Update date: July [17] of [2024]
Effective date: November [30] of [2023]
Shenzhen Weipaiwulian Intelligent Technology Co., Ltd. (hereinafter referred to as "the company" or "we") attaches great importance to user privacy. We are well aware of the importance of personal information to you and are committed to maintaining your trust in us.
We will protect your personal information in accordance with laws and regulations. Before using HOTKam products and services,Please be sure to carefully read and thoroughly understand this Privacy Policy, and use relevant products and services after confirming full understanding and consent.
The main points of this policy are as follows:
(1) In order to facilitate you to understand our privacy policy, we will explain to you one by one the types of personal information we need to collect and its purpose;
(2) When you use some functions, we will collect some sensitive information from you after obtaining your consent;
(3) If it is necessary to share your information with a third party in order to provide services to you, we will carefully evaluate the legality of the information collected by the third party, its data security capabilities and other factors, and through this policy or supplementary statement You express relevant information.
(4) You can exercise your personal information subject rights through the methods described in this policy, or contact us for further instructions or explanations.Before Further reading and understanding of this policy, please note that:
This policy applies to all HOTKam products and services, as well as to those features/services that are integrated into third-party products or software (collectively, "our products and/or services").Our products and/or services are numerous and optimized from time to time, and the personal information collected by specific products or services may vary or may be adjusted after the issuance of this policy. Therefore, in addition to this policy, we will also explain to you the processing of personal information under certain specific products or services through privacy tips, supplementary statements, etc;
For example, it provides a supplementary description of the unique scenarios and third-party SDKs involved in the collection and use of personal information under each APP. When using these products or services, please pay attention to read the relevant tips or statements. If the contents are inconsistent with this policy, the former shall prevail within the scope of the relevant tips or statements.
You are not required to accept this policy or the aforementioned similar documents, but you should be aware that if you choose not to accept it, we will not be able to provide you with complete products or services, and may not be able to respond to or solve your problems in certain specific scenarios. You can also choose to stop using our products or services. When you choose to continue to sign this policy or use our products or services again,You will be deemed to have accepted and endorsed this policy or other similar documents based on the necessity of providing products and services.
In addition, after we update this policy (we will prompt you to update the situation), your continued use of our products and/or services will be deemed to be your agreement to accept the content of this policy (including the updated version).
When our specific products or services cease to operate, we will inform you through system notifications, announcements, text messages, emails, etc.,and process your personal information in accordance with this policy or similar documents. If we permanently cease operations,this policy will become invalid and we will process all your personal information in accordance with regulatory requirements.
In addition, this Policy does not apply to services provided by other companies or individuals ("Third Party Services").
For the convenience of users, our products and/or services may contain third-party services or links to them; However, we have no control over the third-party's independent collection and processing of your personal information. Therefore, unless otherwise required by law,We are not responsible for third-party services. You must read and refer to the privacy policies of these third parties, and independently determine whether to use their services.
This policy is designed to help you understand the following:
How to collect and use your personal information II. How to entrust the processing, sharing, transfer and public disclosure of your personal information
III. Your Rights How to protect your personal information How to handle personal information of minors How your personal information is transferred globally
7. Updates to this Privacy Policy
How to collect and use your personal information?
Personal information refers to all kinds of information recorded electronically or in combination with other information that can identify the identity of a specific natural person or reflect the activities of a specific natural person. Your personal information includes name, date of birth, identity document number, personal biometric information, address, communication contact information, communication records and content, account password, property information, credit information, whereabouts, accommodation information, health physiological information, transaction information, etc.Sensitive personal information includes identity document numbers, personal biometric information, bank accounts, communication records and content, property information, credit information, whereabouts, accommodation information, health and physiological information, transaction information, personal information of children under the age of 14 (including), etc. Sensitive personal information will be prompted to you in bold form.Personal biometric information includes personal genes,fingerprints, voiceprints, palmprints, auricles, iris, facial recognition features, etc. When your personal biometric information needs to be collected, we will separately inform you
in the form of a pop-up window and obtain your consent. You should carefully consider and check it.
We will not obtain your personal information through external channels, and will only collect and use information that you actively enter during the use of the service or that is generated by the use of the service. You can refuse to provide information without affecting other functions or services unless it is necessary to achieve basic business functions or required by laws and regulations.If the information you provide contains the personal information of other users, you need to ensure that you have obtained legal authorization before providing such personal information to HOTKam.
1. Circumstances in which we collect your personal information
1.1. Create an account, purchase, register a product or service
If you submit an online application to establish an account, purchase, register our products or services, including fulfilling your purchase order, delivering your products or services, product activation or verification, making changes due to your requirements, providing technical support or authorization updates, We may ask you to provide the corresponding personal data, such as your name, email address, mobile phone number, shipping address, product information, time of purchase and method of payment, etc,So that we can complete the processing of your order, download products and obtain services.
1.2. Upgrade Services
HOTKam may collect system and application information for your end products in order to notify you of available system and application updates. Information collected for this purpose includes device name, system and application version, operating system and browser version, region and language settings, etc. HOTKam's processing of the above information is limited to notifying you that an application update is available.
1.3. Fault Location
When your device or application has an abnormal situation and you choose to send relevant information to HOTKam for HOTKam or its partners to provide fault analysis services, HOTKam may collect relevant information, including device model, application name and version, device identification number, error log, etc.
1.4. We will collect and use the corresponding personal information according to the specific functions you choose to use:
(1) when you bind your device to use HOTKam products and services, we will collect the product serial number and product verification code you bind. This type of information is unique basic product information and is the basic information that must be collected to bind the product and further provide services to you.
(2) When you install the software and use the products and services, in order to ensure the safety of your account, we will read your phone status permission to receive and record the international mobile equipment identification number (IMEI) of the device. Please understand that this information can identify the bound terminal device and is the data collected to ensure the safe and normal operation of the service.You may not grant this permission, but this may not recognize the bound terminal device.
(3) When you use APP to scan two-dimensional codes and take photos, we will access your device's camera permissions. You can use this function to scan code recognition, take photos, and face recognition authorized by you in specific scenes after turning on the camera permissions. Please know that we will only obtain this permission when you actively authorize it,And in the foreground for you to present the shooting interface.
(4) When you select photos with recognizable two-dimensional codes from the mobile phone photo album, we need to obtain your photo album/storage permission to identify and obtain the device type and device serial number to complete the addition; You can also save the photos, videos and photos produced by the device's two-dimensional code to the mobile phone photo album through this permission,And through this permission to share your pictures or videos to social platforms, such as WeChat.
(5) When you use the function that needs to collect images, we need to obtain your camera permission and album/storage permission for image information collection and storage. You can turn off the camera permission and album/storage permission through system settings, but this will prevent you from using this function. Please know,We will only obtain this permission when you actively authorize it and present the shooting interface for you at the front desk.
(6) When you use the Wi-Fi information related functions, we will obtain your location permission, which will be used to obtain the Wi-Fi list and the Wi-Fi name (SSID) of the current mobile phone connection, so as to facilitate automatic filling in the equipment distribution process and ensure that the mobile phone can successfully reconnect to the Wi-Fi after changing the router settings.You can also manually enter the Wi-Fi name (SSID) or manually connect to the Wi-Fi to implement related functions without granting this permission.
(7) When you use the monitoring video preview function, we will collect your current video screenshots to facilitate you to identify the monitoring location.The screenshot will be saved as long as you use the device. It should be noted that unless you use additional value-added services based on video analysis and authorize US accordingly,we will not view your video content and/or the above video screenshots.
(8) When you use functions such as remote intercom, you need to turn on the microphone permission, and we will collect the audio content you submit accordingly to realize this function for you. You can turn off the microphone permissions through the system settings to refuse our collection, but this will make you unable to use the function.
(9) When you use the analysis or comparison function based on user reference information provided by the intelligent hardware device (including face/humanoid recognition, license plate/vehicle recognition, voice recognition, text recognition, fingerprint unlocking), you need to enter the reference information such as face picture, fingerprint and voice in advance. If you refuse to provide it, you will not be able to use the relevant functions.This kind of information is only stored locally on the smart device, or encrypted transmission and stored to the cloud server that provides services, used to implement related services on the smart hardware device, the APP itself does not store the information you enter. You can delete this information at any time.
(10) When you turn on the message reminder function, we will collect the video screenshots taken by your recorder and push the screenshots to you as the content of the reminder message. You can turn off this feature through your account settings.
(11) When you use the sharing related functions of the device or file, you may need to submit the nickname of the relevant person, the relationship with you, the contact information and other information; If you need to share to other apps,we need to obtain the list of applications installed in your mobile phone to judge whether the third-party applications have been installed on this machine and whether they support receiving sharing links,In order to be able to share correctly and quickly to the corresponding APP. If you refuse to provide, you will not be able to use the relevant functions. What needs to be reminded is that sharing or similar functions will make your corresponding personal information public within the scope specified by you, and you must carefully decide whether to use it or not, and be responsible for the relevant consequences.
(12) When you use value-added services, we will collect your personal information directly related to the service purpose.The specific service purpose and information content will be prompted to you in the form of service description or usage rules.This kind of information is the information we must collect to provide you with all kinds of value-added services, if you refuse to provide,Related services may not be used normally.
(14) In order to ensure that you can smoothly add security equipment and routers when using APP, preview the recorder monitoring screen normally, and facilitate the discovery of security equipment and routers under LAN, we need to obtain your local network permissions. If you do not grant this permission, you will not be able to use the relevant functions normally,For example, it is impossible to accurately view the status in the device addition process to complete the addition,and it is also impossible to automatically discover security devices and routers under the local area network.
(15) When you copy the link and email account, we will write the information you choose to copy to the pasteboard. This information will only be used for your subsequent pasting and will not collect your private information.
(16) When you use the horizontal and vertical screen switching function, we will obtain the gyroscope, acceleration, and gravity sensor information to identify and judge your device status. Please understand that device sensor data alone does not involve any personal location information and cannot be combined with other information to identify a specific natural person.
1.5. Security and operation and maintenance services.In order to meet the basic requirements of laws and regulations such as the Cybersecurity Law and the provision of services, and to ensure the security of your account and the safety of system operation, we will collect relevant information generated during your use of our products and/or services, including:
(1) when you use the relevant services, we will receive and record the information about the equipment you use to install and use the software and its location, including your mobile phone or computer hardware model, operating system version number, browser type, international mobile device identification code (IMEI),equipment hardware address (MAC), ip address, software version number, network access mode and type,operation log information.Please understand that this information is the basic information that we must collect to provide services and ensure the normal operation of products, and is used to ensure account security, maintain the normal operation of services, and optimize service experience.
(2) When you use the service to manage the equipment you bind, we will automatically receive and record the information of the relevant equipment, including type, model, firmware number, MAC address, system version number and system settings. We rely on this information to provide you with services and to ensure the safe operation of your equipment; For example, when the system is set to allow automatic equipment upgrades (this setting is enabled by default on some devices),We will automatically install and run the upgrade package for you when it is available to ensure that your device is always effectively adapted to the software you are using.
(3) In order to help us better understand the operation of software and related services, so as to ensure the safety of operation and service provision, we may record network log information, as well as the frequency of using software and related services, crash data, error reporting or abnormal service data,system operation status of abnormal equipment, overall installation and usage, performance data and other information.
2. Circumstances in which we use your personal information
When we need to fulfill our obligations to you under the user agreement and/or service contract, or when we are bound by legal obligations, or when we think it is necessary to protect our legitimate interests or those of third parties, we will,
with your consent, process your personal information for the purposes described in this policy.We will use your personal information in strict compliance with this policy and its updates.
2.1. We will use your personal information according to the following rules:
(1) We will use it in accordance with the provisions of this policy and to achieve the corresponding product and/or service functions.
(2) We may integrate and use your personal information and/or other information that we have obtained in a lawful manner in connection with your use of services or products (hereinafter referred to as "other information") to prevent, detect and investigate fraud, infringement, safety hazards, illegality or violation of agreements with us or our affiliates.
(3) When you access third-party services through our products and/or services, we will share personal information within the scope of your authorization with third-party service providers according to your authorization.
(4) Other uses permitted by you.
2.2. Please note that all personal information you provide or authorize us to collect when using our products and/or services will continue to be authorized to use during your use of our products and/or services unless you delete it or refuse to collect it through your account settings or system settings. When you cancel your account,we will stop using and delete your personal information, except as otherwise provided by laws and regulations.
2.3. We will make statistics on the usage of our products and/or services, and may share these statistics with the public or third parties to show the overall usage trend of our products and/or services and/or form research results related to market satisfaction research reports, service improvement plans, etc. However, these statistics do not contain any information that identifies you.
2.4. When we display your personal information, we will use methods including content replacement and anonymous processing to desensitize your information to protect your information security.
2.5. When we want to use your personal information for other purposes not specified in this policy, or when the information collected for a specific purpose is used for other purposes,
we will ask for your consent in advance by checking it on your own initiative.
2.6. We hereby remind you that if the information cannot be identified as your personal identity alone or in combination with other information, it is not your personal information in the legal sense. When your information can be identified as your personal identity alone or in combination with other information, these information will be treated and protected as your personal information in accordance with this policy during the combined use.
3. Exceptions to Authorized Consent
In accordance with relevant laws and regulations, the collection of your personal information does not require your authorization and consent in the following circumstances:
(1) related to national security and national defense security;
(2) It is related to public security, public health and major public interests;
(3) related to judicial or administrative law enforcement such as criminal investigation, prosecution, trial and execution;
(4) For the protection of your or other personal life, property and other major legitimate rights and interests, but it is difficult to obtain my consent;
(5) Personal information that you disclose to the public on your own;
(6) Collecting personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels;
(7) It is necessary to sign and perform relevant agreements or other written documents with you;
(8) It is necessary to maintain the safe and stable operation of the products and services provided, such as the detection and disposal of product and service failures;
(9) When it is necessary for an academic research institution to carry out statistics or academic research based on the public interest, and provide the results of academic research or description to the outside world, the personal information contained in the results is de-identified;
(10) Other circumstances stipulated by laws and regulations.
3. How to entrust the processing, sharing, transfer and disclosure of your personal information
1. Entrusted processing
When you use our products or services, some specific modules or functions are provided by external suppliers. For example, we engage service providers to assist us in providing customer support.We will sign strict confidentiality agreements with companies, organizations and individuals that we entrust to process personal information, requiring them to process personal information in accordance with our requirements,this privacy policy and any other relevant protection and security measures.
2. Share
HOTKam will only share your personal information if the following conditions are met. HOTKam will never share your personal information with third parties except under the following circumstances:
(1) you have expressly consented to it;
(2) Share your personal information with other HOTKam branches or authorized third parties;
(3)HOTKam may need to provide you with certain services through certain third-party partners, so HOTKam needs to share some of your personal information with authorized partners in order to enrich our services and meet your needs.These third-party partners include the following types: agents, suppliers of products and technical services, and other third parties.HOTKam strictly prohibits HOTKam affiliates or authorized third parties from using the shared information for other purposes;
(4) to share your personal information in accordance with the law;
(5) In accordance with the requirements of law, litigation, judicial or government agencies, HOTKam may provide your personal information. In the event that HOTKam is involved in a reorganization, merger or liquidation, your personal information may also be provided to counterparties.Third-party SDK service providers: our products may contain third-party SDKs or other similar applications. If you use such services provided by third parties on our platform, you agree that they will directly collect and process your information (e. G. In the form of embedded codes, plug-ins, etc.). For example, if you use Alipay or WeChat to pay,In order to enable you to complete the transaction and realize the transaction purpose, Alipay SDK or WeChat SDK needs to read your information. When you share the content to a third-party platform, such as microblog, QQ, WeChat, etc., the SDK may collect the information you provide. We may use the Youmeng SDK to count the activity of users in using products or services,Youmeng SDK may need to read your device information; We may use Baidu Map SDK to obtain location, and Baidu Map SDK may need to obtain your location information. The aforementioned service provider's collection and processing of information shall comply with its own privacy terms and shall not apply to this policy. In order to maximize the security of your information,We recommend that you review the privacy policies of any third-party SDK service before using it. In order to protect your legitimate rights and interests, if you find that there are risks in such SDKs or other similar applications, we recommend that you immediately terminate the relevant operations and contact us in a timely manner.See the appendix of this policy for specific SDK information.
3. Transfer
We will not transfer your personal information to any company, organization or individual, except in the following cases:
(1) Transfer with explicit consent: After obtaining your explicit consent, we will transfer your personal information to other parties;
(2) In the event of a merger, acquisition or bankruptcy liquidation, if the transfer of personal information is involved, we will require new companies and organizations that hold your personal information to continue to be bound by this policy and to seek your authorization and consent when changing the purpose of using personal information.
4. Public Disclosure
HOTKam will only disclose your personal information in the following circumstances:
(1) with your explicit consent;
(2) Public disclosure on legal or reasonable grounds: HOTKam may disclose your information publicly when required by law, legal process, litigation or government authorities.
5. Exceptions for obtaining prior authorized consent when sharing, transferring or publicly disclosing personal information
Please understand that in accordance with the applicable laws, regulations and national standards such as the Cybersecurity Law, the Information Security Technology Personal Information Security Specification, in the following circumstances, we do not need to obtain your authorization to share, transfer, and publicly disclose your personal information:
(1) related to HOTKam's performance of its obligations under laws and regulations;
(2) those directly related to national security and national defense security;
(3) Directly related to public security, public health, or major public interests;
(4) those directly related to criminal investigation, prosecution, trial and execution of judgment;
(5) In order to protect your or other personal life, property and other major legitimate rights and interests, but it is difficult to obtain my consent;
(6) Personal information that you disclose to the public on your own;
(7) Collecting personal information from legally publicly disclosed information, such as legitimate news reports, government information disclosure and other channels.
In addition, in accordance with the aforementioned regulations, if personal information that has been de-identified is provided to the outside world, and it is ensured that the data recipient cannot recover and re-identify the subject of personal information,there will be no need to notify you or obtain your consent.
IV. Your Rights
We will retain your personal information for as long as necessary to achieve the purposes described in this Policy, unless required or permitted by law to retain such information for a longer period.We guarantee that you exercise the following rights with respect to your personal information:
1. Access to your personal information
You have the right to access your personal information, except for exceptions provided by laws and regulations.
2. Correction of your personal information
When you find that there is an error in the personal information we process about you, you have the right to ask us to make a correction.You can apply for correction through the methods listed in "1. Access to your personal information.
3. Delete your personal information
You can request us to delete your personal information in the following situations:
(1) If our handling of personal information violates laws and regulations;
(2) If we collect and use your personal information without your consent;
(3) If our handling of personal information violates our agreement with you;
(4) If you no longer use our products and services, or you cancel your account;
(5) If we no longer provide you with products or services.
If we decide to respond to your deletion request, we will also notify the entity that obtained your personal information from us to delete it in a timely manner.Unless otherwise provided by law or regulation, or these entities are independently authorized by you.
4. Change the scope of authorized consent or withdraw authorization
You can change the scope of your authorization to continue to collect personal information or withdraw your authorization by deleting information, turning off a service or function, making privacy settings in the software,applying rights management, etc. You can also withdraw all authorization for us to continue to collect your personal information by canceling your account.Please understand that each business function requires some basic personal information to be completed. When you withdraw your consent or authorization, we cannot continue to provide you with the services corresponding to the withdrawal of consent or authorization, and we will no longer process your corresponding personal information. However, your decision to withdraw consent or authorization will not affect the previous processing of personal information based on your authorization.
5. Personal information subject cancels account
You can apply for cancellation of your account through customer service or through the "Personal Center-Security Center. When you cancel your account, you will no longer be able to log in or use our products or services with your account. You will no longer be able to log in and use the aforementioned services through this account. You understand and agree that we cannot assist you in restoring the aforementioned services.
If you decide to cancel your HOTKam ID after careful consideration, you can cancel your account on the page where you use our products or services.
6. Automatic decision-making of constraint information systems.
In some business functions, we may make decisions based solely on non-human automated decision-making mechanisms, including information systems, algorithms, etc. If these decisions significantly affect your legitimate rights and interests, you have the right to ask us for an explanation, and we will provide the appropriate way.
7. Respond to your above request
For your reasonable request, we do not charge a fee in principle, and respond to your request within the time limit prescribed by law (within fifteen working days). However, for repeated requests that exceed reasonable limits, we will charge a certain cost as appropriate. For those who are unnecessarily repetitive, require excessive technical means (e. G., need to develop new systems or fundamentally change current practices), pose a risk to the legitimate rights of others,or are very impractical (e. G,Requests involving information stored on backup tapes) may be rejected.
In the following cases, we will not be able to respond to your request:
(1) related to HOTKam's fulfillment of its obligations under laws and regulations;
(2) those directly related to national security and national defense security;
(3) Directly related to public security, public health, or major public interests;
(4) Those directly related to criminal investigation, prosecution, examination and approval or execution of judgments;
(5)HOTKam has sufficient evidence that you have subjective malice or abuse of rights;
(6) For the life, property and other major legitimate rights and interests of you or other individuals, but it is difficult to obtain my consent;
(7) Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations;
(8) Involving trade secrets.
V. How to protect your personal information
HOTKam takes all reasonable precautions, and we have used industry-standard security safeguards to protect the personal information you provide from unauthorized access, public disclosure, use, modification, damage or loss.
We have established special management systems, processes and organizations to ensure the security of information:
(1) Establish a strict data use and access system, adopt strict data access control and multi-identity authentication technology to protect personal information and avoid illegal use of data.We only allow authorized personnel to access personal information and require them to fulfill the corresponding confidentiality obligations.
(2) Take a special data and technical security audit, set up a log audit and behavior audit a number of measures.
At the same time, we will also take other security measures:
(1) Manage and regulate the storage and use of personal information through the establishment of a data classification and classification system, data security management practices, and data security development practices.
(2) Strengthen safety awareness. We also conduct security and privacy training courses to raise awareness of the importance of protecting personal information.
HOTKam will take all reasonably practicable steps to ensure that irrelevant personal information is not collected. We will only retain your personal information for as long as necessary to achieve the purposes described in this policy, unless an extended retention period is required or permitted by law.
We will store the personal information of users collected in China in accordance with laws and regulations. We will not transfer your personal information abroad unless there is a mandatory retention requirement by law.
During your use of products or services, we will continue to store your personal information for you. If you cancel your account or actively delete your personal information, we will continue to store your specific personal information for a period of time after you cancel your account or delete your personal information in accordance with the e-commerce law, network security law and other laws and regulations.The Internet environment is not 100% secure and we will do our best to ensure or guarantee the security of any information you send to us. If our physical, technical or management protection measures are damaged, resulting in unauthorized access, public disclosure, alteration, or destruction of information,resulting in damage to your legitimate rights and interests, we will bear the corresponding legal responsibility.In the unfortunate event of a personal information security incident, we will, in accordance with the requirements of laws and regulations, promptly inform you of the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, suggestions that you can independently prevent and reduce risks, remedial measures for you, and so on.We will promptly inform you of the event by mail, letter, telephone, push notification, etc,When it is difficult to inform the subject of personal information one by one, we will take a reasonable and effective way to issue an announcement.
How to handle personal information of minors
Our products and services are primarily intended for adults. If you are a minor under the legal age of majority, you should obtain the consent of your Guardian (your parent or legal guardian) before using our products and services. For the personal information of minors collected with the consent of the Guardian,we will only use or disclose it when the law permits,
The Guardian expressly agrees or is necessary for the protection of minors.If there are facts that prove that minors have registered to use our products and services without the consent of the Guardian, we will delete the relevant personal information as soon as possible.If The Guardian has reason to believe that the minor has submitted personal information to us without prior consent, please contact us as soon as possible to avoid unnecessary loss or influence.
How Your Personal Information Is Transferred Worldwide
Personal information collected and generated by us in the course of our operations in the People's Republic of China is stored in China, except in the following circumstances:
(1) Where there are clear provisions in laws and regulations;
(2) Your personal initiative such as cross-border transactions through the Internet.In view of the above, we will ensure that this privacy policy provides adequate protection for your personal information. In addition to the above circumstances, if you need to transfer your personal information across the border, we will obtain your authorization and consent separately.
8. Updates to this Privacy Policy
1. HOTKam may revise and update this policy from time to time.
2. We will not limit your rights under this policy without your express consent. For major changes, we will notify you in the form of push notifications, pop-ups, emails, etc.
3. Significant changes referred to in this policy include but are not limited:
(1) There have been significant changes in our service model. If the purpose, type and method of processing personal information changes;
(2) We have undergone significant changes in our ownership structure and organizational structure. Such as business adjustments, bankruptcy mergers and acquisitions,restructuring caused by changes in owners, etc;
(3) Changes in the main objects of user information entrusted to process, share, transfer or public disclosure;
(4) Significant changes in your rights and the way you exercise them when using our services;
(5) Our responsible department for handling personal information security, contact methods and complaint channels change;
(6) When the user information security impact assessment report indicates that there is a high risk
9 How to Contact Us
If you have any questions, comments, suggestions or complaints about our Privacy Policy and the processing of your personal information, please contact us through the following methods.Contact Email: app@vstarcam.com, under normal circumstances, we will reply to your request within 15 working days.
Third-party SDK partners and sharing information
In order to ensure the realization of the relevant functions of this product and the safe and stable operation of the application, we may access the software development kit (SDK) provided by a third party for relevant purposes. We will strictly monitor the software tool development kit (SDK) of the partner to obtain information to protect data security.We list the relevant third-party SDKs to be accessed in the directory. We recommend that you carefully read and understand the third-party privacy policies. Currently, the third-party SDK information accessed by this product is as follows:
Partner Type
Partner Name
Purpose of cooperation
Approaches to cooperation
Shared Personal Information Fields
Privacy Policy
Message Push Service Partner
Huawei Push Service
Provide Huawei device message push service
Embed a third-party SDK, and the SDK collects and transmits personal information
Unique Device Identification Code
https://consumer.huawei.com/cn/privacy/privacy-policy/
Data Storage Service Partner
Seven Cow Cloud
For third-party data storage services
Into a third-party SDK, the SDK collects and transmits personal information
Device MAC address, Unique Device Identification Code, user Avatar information
https://www.qiniu.com/privacy-right
SDK
io.flutter
Get pasteboard information
Embed a third-party SDK, and the SDK collects and transmits personal information
Device MAC address, Unique Device Identification Code, location information, application list
Data analysis service partner
[Bugly] platform
Provide professional exception reporting and operation statistics
Embed a third-party SDK, and the SDK collects and transmits personal information
Unique Device Identification Code
https://bugly.qq.com/v2/contract