XYVidCam App Privacy Policy
Updated: July 15, 2024
Date of entry into force: July 15, 2024
This product is a combination of software and hardware provided by HongKong VeeGilEye Technology Co., Ltd. (hereinafter referred to as "we" or "the company"). The intelligent hardware equipment includes but is not limited to this product. Intelligent hardware equipment (hereinafter referred to as "camera"), intelligent doorbell intelligent hardware equipment (hereinafter referred to as "doorbell"),After binding with the mobile phone client software "XYVidCam" (hereinafter referred to as "APP"), you can control the intelligent hardware equipment through the APP, and view the real-time and historical videos of the intelligent hardware equipment on the APP. At the same time, we also provide the functions of image, video Event Alarm, Sound Event Alarm and voice intercom through APP.Thank you very much for your trust in us. We are well aware of the importance of personal information to users, and we also know that providing effective protection for users' personal information is the cornerstone of the healthy and sustainable development of our business. Thank you for your use and trust in our products and services! We know that this trust is not easy to come by, and we will follow the industry's proven safety standards,Take appropriate security measures to protect your personal information and make this trust stronger.
• XYVidCam App
When you use our products, please read this policy carefully and understand the purpose and security measures we collect and process your personal data, including how we use, store, share and transfer personal data. In this policy, you can enforce your privacy rights, access rights to personal data through our instructions,Right of Deletion, etc.
For mobile applications of other brands that we support services, it is up to our customers to decide what personal information is collected through our products, so this privacy policy does not apply to the principles of collection or processing of personal information by other brands. We collect information at the request of our customers, and the processing of such information is limited to the provision of the services that the customers have agreed with us.If you are a user of one of our customers and you do not wish to be contacted by a customer using our services, please contact that customer directly with your request.
Definition
In this policy,
Personal information: Information recorded electronically or otherwise that can be used alone or in combination with other information that can identify an individual or reflect the activities of a particular individual.
Sensitive personal information: including personal biometric data, precise location information. When we provide you with specific deleted content: personal sensitive data products or services, when it comes to the collection of sensitive personal information, we will obtain your consent through significant and clear notice before collecting your sensitive personal information.
Smart devices: refers to non-standard computing devices produced or manufactured by hardware manufacturers that have a human-machine interface and can transmit information through wireless networks, including smart cameras.
Application: refers to the mobile application developed by us to help end users remotely control the content deleted by smart devices: and connect to our Internet of Things (IoT) platform.
How we collect and use your personal information
In order to provide our services to you, we will ask you to provide personal information necessary for such services. If you do not provide personal information, we may not be able to provide you with our products or services.
• Account or profile information: When you register or log in to an account, we may collect your user name and deleted content: account contact information, such as your email address, phone number, and login credentials. During your interaction with our products, we may further collect nicknames, avatars, country codes, deleted language preferences in your account: account or time zone information, etc.
If you choose to authorize a third-party account to log in, we will obtain your shared account information (such as Avatar, nickname, region, gender and other information) from the third party and bind it with your account for quick login. We will follow the agreement with the third party and the terms of sharing personal information in the privacy policy published by the third party,Use your personal information in compliance with relevant laws and regulations.
• Feedback: When you use the feedback and suggestions features in our products, we collect your email address, mobile phone number and feedback content (including voice messages) in order to deal with your problems and equipment failures in a timely manner.
At the same time, according to different application products and services, we will collect corresponding and necessary personal information to provide you with products and services.
Information we collect automatically
• Device information: When you interact with our products, we will automatically collect device information, such as the device's MAC address, IP address, wireless connection information, operating system type and version, application version number, push notification identifier, Log files and mobile network information (including SSID, BSSID), clipboard, application installation list, SD card root directory information, etc.
Usage Information: During your interaction with our website and services, we automatically collect usage information related to your visits, clicks, downloads, sending/receiving messages and other uses of our website and services.
• Log information: When you use our application, system and exception logs may be uploaded, including your IP address, language used, operating system version, date or time of access, etc.
Please note that separate device information and service log information are information that cannot identify a specific natural person. If we combine such non-personal information with other information to identify a specific natural person, or use it in combination with personal information, such non-personal information will be regarded as personal information during the combined use,Except with your authorization or as otherwise provided by laws and regulations, we will anonymize and de-identify such information.
• Location information: When you turn on the positioning function of your mobile device through the system authorization and use the location-based services, we will collect and use your location information so that you can use the application to network with smart devices. As well as when you use our specific products or services, we may collect real-time precise or non-precise geolocation information about you.You can turn off location services in the system of your mobile device to stop our collection of your location information.
3. Information about smart devices
• Smart device basic information: When you use a smart device connected to our products or services, we may collect basic information about the smart device, such as device name, device ID, online status, activation time, firmware version, upgrade information, WIFI name, WIFI signal strength, device battery level, etc.
• Information reported by smart devices: Depending on the different smart devices you choose to connect with our products or services, we may collect information reported by your smart device. For example, a smart camera may collect images or videos it takes.
Information related to intelligent equipment alarm and troubleshooting equipment problems: when you use the equipment connected to our products or services for voice calls and the user can follow the intelligent equipment at the camera end after opening it, we may collect information such as alarm time and alarm content of the equipment; To communicate for troubleshooting equipment users,If closed, the call cannot be made. Problem, we may collect equipment running logs. Allow access to camera, photo, and video permissions: This permission is used to save
4. Cases requiring your authorization and consent to retrieve system permissions
For more information about our access to system permissions, please see the VeegilEye Application Permissions Use List.
5. Improve our products and services
We may collect encrypted international mobile device identity (IMEI) and network device address (MAC), as well as mobile phone models, system id numbers, and software crash logs for counting the number of users of our products, analyzing product usage, troubleshooting crash causes, and reducing crashes, so as to continuously improve our products.This information does not involve private information such as your personal identity.
* Purpose and legal basis for processing personal information *
We process your information for the following purposes:
• Provide services to you: We process your account and profile information, device information, usage information, deleted content: account information and smart device related information to provide the products and services you request. The legal basis for such processing is the performance of our contract with you in accordance with our Terms of Use.
Improve our services: We process your device information, usage information, location information, and smart device-related information to ensure the functionality and security of our products, develop and improve our products and services, analyze our operational efficiency, and prevent and track fraud or improper use. The legal basis for such processing is the performance of our contract with you in accordance with our Terms of Use.
• Non-Marketing Communications: We process your personal information for the purpose of sending you important information related to the Services, changes to our terms/conditions and policies, and/or other administrative information. Due to the importance of such information, you may not be able to opt out of receiving such messages. The legal basis for such processing is the performance of our contract with you in accordance with our Terms of Use.
• Compliance: We process your personal information as we deem necessary or appropriate:(a) to comply with applicable laws and regulations; (B) to comply with legal process;(c) to respond to requests from public bodies and governmental authorities; (d) to comply with our terms and conditions;(e) to protect our operations, business and systems;(f) to protect the rights, privacy, safety, or property of US and/or other users, including you; And (g) to pursue available remedies or limit damages that we may need to provide.
We may also use the personal information collected from you in other ways, providing specific notice at the time of collection and obtaining your consent as required by applicable law. If there is any change in the purposes for which your personal information is processed, we will notify you of such changes by email and/or a prominent notice on our website,And inform you about the choice of personal information.
Exceptions without consent
According to relevant laws and regulations, the collection and use of your personal information does not require your authorization and consent in the following situations:
(1) in connection with our performance of our obligations under laws and regulations;
(2) those directly related to national security and national defense security;
(3) Directly related to public security, public health, or major public interests;
(4) those directly related to criminal investigation, prosecution, trial and execution of judgment;
(5) For the purpose of safeguarding the life, property and other major legitimate rights and interests of the subject of personal information or other individuals, but it is difficult to obtain my authorized consent;
(6) The personal information involved is disclosed to the public by the subject of personal information;
(7) to collect your personal information from legitimate public disclosure of information, such as from legitimate news reports, government information disclosure and other channels;
(8) It is necessary to sign and perform the contract according to the requirements of the personal information subject;
(9) When it is necessary for an academic research institution to carry out statistics or academic research based on the public interest, and provide the results of academic research or description to the outside world, the personal information contained in the results is de-identified;
(10) It is necessary to maintain the safe and stable operation of XXX products and/or services, such as the discovery and disposal of product or service failures;
(11) Other circumstances stipulated by laws and regulations.
Information Collection and Use of Minors
If you are a minor user who has reached the age of 14, please read and agree to this policy carefully under the company and guidance of your legal guardian. You and the legal guardian shall be responsible in accordance with the law and this policy. Once minors use Kitty Vision products and/or services, we are deemed to have the consent or guidance of the legal guardian.VeegilEye does not provide services to children under the age of 14. If we accidentally collect personal information of children under the age of 14, we will delete it as soon as possible.
We protect the personal information of minors in accordance with the relevant laws and regulations of the state, and will only collect, use, store, share, transfer or disclose the personal information of minors when permitted by law, with the consent of legal guardians or necessary for the protection of minors; If we find that the personal information of minors has been collected without the prior consent of a verifiable Guardian,Will try to delete the relevant information as soon as possible.
When you have questions about our collection of minors' personal information and protection measures, you can contact us through the contact information publicized in this policy.
3. How do we entrust the processing, sharing, transfer and public disclosure of your personal information?
In order to ensure that you can receive push messages in time, some SDKs (such as push SDK) integrated by our APP have automatic startup, which may lead to automatic APP behavior. The startup frequency is defined by the SDK manufacturer, which may lead to multiple self-startup.
1. Entrusted processing
In order to provide you with more complete and high-quality products and services, some functions may be provided by our technical service partners, and we may entrust our partners to process some of your personal information. For the companies, organizations and individuals we entrust to process your personal information, we will sign a strict confidentiality agreement with them, clarifying the responsibilities of both parties, processing matters, processing period, processing nature and processing purpose, etc,They are required to process personal information only in accordance with our requirements, this Policy and any other relevant confidentiality and security measures.
2. Sharing
We only share your personal information in ways that you know.
(1) Disclose your personal information to third-party service providers who provide certain business-related services to us, such as website hosting, data analysis, payment and credit card processing, infrastructure provision, it services, customer support services, email delivery services, and other similar services, to ensure that they can provide services to us.
(2) In order to ensure the stable operation of our services or realize relevant functions, we may access the software development kit (SDK) provided by a third party to achieve the aforementioned purposes. We will conduct strict security tests on the application program interface (API) and software tool development kit (SDK) for authorized partners to obtain relevant information,Strict data protection measures are agreed with authorized partners to process personal information in accordance with this policy and any other relevant confidentiality and security measures.
(3) Disclose your personal information to customers and other business partners who directly or indirectly provide you with smart devices and/or the networks and systems you use to access and use our websites and services.
(4) Disclosure of your personal information to the company's subsidiaries or affiliates to conduct regular business activities.
3. Transfer
We will not transfer your personal information to any company, organization or individual, except in the following cases:
(1) Transfer with explicit consent: After obtaining your explicit consent, we will transfer your personal information to other parties;
(2) to meet the requirements of laws and regulations, legal procedures or mandatory government requirements or judicial decisions;
(3) when it comes to merger, acquisition or bankruptcy liquidation, if it involves the transfer of personal information, we will require the new company or organization that holds your personal information to continue to be bound by this policy, otherwise we will require the company or organization to seek authorization from you again. In this case, you will receive explicit notification via email and/or our website about changes in ownership, incompatibilities with new ways of using personal information and choices about personal information.
4. Public disclosure
We will only disclose your personal information in the following circumstances:
(1) with your explicit consent;
(2) Legal-based disclosure: Based on laws and regulations, legal procedures, litigation or mandatory requirements of government authorities, we may publicly disclose your personal information.
5. Exceptions to obtaining prior consent for sharing, transferring and publicly disclosing personal information
According to laws and regulations, in the following circumstances, we share, transfer, public disclosure of personal information without your prior authorization and consent:
(1) in connection with our performance of our obligations under laws and regulations;
(2) those directly related to national security and national defense security;
(3) Directly related to public security, public health, or major public interests;
(4) those directly related to criminal investigation, prosecution, trial and execution of judgment;
(5) In order to protect your or other personal life, property and other major legitimate rights and interests, but it is difficult to obtain my authorized consent;
(6) Personal information that you disclose to the public on your own;
(7) Collecting personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels;
(8) It is necessary to sign and perform the contract according to the requirements of the personal information subject;
(9) It is necessary to maintain the safe and stable operation of the products or services provided, including the detection and disposal of product or service failures;
(10) Other circumstances stipulated by laws and regulations.
How we protect your personal information
We take the security of your personal information very seriously. We have adopted multi-level protection measures such as security technical measures in line with industry standards and supporting organizational structure and management system to prevent your personal information from being leaked, damaged, misused, unauthorized access, unauthorized disclosure or changed to the greatest extent. Specifically:
1. Technical measures for data security
We take commercially reasonable physical, administrative and technical safeguards to maintain the integrity and security of your personal information. We provide a variety of security policies to effectively ensure the information security of users and devices.
In terms of device access, we use our proprietary algorithms to ensure data isolation, access authentication and authorization requests.
For data communications, communications using secure algorithms and transport encryption protocols, as well as commercial-grade encrypted transmission of information based on dynamic keys, are supported.
In terms of data processing, strict data filtering and verification and a complete data review process are adopted.
In terms of data storage, all confidential information of the user will be securely encrypted for storage.
2. Data security organization and management measures
In addition to the above-mentioned technical security guarantees, at the system and control level, we have also formulated a series of security guarantees, such as setting posts and responsibilities, holding security and privacy protection training courses, strengthening employees' awareness of data protection, and controlling access rights. To prevent data loss, illegal use, unauthorized access or leakage, tampering or damage.
3. Handling of security incidents
If a security incident affects the security of your personal information, we will notify you as soon as possible through your reserved email address, phone number, Message Center push, etc., and inform you of suggestions to reduce or prevent related risks and other information. When necessary, we will take appropriate remedial measures in a timely manner in accordance with the internal security incident emergency plan,And report to the relevant authorities in accordance with the regulations.
If, for any reason, you believe that your interaction with us is no longer secure (for example, you believe that the security of your account has been compromised), please send us an email as described below to support@meari.com.cn immediately.
V. How we store your personal information
1. Storage location
We will store personal information collected in China in China. If Personal information needs to be transmitted and stored outside China due to business needs, we will obtain your authorization and consent in advance, and strictly perform the cross-border obligations of personal information in accordance with national laws and regulations.
2. Storage period
We will process your personal information for the shortest period necessary to achieve the purposes described in this Policy, unless a longer period of retention is required by specific legal requirements. We will determine the appropriate retention period based on the amount, nature and sensitivity of your personal information, and at the end of the retention period, we will destroy your personal information. If we can't destroy the information for technical reasons,We will take appropriate measures to prevent further use of your personal information.
In the following cases, we may change the storage time of personal information due to legal requirements:
(1) to comply with the application of laws and regulations and other relevant provisions;
(2) To comply with the requirements of court judgments, rulings or other legal procedures;
(3) To comply with the requirements of relevant government agencies or legally authorized organizations;
(4) to protect the personal and property safety of us and our customers, users or employees;
(5) Other purposes reasonably necessary for legitimate interests.
If the operation is stopped due to business strategy and other reasons, unless otherwise required by laws and regulations, we will inform you of such circumstances, stop collecting your personal information, and delete the collected personal information or anonymize it.
6. Rights related to personal information
We respect your rights and hold your personal information. You may exercise any of the following rights:
• Via Account> Help Center in our app ";
You can exercise your individual rights without paying any fees. If your account service is in mainland China, the deleted content: according to the relevant requirements of the local information protection law, then we will respond to your request within 15 working days.
If you decide to send us a request by email, please indicate what information you would like to change, whether you would like your personal information to be removed from our database, or what restrictions you would like us to have in the use of your personal information. Please note that for security reasons, we may ask you to verify your identity before further processing your request.
You can:
• Request inquiries and access to the personal information we process related to you: You can inquire and access personal information through the following path: "Account> My Account";
• Request to correct inaccurate or incomplete personal information related to you: you can correct the content of personal deletion through the following path: our information: "Account> My Account>/Change nickname/change password";
• Request a temporary or permanent restriction of some or all of our processing of your personal information;
• Request that we process your information based on your consent or a contract with you, and that we automatically process your information, to transfer personal information to you or to a third party;
When we use your personal information based on your consent or our legitimate interests, we choose to object or refuse our use of your personal information.
Cancellation of account: You can cancel your account through the following path: "Account> My Account> Cancellation of Account". After clicking Destroy, our server will destroy your user information within 15 working days.
• In the APP, you can withdraw your consent and authorization in the following ways. (1) you can enter the rights management interface of your authorization for this product through the local "Account-> System rights" of your mobile phone, and withdraw your authorization and consent to this product APP. (2) Through the specific closing path and method in the functional description of the "1. How do we collect and use your personal information" module of this privacy policy,Disable related functions or unbind smart hardware devices. Closing withdraws the corresponding authorization for the function. Please understand that each business function requires some basic personal information to be completed (see Section 1 of this Privacy Policy). When you withdraw your consent or authorization, we cannot continue to provide you with the services corresponding to the withdrawal of consent or authorization,The corresponding personal information will no longer be processed. However, your decision to withdraw your consent will not affect the processing of personal information previously carried out on the basis of your authorization.
In the following cases, we will not be able to respond to your request in accordance with the requirements of laws and regulations:
(1) in connection with our performance of our obligations under laws and regulations.
(2) Directly related to national security and national defense security.
(3) those directly related to public safety, public health and major public interests.
(4) Those directly related to criminal investigation, prosecution, trial and execution of judgment.
(5) There is sufficient evidence that you have subjective malice or abuse of rights.
(6) In order to protect your or other personal life, property and other major legitimate rights and interests, but it is difficult to obtain my authorized consent.
(7) Your request is beyond the scope of general technical means and commercial costs.
(8) Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations.
(9) Involving trade secrets.
7. Our Personal Information Protection for deceased users
We strengthen the protection of the personal information of the deceased in accordance with the relevant provisions of the Personal Information Protection Law of the People's Republic of China. After the death of VeegilEye users (natural persons only), their close relatives can contact us through the contact information published in Chapter 10 of this policy for their own legal and legitimate interests, and exercise the right to consult, copy, correct and delete the relevant personal information of the deceased user,However, unless otherwise arranged by the deceased user during his lifetime.
VIII. Statement on Policy Changes
We may update or modify this Policy from time to time and such changes form part of this Policy. However, we will not reduce your rights under this policy without your express consent.
Please read this policy carefully after the change. If you do not agree with this policy, or have objections to the content of this policy modification or update, you can choose to cancel your account and no longer use Kitty Vision products/or services. However, please be aware that your actions and activities before you cancel your account and stop using the Service are still subject to this Policy.
We will post or otherwise notify you of any changes to this Policy on this page, and we will provide more prominent notice of material changes. In this case, if you choose to continue to use our services, you agree to be bound by this revised policy.
Material changes referred to in this policy include, but are not limited:
(1) There have been significant changes in our service model. Such as the purpose of processing personal information, the type of personal information processed, the use of personal information, etc;
(2) The main object of personal information sharing, transfer or public disclosure changes;
(3) Significant changes in your rights to participate in the processing of personal information and the manner in which they are exercised;
(4) Other changes that may have a significant impact on your personal information rights and interests;
(5) When the exit of personal information changes.
X. Applicable Law
This policy is applicable to the current laws and regulations of the People's Republic of China. Any dispute related to this policy shall be resolved by both parties through consultation; If both parties cannot resolve the dispute through consultation, you agree to submit the dispute to the people's court with jurisdiction where the actual operator of VeegilEye is located.
[Introduction]]
1. In order to ensure the realization of product functions and the purpose of safe and stable operation, we may apply for or use the relevant permissions of the operating system;
2. In order to better protect your right to know, we will explain the relevant operating system account registration rights that the product may apply for and use through the following list;
3. Please be aware that for the functional and security needs of business and products, we may use the user name, email address, telephone number and login credentials (SDK) of the software tool development kit of a third party, and these third parties may also apply for or use your relevant operating system permissions;
4. With the upgrade of the product, the application and use of operating system permissions may change. We will adjust this note in time according to these changes to ensure that you are informed of the application and use of permissions in a timely manner;
5. This note is applicable to Android and iOS of VeegilEye.
|
Device Permissions |
Corresponding business |
Purpose of Invoke Permission |
Whether to ask |
Whether the user can turn off permissions |
|
Phone Permissions |
Core functions |
Used for wind control and operation safety |
Yes |
Yes |
|
Location Permissions |
Core functions |
Get the list of WiFi networks in your location and connect smart hardware devices to the WiFi network of your choice. |
Yes |
Yes |
|
Storage Permissions |
Core functions |
Local storage of videos and images recorded by smart hardware devices on mobile phones |
Yes |
Yes |
|
Camera Permissions |
Menu access function |
Add and share smart hardware devices by scanning QR codes |
Yes |
Yes |
|
Microphone Permissions |
Menu access function |
Intercom call |
Yes |
Yes |
Third-party SDK partners and sharing information
In order to ensure the realization of the relevant functions of this product and the safe and stable operation of the application, we may access the software development kit (SDK) provided by a third party for relevant purposes. We will strictly monitor the software tool development kit (SDK) of the partner to obtain information to protect data security.
We list the relevant third-party SDKs to be accessed in the directory. We recommend that you carefully read and understand the third-party privacy policies. Currently, the third-party SDK information accessed by this product is as follows:
|
Partner Type |
Partner Name |
Purpose of cooperation |
|
Shared Personal Information Fields |
Privacy Policy |
|
Message Push Service Partner |
Huawei Push Service |
Provide Huawei device message push service |
Embed a third-party SDK, and the SDK collects and transmits personal information |
Unique Device Identification Code |
https://consumer.huawei.com/cn/privacy/privacy-policy/ |
|
Data Storage Service Partner |
Seven Cow Cloud |
For third-party data storage services |
Into a third-party SDK, the SDK collects and transmits personal information |
Device MAC address, Unique Device Identification Code, user Avatar information |
https://www.qiniu.com/privacy-right |
|
SDK |
io.flutter |
Get pasteboard information |
Embed a third-party SDK, and the SDK collects and transmits personal information |
Device MAC address, Unique Device Identification Code, location information, application list |
|
|
Data analysis service partner |
[Bugly] platform |
Provide professional exception reporting and operation statistics |
Embed a third-party SDK, and the SDK collects and transmits personal information |
Unique Device Identification Code |
https://bugly.qq.com/v2/contract |
|
SDK |
umeng |
Provide professional exception reporting and operation statistics |
Device information (IMEI/MAC/Android ID/IDFA/OAID/OpenUDID/GUID/SIM card IMSI/ICCID), location information, network information |
Unique Device Identification Code |
https://www.umeng.com/page/policy |