication services (such as payment, logistics, SMS, email services, etc.) , analyze how our services are used and the effectiveness of our services, provide customer service, facilitate payment, or conduct academic research and surveys, etc.

We will sign strict confidentiality agreements with companies, organizations and individuals with whom we share personal information, requiring them to handle personal information in accordance with our instructions, this Privacy Policy and any other relevant confidentiality and security measures.

 

(2) Transfer

We will not transfer your personal information to any company, organization or individual, except in the following circumstances:

1. Transfer with explicit consent: After obtaining your explicit consent, we will transfer your personal information to other parties;

2. When a merger, acquisition or bankruptcy liquidation is involved, if personal information is transferred, we will require the new company or organization that holds your personal information to continue to be bound by this privacy policy. Otherwise, we will require the company or organization to continue to be bound by this privacy policy. Re-ask for your authorization and consent.

 

(3) Public disclosure

We will only publicly disclose your personal information under the following circumstances:

1. After obtaining your explicit consent;

2. Disclosure based on law: We may publicly disclose your personal information when required by laws, legal procedures, lawsuits or mandatory requirements from government authorities.

 

6. How we protect your personal information

(1) We have used security protection measures that comply with industry standards to protect the personal information you provide and prevent data from unauthorized access, public disclosure, use, modification, damage or loss. We will take all reasonably feasible measures to protect your personal information. For example, when exchanging data (such as credit card information) between your browser and the "Service", it is protected by SSL encryption; we also provide https secure browsing for the official website of Ai-thinker; we will use encryption technology to ensure the confidentiality of data sex; we will use trusted protection mechanisms to prevent data from malicious attacks; we have established a dedicated department for personal information protection; we will deploy access control mechanisms to ensure that only authorized personnel can access personal information; and we will organize security and privacy Protection training courses to enhance employees’ awareness of the importance of protecting personal information.

 

 

(2) We will take all reasonable and feasible measures to ensure that no irrelevant personal information is collected. We will only retain your personal information for the period necessary to achieve the purposes stated in this policy, unless an extension of the retention period is required or permitted by law.

 

(3) The Internet is not an absolutely secure environment, and emails, instant messaging, and communication with other Aixing IoT users are not encrypted. We strongly recommend that you do not send personal information through such methods. Please use a complex password to help us ensure the security of your account.

 

(4) The Internet environment is not 100% safe, and we will try our best to ensure or guarantee the security of any information you send to us. If our physical, technical, or management protection facilities are damaged, resulting in unauthorized access, public disclosure, tampering, or destruction of information, resulting in damage to your legitimate rights and interests, we will bear corresponding legal liability.

 

(5) After an unfortunate personal information security incident occurs, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, and the measures you can take to prevent and control your own information. Recommendations for reducing risks, remedial measures for you, and more. We will promptly inform you of the incident-related information via emails, letters, phone calls, push notifications, etc. When it is difficult to notify personal information subjects one by one, we will issue announcements in reasonable and effective ways.

 

 At the same time, we will also proactively report the handling of personal information security incidents in accordance with the requirements of regulatory authorities.

 

7. Your rights

In accordance with relevant Chinese laws, regulations, standards, and common practices in other countries and regions, we guarantee that you can exercise the following rights with respect to your personal information:

 

(1) Access your personal information

You have the right to access your personal information in accordance with laws and regulations. If you want free access to your data, you can do so yourself via:

 

Account information - If you need to access or edit the profile information and payment information in your account, change your password, add security information, or close your account, you can do so by accessing your profile on our website or app, modifying Password and other related pages perform such operations. However, due to security and identification considerations or in accordance with identity mandates of laws and regulations, you may not be able to modify the initial registration information provided when registering.

 

If you are unable to access this personal information at any time through the methods above, you can send an email to axy_dev@tech-now.com or contact us according to the methods provided on the website or application.

 

(2) Correct your personal information

When you discover an error in the personal information we process about you, you have the right to ask us to make a correction. You can contact us at any time by sending an email to axy_dev@tech-now.com or using the methods provided on the website or app.

 

(3) Delete your personal information

You can make a request to us to delete personal information under the following circumstances:

1. If our collection and use of personal information violates laws and regulations;

2. If our processing of personal information violates our agreement with you.

 

If we decide to respond to your deletion request, we will also notify the entities from which we obtained your personal information and require them to delete it promptly, unless otherwise provided by laws and regulations, or these entities obtain your independent authorization.

 

(4) Change the scope of your authorization and consent

Each business function requires some basic personal information to be completed (see "Part 1" of this policy). You can give or withdraw your consent at any time for the collection and use of additional personal information.

You can do this yourself by:

Reset the authorization and consent of your personal information by visiting the authorization page of our website or application.

When you withdraw your consent, we will no longer process the corresponding personal information. However, your decision to withdraw your consent will not affect the previous processing of personal information based on your authorization.

 

(5) Personal information subject cancels account

You can cancel the previously registered account at any time. Account cancellation: Users can enter the "Personal Information" module in the application - "Settings" module - click on the cancel account function. The account has been canceled successfully and personal data has been deleted.

After canceling your account, we will stop providing products or services to you and delete your personal information according to your request, unless otherwise provided by laws and regulations.

 

(6) Constraint information system automatic decision-making

In some business functions, we may make decisions based only on non-human automated decision-making mechanisms including information systems, algorithms, etc. If these decisions significantly affect your legal rights and interests, you have the right to ask us for an explanation, and we will also provide appropriate relief.

 

 (7) Respond to your above request

For security reasons, you may be required to provide a written request or otherwise prove your identity. We may ask you to verify your identity before processing your request.

 

 If you are not satisfied, you can also complain or report to the regulatory authorities such as Internet Information, Telecommunications, Public Security, and Industry and Commerce.

 

 In principle, we do not charge fees for your reasonable requests, but for repeated requests that exceed reasonable limits, we will charge a certain cost at our discretion. For those that are gratuitously repetitive, require excessive technical means (for example, require the development of new systems or fundamentally change existing practices), pose risks to the legitimate rights and interests of others, or are very impractical (for example, involving information stored on backup tapes) request, we may deny it.

In the following circumstances, we will not be able to respond to your request in accordance with legal and regulatory requirements:

1. Directly related to national security and national defense security;

2. Directly related to public safety, public health, and major public interests;

3. Directly related to criminal investigation, prosecution, trial and judgment execution;

4. There is sufficient evidence to show that you have subjective malice or abused your rights;

5. Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations;

6. To protect your or other individuals’ life, property and other major legitimate rights and interests but it is difficult to obtain your authorization and consent;

7. Involving business secrets;

8. Relevant to our performance of obligations stipulated in laws and regulations.

 

 8. How we process children’s personal information

Our products, websites and services are primarily intended for adults. Children may not create their own user accounts without the consent of a parent or guardian.

For cases where we collect personal information from children with parental consent, we will only use or publicly disclose this information as permitted by law, with the explicit consent of the parent or guardian, or as necessary to protect the child.

Although local laws and customs may define children differently, we consider anyone under the age of 14 to be a child.

If we discover that we have collected personal information from children without first obtaining verifiable parental consent, we will seek to delete the data as quickly as possible.

 

9. How your personal information is transferred globally

In principle, the personal information we collect and generate within the territory of the People's Republic of China will be stored within the territory of the People's Republic of China.

Because we provide products or services through resources and servers around the world, this means that your personal information may be transferred to, or accessed from, overseas jurisdictions in the country/region where you use the products or services. We will conduct a security assessment in accordance with the requirements of laws and regulations before transferring.

Such jurisdictions may have different or no data protection laws. In such cases, we will ensure that your personal information is adequately protected within the People's Republic of China.

 

 10. Storage period of your personal information

Under normal circumstances, we will only retain your personal information for the shortest time necessary to achieve the purpose of your authorized use, unless otherwise provided by laws and regulations or with your additional authorization and consent. After the aforementioned personal information storage period exceeds, we will delete or anonymize your personal information.

 

 11. How to update this policy

Our privacy policy may change. We will post any changes to this policy on this page. For major changes, we will also provide more prominent notices.

Major changes referred to in this policy include but are not limited to:

1. Our service model has undergone major changes. Such as the purpose of processing personal information, the type of personal information processed, the use of personal information, etc.;

2. The main objects to whom personal information is shared, transferred or publicly disclosed change;

3. Significant changes in your rights to participate in the processing of personal information and how you exercise them;

If you continue to use Aixing IoT's products and services after this policy update comes into effect, it means that you have fully read, understood and accepted the updated policy and are willing to be bound by the updated policy.

 

 12. How to contact us

If you have any questions, comments or suggestions about this privacy policy, you can send an email to axy_dev@tech-now.com.

 

 If you are not satisfied with our response, especially if our personal information processing behavior harms your legitimate rights and interests, you can also complain or report to the regulatory authorities such as Internet Information, Telecommunications, Public Security, and Industry and Commerce.

 

 Contact us

If you have any comments or questions about this Privacy Policy, or if you have any questions about our collection, use or disclosure of your personal information, please go to [My] - [FAQs and Feedback] in the Ai-thinker app or provide the information below Contact us and specify "Privacy Policy". When you have rights requests and questions related to personal information, we have a professional privacy and security team to solve your problems. If your question itself involves a larger matter, we may ask you to provide more information to confirm the nature and impact of the matter. If you are not satisfied with the response you receive, you can refer your complaint to the appropriate supervisory authority. When you consult us, we will provide you with information about possible complaint channels based on your actual situation.

 

Contact details and address:

Shenzhen Ai-thinker Technology Co., Ltd.:

Room 410, Building C, Gushu Huafeng Intelligent Innovation Port, Xixiang, Baoan District, Shenzhen City

Contact email: axy_dev@tech-now.com

 

Update time: January 10, 2024