发布/更新日期:2024年10月8日
生效日期:2024年10月8日
海雀科技隐私政策
引言
感谢您信任并使用海雀!保护用户的个人信息及隐私是海雀科技服务提供者(以下简称“我们”)的一项基本原则。为了向您和其他用户提供更好的服务,我们努力使用简明易懂的表述,希望通过本隐私政策(以下简称“本政策”)向您说明,我们如何收集、使用、存储、披露和处理这些信息,以及为保障您享有的相关权利我们为您提供的查询、更正、删除您个人信息的方式。同时,我们为您提供便利功能选项,在需要时按照本政策的指引,做出您认为适当的选择,管理您的个人信息。我们承诺不以欺诈、诱骗、误导的方式收集您的个人信息,仅收集必要的信息。
本政策适用于所有海雀科技产品及服务,包括通过海雀科技官方网站、海雀科技客户端软件、海雀科技通过自有品牌智能硬件提供的服务,以及被集成入第三方产品或软件的功能/服务(如公众号下的海雀科技服务)(以下统称“我们的产品与/或服务”)。海雀科技服务提供者为深圳市海雀科技有限公司,注册地址为“深圳市前海深港合作区前湾一路1号A栋201室(入驻深圳市前海商务秘书有限公司)”。
需特别说明的是,本政策不适用于由第三方公司或个人提供的服务(以下简称“第三方服务”)。为方便您使用海雀科技产品和/或服务,我们的产品和/或服务内可能含有第三方服务或其链接;鉴于第三方将独立地收集并处理您的个人信息,我们无法控制,因此,除非另有法律规定,我们对第三方服务不承担责任,您需自行阅读理解第三方服务的隐私政策,并独立判断是否使用其服务。
如果您有任何疑问、意见或建议,可以通过本政策第八节约定的方式与我们进行联系。
本政策将帮助您了解以下内容:
一、定义
二、我们如何收集、使用您的个人信息
三、我们如何共享、转让、公开披露您的个人信息
四、我们如何保护和存储您的个人信息
五、您的权利
六、我们如何处理未成年人的个人信息
七、我们如何使用Cookie和同类技术
八、联系我们
九、本政策如何更新
一、定义
1.个人信息:以电子或者其他方式记录的能够单独或者与其他信息结合识别特定自然人身份或者反映特定自然人活动情况的各种信息。
2.个人敏感信息:一旦泄露、非法提供或滥用可能危害人身和财产安全,极易导致个人名誉、身心健康受到损害或歧视性待遇的个人信息,包括身份证件号码、个人生物识别信息、银行账户、通信记录和内容、财产信息、征信信息、行踪轨迹、住宿信息、健康生理信息、交易信息、14岁以下(含)儿童信息的个人信息(为便于您在阅读时特别关注,我们将在本政策中对具体个人敏感信息以粗体进行显著标识)。
3.匿名化:通过对个人信息的技术处理,使得个人信息主体无法被识别或者关联,且处理后的信息不能被复原的过程。个人信息经匿名化处理后所得的信息不属于个人信息。
4.去标识化:通过对个人信息的技术处理,使其在不借助额外信息的情况下,无法识别或关联个人信息主体的过程。
5.SDK:软件开发工具包,是特定的软件包、软件框架、硬件平台、操作系统建立应用软件时的开发工具的集合。
6.未成年人:不满十八周岁的自然人为未成年人;十六周岁以上的未成年人,以自己的劳动收入为主要生活来源的,视为完全民事行为能力人。本释义出自于《中华人民共和国民法典》。
二、我们如何收集、使用您的个人信息
2.1 您须授权我们收集和使用您个人信息的情形
收集个人信息的目的在于向您提供产品和/或服务,并且保证我们遵守适用的相关法律、法规及其他规范性文件。您有权自行选择是否提供该信息,但多数情况下,如果您不提供,我们可能无法向您提供相应的服务,也无法回应您遇到的问题。这些信息包括:
(1)您提供给我们或上传的信息(包括您的联系方式):我们可能收集您提供给我们的任一或所有个人信息,例如电话号码、电子邮箱地址、海雀科技账号信息(例如海雀科技昵称、头像等),用于创建海雀科技账号、处理订单、提供海雀科技云服务、改善用户体验、发送通知、发送促销活动、去标识化后用于分析和商业化利用,还有您添加的联系人号码或发送的消息、反馈以及您主动提供给我们的任何其他信息,用于设备分享与分享功能的维护。
(2)设备相关信息:与您的海雀科技设备相关的信息:UUID(iOS设备)、MAC地址、Android
ID(Android设备)、海雀科技版本、设备制造商信息和型号名称和网络运营商。用于和设备(包括海雀智能摄像头、海雀智能门铃等产品)的音视频通信;根据手机网络变化和网络状态,进行音视频重连或展示无网络状态;用于发现附件的海雀智能设备(包括海雀智能摄像头和海雀智能门铃等);提供海雀云服务;提供推动服务。
(3)网络信息:包括您WLAN的SSID和BSSID,用于查看网络状态,申请连接已知的WLAN网络。
(4)位置信息(仅适用于特定服务/功能):与您的位置相关的各类信息。例如国家代码、城市代码、移动网络代码、经纬度信息和语言设置。能够提供相关位置的WLAN接入点等信息。用于为您提供海雀云服务、记录照片的位置信息、提供基于位置的服务。
(5)登录信息:与您使用某些功能、应用和网站相关的信息。例如cookie和其他匿名标识符技术、IP
地址、临时消息历史和标准系统日志等,用于分析趋势、管理网站、追踪用户的网站活动并收集关于整个用户群的人口统计信息。
(6)其他信息:环境特征值(ECV)(即从海雀科技账号、设备标识、连接的WLAN产生的信息和地理位置信息),用于验证用户身份、提供海雀科技云服务。
(7)第三方应用:拉起第三方应用所需的手机安装应用列表信息,用于判断是否安装特定App并进行相关跳转(如淘宝、京东、支付宝、微信、Paypal),淘宝、京东等购物类APP用于用户快捷跳转海雀科技智能产品购买页面,支付宝、微信、Paypal等支付类App用户支付App内消费项目,如云服务。
(8)我们还可能收集其他各类与个人没有关联的匿名信息。例如,在使用特定服务时,可能收集用户手机的设备型号和系统版本号。收集此类信息的目的在于改善我们向您提供的服务。所收集信息的类别和数量取决于您如何使用、加入或参与我们产品和/或服务。
(9)我们还可能收集您的手机唯一设备标识号。收集此类信息的目的在于改善我们向您提供的服务。
(10)应用和固件升级
为了使您持续享受最新的海雀科技服务,当您在海雀APP或合作伙伴的插件内查询应用及设备更新状态时,我们可能会使用您海雀科技应用或插件的版本信息、手机型号用于为您提供海雀科技应用或插件的升级服务。同时,我们可能收集您已连接的智能设备列表和版本号信息,用于为您提供智能设备的升级功能,以确保您可以使用最新版本的服务(包括固件版本)。
(11)日志信息
与您使用某些功能、应用和网站相关的信息。例如Cookie和其他标识符技术、互联网协议(IP)地址、网络请求信息、临时消息历史、标准系统日志、错误崩溃信息、使用服务产生的日志信息(如注册时间、访问时间、活动时间等)。
2.2 您可选择是否授权我们收集和使用您的个人信息的情形
为使您更好的享受海雀科技为您提供的智能设备的控制、管理等,我们的以下附加功能中可能会收集和使用您的个人信息。如果您不提供这些个人信息,您依然可以使用海雀科技的基础服务,但您可能无法使用这些可以为您所带来便利的附加功能。这些附加功能包括:
(1)智能设备共享
我们支持您将智能设备通过海雀科技账号,分享他人一起使用。经分享后,被分享者同样可以对智能设备进行控制。为了实现此功能,在您选择向他人共享特定设备时,我们可能收集
您的账号ID、您提供的分享账号
ID、被分享的设备信息(设备ID、设备名称、设备的分享状态)
,用于为您提供将设备分享给其他海雀科技账号的用户共同控制、使用的功能,以及用于设备列表页展示分享状态。
(2)人脸识别管理
如果您通过海雀科技平台连接了支持人脸识别功能的特定产品,您可以开启海雀科技支持的人脸识别功能以获得更丰富的智能设备体验。您可以在产品的“设置-人脸识别-人脸管理”中,手动删除人脸信息。并且,您可以在海雀科技应用或插件的“设置-人脸识别”中开关闭人脸识别功能。当您开启该功能时,我们可能会收集您主动上传的人脸数据用于识别,如果您对我们识别的结果有疑问,您可以和我们反馈以帮助我们优化算法和模型。在您向我们反馈问题时,我们可能会收集您主动提供的问题视频,请您放心,您反馈的视频仅会用于优化算法和模型,不会用于其他用途。
(3)安防设备录制视频
如果您通过海雀科技平台连接了带摄像头的智能设备,为了维护您的住所安全,在您添加设备并选择开启该功能后,当设备识别到有人移动时将自动录制视频,该视频将被加密,仅供您查看回放。请您放心,您的视频数据不会用于其他任何目的。您可以在扩展程序中的“设置-门口异动侦测”中控制录制视频的开关。
(4)摄像机云存功能
如果您在已通过海雀科技平台绑定的摄像机品类产品中开通了云存储会员服务,为支持您的会员相关权益,我们会收集您所购买的会员信息,包括会员类型、订单编号、支付时间、支付金额,以及剩余会员天数。
(5)用户反馈
如您在使用海雀APP过程中有疑问,您可以通过“我的-设置-问题反馈”向我们反馈问题,在您提交问题时,我们会收集您主动上传的反馈问题、填写的电话号码或邮箱、添加的图片或视频,以及提交的问题日志,这些信息将用于让我们更好地了解您遇到的问题,以及联系您。
(6)海雀科技售后服务
您可以在海雀Alcidae公众号中使用海雀科技售后服务功能,以对您的海雀科技账号绑定的设备使用“自助换修”、“进度查询”等服务。在您使用海雀科技服务相关功能时,我们会收集您的海雀科技账号、设备名称、SN、经加密的设备 ID 。
2.3 海雀科技权限调用说明
此外,在您使用海雀科技时可能会触发以下设备权限。为使您更好地管理您的信息,我们会在产品使用过程权限申请时同步告知您该权限的使用目的,以及如您不开启该权限可能对您使用服务的影响,请您仔细查阅。您在使用特定功能前,可选择是否授权开通以下权限。同时,您可以随时通过设备的权限设置页面或者海雀科技应用中“我的-设置-系统权限管理”页面更改授权情况。以下为相关功能及调用权限的细节,为您列举供参考:
(1)读写设备存储权限(Android、iOS
版本):用于海雀科技智能设备截图、录像、下载、导出等功能产生等文件的存储及查看、部分设备人脸识别功能的照片文件上传,用于头像设置功能照片文件上传;
(2)地理位置权限(Android、iOS
版本):用于连接设备时获取WLAN信息,以进行设备通信;
(3)相机权限(Android、iOS
版本):用于部分设备人脸识别功能拍照,用于扫一扫(扫码配网、扫码分享)功能、头像设置功能拍照上传;
(4)录音权限(Android、iOS
版本):用于海雀科技智能设备对讲功能;
(5)读取电话权限(Android
版本):用于在客户端在本地生成手机的设备标识符;
(6)开启 WLAN 权限(Android、iOS
版本):用于快连设备时,连接设备发出的 WLAN,以进行设备通信;
(7)悬浮窗权限(Android
版本):用于海雀科技设备悬浮窗播放功能;
(8)读取应用列表(Android、iOS
版本):用于云服务付费支付时判断是否安装特定App(微信、支付宝)并进行相关跳转,用于海雀启动页广告判断是否安装特定App并进行相关跳转(如淘宝、京东)。
2.4 您充分知晓,以下情形中,我们收集、使用个人信息无需征得您的同意:
(1)与个人信息控制者履行法律法规规定的义务相关的;
(2)与国家安全、国防安全直接相关的;
(3)与公共安全、公共卫生、重大公共利益直接相关的;
(4)与刑事侦查、起诉、审判和判决执行等直接相关的;
(5)出于维护个人信息主体或其他个人的生命、财产等重大合法权益但又很难得到本人授权同意的;
(6)所涉及的个人信息是个人信息主体自行向社会公众公开的;
(7)根据个人信息主体要求签订和履行合同所必需的;
(8)从合法公开披露的信息中收集个人信息的,如合法的新闻报道、政府信息公开等渠道;
(9)维护所提供产品或服务的安全稳定运行所必需的,如发现、处置产品或服务的故障;
(10)个人信息控制者为新闻单位,且其开展合法的新闻报道所必需的;
(11)个人信息控制者为学术研究机构,出于公共利益开展统计或学术研究所必要,且其对外提供学术研究或描述的结果时,对结果中所包含的个人信息进行去标识化处理的。
2.5非个人信息
我们还可能收集其他无法识别到特定个人的信息(即不属于个人信息的信息),例如:您使用特定服务时产生的统计类数据,如,用户的操作行为(包括点击、页面跳转、浏览时间)。收集此类信息的目的在于改善我们向您提供的服务。所收集信息的类别和数量取决于您如何使用我们产品和/或服务。我们会将此类信息汇总,用于帮助我们向客户提供更有用的信息,了解客户对我们网站、产品和服务中的哪些部分最感兴趣。就本隐私政策而言,汇总数据被视为非个人信息。如果我们将非个人信息与个人信息结合使用,则在结合使用期间,此类信息将被视为个人信息。
三、我们如何共享、转让、公开披露您的个人信息
(一)共享
我们不会与任何公司、组织和个人分享您的个人信息,但以下情况除外:
1.在获得您的明确同意后,我们会与其他方共享您的个人信息。
2.我们可能会根据法律法规规定,或按政府主管部门的强制性要求,共享您的个人信息。
3.与我们的关联公司和关联产品共享:为便于向您提供产品和/或服务,您的个人信息可能会与我们的关联公司共享。我们只会共享必要的个人信息,且受本政策中所声明目的的约束。我们会通过关联公司间法律文件、内部系统及员工权限隔离等保护您个人信息的安全。我们的关联方如要改变个人信息的处理目的,将再次征求您的授权同意。
4.与我们的合作伙伴共享:我们可能委托受信赖的合作伙伴来提供部分服务,因此我们可能会与合作伙伴共享您的某些个人信息。我们仅会出于为实现本隐私政策中声明的目的共享您的个人信息,并且只会共享提供服务所必要的个人信息。目前,我们的合作伙伴包括如下类型:供应商、服务提供商和其他合作伙伴。我们将信息发送给支持我们业务的供应商、服务提供商和其他合作伙伴,这些支持包括提供基础技术服务、提供咨询、分析等专业服务。被共享的合作伙伴可能有其独立的隐私政策或相关声明,我们建议您在做出相关授权前审慎查看,做出您认为适当的选择。
您应知悉,如果为了向您提供服务而需要将您的信息共享至上述第三方,我们将审慎评估该第三方收集信息的目的、合法性、数据安全能力等各方面因素,并通过本政策或相关补充声明向您明示共享的日期、目的、信息规模,以及第三方的基本情况等相关信息及后果。
若被共享的第三方违反法律法规要求或我们与第三方约定处理您的信息,我们将立即要求第三方停止相关行为,且自行采取或要求第三方采取有效补救措施控制或消除您的信息面临的安全风险;必要时我们也会解除与第三方合作,并要求第三方及时删除从我们处获得的您的个人信息。因共享您的个人信息发生安全事件对您的合法权益造成损害的,我们将按法律规定承担属于我们的责任。
为保障您使用本产品和服务的相关功能,我们会接入第三方提供的软件开发包(SDK),我们也将审慎评估该等SDK的使用目的。了解更多有关SDK处理个人信息的目的、方式及范围等信息,请点击
《第三方SDK列表》
(二)转让
我们不会将您的个人信息转让给任何公司、组织和个人,但以下情况除外:
1.在获取明确同意的情况下转让:获得您的明确同意后,我们会向其他方转让您的个人信息;
2.在涉及合并、收购或破产清算时,如涉及到个人信息转让,我们会告知您有关情况,并会要求新的持有您个人信息的公司、组织继续受本政策的约束,否则我们将要求该公司、组织重新向您征求授权同意。若我们遭遇破产清算,无其他公司、组织投资进入且作为您的信息接收人,我们将收到破产裁定文书之日起删除您的个人信息。
您应知悉,按上述的情况需要将您的信息转让至第三方,我们将审慎评估该第三方收集信息的目的、合法性、数据安全能力等各方面因素,并通过本政策或相关补充声明向您明示转让的日期、目的、信息规模,以及第三方的基本情况等相关信息及后果。
若接收转让的第三方违反法律法规要求或我们与第三方约定处理您的信息,我们将立即要求第三方停止相关行为,且自行采取或要求第三方采取有效补救措施控制或消除您的信息面临的安全风险;必要时我们解除与第三方合作(合并、收购或破产清算除外),并要求第三方及时删除从我们处获得的您的个人信息。因转让您的个人信息发生安全事件对您的合法权益造成损害的,我们将按法律规定承担属于我们的责任。
(三)公开披露
我们不会将您的个人信息公开披露,但以下情况除外:
1.获得您明确同意后;
2.基于法律的披露:在法律、法律程序、诉讼或政府主管部门强制性要求的情况下,我们可能会公开披露您的个人信息。
另外,根据相关法律法规及国家标准,以下情形中,我们可能会共享、转让、公开披露个人信息无需事先征得个人信息主体的授权同意:
1) 与国家安全、国防安全直接相关的;
2) 与公共安全、公共卫生、重大公共利益直接相关的;
3) 与犯罪侦查、起诉、审判和判决执行等直接相关的;
4)
出于维护个人信息主体或其他个人的生命、财产等重大合法权益但又很难得到本人同意的;
5) 个人信息主体自行向社会公众公开的个人信息
6)
从合法公开披露的信息中收集个人信息的,如合法的新闻报道、政府信息公开等渠道。
3.我们不会公开披露关于您的种族、民族、政治观点、宗教信仰等个人敏感信息的分析结果。
若我们违反上述规定,公开披露您的信息,一经发现,您有权按本政策提供的联系方式联系我们删除,我们经核实确认无误后立即停止公开披露,并发布通知要求相关接收方删除相应的信息。否则,给您的合作权益造成损害的,您有权按法律规定进行投诉或要求我们承担赔偿责任。
四、我们如何保护和存储您的个人信息
(一)个人信息的保护技术与措施
1.我们非常重视您的信息安全。我们努力采取各种合理的物理、电子和管理方面的安全措施来保护您的个人信息,防止个人信息遭到未经授权访问、公开披露、使用、修改、损坏或丢失。例如,我们会使用加密技术提高个人信息的安全性;我们会使用受信赖的保护机制防止个人信息遭到恶意攻击;我们会部署访问控制机制,尽力确保只有授权人员才可访问个人信息。
2.我们已经通过了以下关于信息安全和隐私保护的相关认证:信息安全等级保护三级认证、ISO
27001信息安全管理体系认证。
3.我们强烈建议您使用复杂密码,协助我们保证您的账号安全,我们将尽力保障您发送给我们的任何信息的安全性。请您理解并知悉,互联网并非绝对安全的环境。请您妥善保护自己的个人信息,仅在必要的情形下向他人提供或共享。如您发现自己的个人信息泄密,尤其是您的账号及密码发生泄露,请您立即联络我们的客服,以便我们协助您采取相应措施。
4.若发生个人信息泄露等安全事件,我们将按照法律法规的要求,及时向您告知:安全事件的基本情况和可能的影响、我们已采取或将要采取的处置措施、您可自主防范和降低风险的建议、对您的补救措施等。我们会及时将事件相关情况以邮件、信函、电话、推送通知等方式告知您,难以逐一告知个人信息主体时,我们会采取合理、有效的方式发布公告。同时,我们还将按照监管部门要求,主动上报个人信息安全事件的处置情况。
(二)个人信息的存储
1.信息存储的地点
我们会按照法律法规规定,在中华人民共和国境内运营中收集和产生的个人信息,将存储在中华人民共和国境内。
2.信息存储的期限
一般而言,我们只会在达成本隐私政策所述目的所需的最短期限内保留您的个人信息,除非法律有强制的存留要求,例如《中华人民共和国电子商务法》要求商品和服务信息、交易信息保存时间自交易完成之日起不少于三年。而我们判断前述期限的标准包括:
1)完成与您相关的交易目的、维护相应交易及业务记录、应对您可能的查询或投诉;
2)保证我们为您提供服务的安全和质量;
3)您是否同意更长的留存期间;
4)是否存在保留期限的其他特别约定。
在您的个人信息超出保留期间后,我们会根据适用法律的要求删除您的个人信息,或使其匿名化处理。
如果我们终止服务或运营,我们会至少提前三十日通过系统通知、发布公告或弹窗方式向您告知,并在终止服务或运营后对您的个人信息进行删除或匿名化处理,并在终止服务或运营后立即停止收集您的个人信息。
五、您的权利
按照中国相关的法律、法规、标准,在您使用我们的产品和/服务期间,您拥有访问、更正、删除您的个人信息,撤回对个人信息使用的同意及注销账号的权利,您可以参考下面的指引进行操作。
(一)访问、更正您的个人信息
若您要访问、修改以下信息,您可在进入海雀科技应用后点击相关功能按钮实现:
1.若要访问、修改您的头像、用户名等基本信息:
点击 “我的”,点击页面上方头像栏,进行数据的查看修改维护。
2.若要查看您设备的访问记录
点击设备→“设置”→访问记录进行查看;
3.若要访问您的设备信息:
点击“设备”→“设置”功能按钮,进行设备数据信息查看。
4.若您要更正、补充您的其他信息:
您发现您提交的其他信息不准确或不完整的,您可以按本政策提供的联系方式联系我们予以更正、补充。
(二)删除您的个人信息
在以下情形中,您可以向我们提出删除个人信息的请求:
1.如果我们处理个人信息的行为违反法律法规;
2.如果我们收集、使用您的个人信息,却未征得您的同意;
3.如果我们处理个人信息的行为违反了与您的约定;
4.如果您不再使用我们的产品或服务,或您注销了账号;
5.如果我们不再为您提供产品或服务。
您可以通过拨打热线电话提出你的删除请求,若我们决定响应您的删除请求,我们还将同时通知从我们获得您的个人信息的实体,要求其及时删除,除非法律法规另有规定,或这些实体获得您的独立授权。
当您的个人信息从我们的服务系统中删除或匿名化处理后,我们可能不会立即在备份系统中进行删除或匿名化处理,但会在备份更新时进行删除或匿名化处理。
(三)撤回同意
每个业务功能需要一些基本的个人信息才能得以完成。对于额外收集的个人信息的收集和使用,您可以随时给予或收回您的授权同意。
若您需要撤回权限的授权同意:您可进入海雀科技应用后点击“我的”→“设置”→“应用权限设置”。
当您收回同意后,我们将不再处理相应的个人信息。但您收回同意的决定,不会影响此前基于您的授权而开展的个人信息处理。
(四)注销账号
您随时可注销此前注册的账号,在注销账号之后,我们将停止为您提供产品或服务。若要注销您的账号功能,您可进入海雀科技应用后:
解绑自己绑定的所有设备,并点击“我的”→头像→“账号与安全”→“账号注销”的功能按钮,进行个人账号的注销功能,当您注销账号后,我们将在四个工作日内删除或匿名化处理您的个人信息。您有权在注销账号后三天内撤销注销。
(五)响应您的上述请求
若要进行建议及意见反馈,您可进入海雀科技应用后:
点击“我的”→“设置”→“问题反馈”按钮,对我们的服务进行意见反馈。
为保障安全,您可能需要提供书面请求,或以其他方式证明您的身份。我们可能会先要求您验证自己的身份,然后再处理您的请求。我们将在十五日内做出答复。
如海雀科技用户不幸逝世,您的合法继承人可为了自身的合法、正当利益,联系我们行使法律规定的上述个人信息权利。
六、我们如何处理未成年人的个人信息
我们非常重视对未成年人个人信息的保护。我们在向用户提供我们的产品或服务时不以年龄识别为前提,但我们的产品与/或服务性质要求您应当为具备完全民事行为能力的成年人。若您是18周岁以下的未成年人,请务必在使用本服务前,在父母或其他监护人监护、指导下共同仔细阅读本隐私政策,并在征得监护人同意的前提下使用本服务或提供个人信息。若您为实现与儿童互动,通过我们的产品与/或服务收集或向我们提交未成年人的个人信息的,请您务必确保已事先获得其法定监护人的授权同意。
如果父母或其他监护人有理由相信未成年人未经其事先同意而向我们提交了个人信息,请通过本政策第八节中的联系方式与我们联系,要求更正或删除涉及未成年人个人信息的内容。
如果我们发现自己在未事先获得可证实的父母或法定监护人同意的情况下收集了未成年人的个人信息,我们会尽快删除相关数据。
七、我们如何使用cookie和类似技术
1.在您使用我们的产品/服务时,我们可能会使用Cookie和同类技术收集您的一些个人信息,包括:您访问网站的习惯、您的浏览信息、您的登录信息,Cookie和同类技术收集该类信息是为了您使用我们的产品/服务的必要、简化您重复操作的步骤(如注册、登录)、便于您查看使用历史(如视频观看历史)、保护您的信息和账号安全性、提升我们的产品/服务等。
2.如果您拒绝我们使用Cookie及同类技术收集和使用您的相关信息,您可在浏览器具备该功能的前提下,通过您的浏览器的设置以管理、(部分/全部)拒绝Cookie与/或同类技术;或删除已经储存在您的计算机、移动设备或其他装置内的Cookie与/或同类技术,从而实现我们无法全部或部分追踪您的个人信息。您如需详细了解如何更改浏览器设置,请具体查看您使用的浏览器的相关设置页面。您理解并知悉:我们的某些产品/服务只能通过使用Cookie或同类技术才可得到实现,如您拒绝使用或删除,您可能将无法正常使用我们的相关产品/服务或无法通过我们的产品/服务获得最佳的服务体验,同时也可能会对您的信息保护和账号安全性造成一定的影响。
八、联系我们
如果您对本政策有任何疑问,需要我们释明,或您对本政策有任何的意见或建议、投诉,可通过以下方式与我们联系:
1.联系电话:400-800-4076;
2.邮件寄到如下地址:
深圳市南山区粤海街道学府63号荣超高新区联合总部大厦40F,
邮编:518075
一般情况下,我们将尽快审核所涉问题,并在验证您的用户身份后十五个工作日内予以回复。
如果您对收到的答复不满意,您可以投诉至网信、公安及工商等相关监管部门或诉至司法机关。如果您需要我们协助提供相关投诉渠道的信息,我们将尽力为您提供。
九、本政策如何更新
我们可能会适时地对本政策进行修订或变更。
未经您明确同意,我们不会削减您按照本政策所应享有的权利。我们会在本页面上发布对本政策所作的任何变更,您可以在海雀科技官网首页查看本政策,也可在海雀App通过“我的”→“关于”→“海雀科技隐私政策相关”中查看本政策。
您应当知悉,对于本政策重大变更,我们会以弹窗等形式通知您并重新取得您的同意。
本政策所指的重大变更包括但不限于:
1.我们的服务模式发生重大变化。如处理个人信息的目的、处理的个人信息种类、个人信息的处理方式等;
2.我们在所有权结构、组织架构等方面发生重大变化。如业务调整、破产并购等引起的所有者变更等;且变更后的所有者处理信息的目的、处理信息方式和处理的个人信息种类变更的;
3.个人信息共享、转让或公开披露的主要对象发生变化。如接收方变更处理目的、处理方式的。
4.您参与个人信息处理方面的权利及其形式方式发生变化;
5.我们负责处理个人信息安全的责任部门、联络方式及投诉渠道发生变化时;
6.个人信息安全影响评估报告表明存在高风险时。
我们鼓励您在每次使用海雀APP时都查阅我们的隐私政策。若您在本政策更新生效后继续使用本服务,即表示您已充分阅读、理解并接受更新后的政策并愿意接受更新后的政策约束。
Date of Release/Update: October 8, 2024
Effective Date: October 8, 2024
Alcidae Technology Privacy Policy
Introduction
Thank you for trusting and using Alcidae! Protecting users' personal
information and privacy is a fundamental principle of Alcidae
Technology Service Provider (hereinafter referred to as "we"). To
provide better services to you and other users, we have tried to make
this Privacy Policy ("Policy") clear and easy to understand, and we
want to explain how we collect, use, store, disclose, and process your
information, as well as the ways in which we provide you with access,
correction, and deletion of your personal information to safeguard
your related rights. Additionally, we offer convenient options for you
to manage your personal information by making appropriate choices as
guided by this Policy when necessary. We pledge not to collect your
personal information through fraud, deception, or misleading means and
only to collect necessary information.
This Policy applies to all Alcidae Technology products and services,
including those provided through the Alcidae Technology's official
website, Alcidae Technology's client software, services offered by
Alcidae Technology through its own branded smart hardware, as well as
features/services integrated into third-party products or software
(such as Alcidae Technology's services under public accounts)
(collectively referred to as "our products and/or services"). The
service provider of Alcidae Technology is Alcidae Technology Co.,
Ltd., with a registered address at "Room 201, Building A, No. 1
Qianwan Road, Qianhai Shenzhen-Hong Kong Cooperation Zone (hosted by
Shenzhen Qianhai Business Secretary Co., Ltd.)."
In particular, this Policy does not apply to services provided by
third-party companies or individuals (hereinafter referred to as
"third-party services"). To facilitate your use of Alcidae Technology
products and/or services, our products and/or services may contain
third-party services or links to them. Since third parties
independently collect and process your personal information, we have
no control over this process. Therefore, unless otherwise stipulated
by law, we do not assume responsibility for third-party services. It
is your responsibility to read and understand the privacy policies of
third-party services and independently decide whether to use their
services.
As this Policy is closely related to the products and/or services you
use, we hope you will carefully read and understand this Policy before
using our products and/or services, especially the clauses marked in
bold/underline/italic. By clicking the agreement option or using
Alcidae Technology products and/or services, you agree to our
collection, use, storage, disclosure, and processing of your relevant
personal information in accordance with this Policy.
If you have any questions, comments, or suggestions, you can contact
us through the methods outlined in Section 8 of this Policy.
This Policy will help you understand the following:
I. Definitions
II. How We Collect and Use Your Personal Information
III. How We Share, Transfer, and Publicly Disclose Your Personal
Information
IV. How We Protect and Store Your Personal Information
V. Your Rights
VI. How We Handle Personal Information of Minors
VII. How We Use Cookies and Similar Technologies
VIII. Contact Us
IX. How This Policy is Updated
I. Definitions
1.Personal Information: Various types of information recorded
electronically or by other means that can identify a specific natural
person individually or in combination with other information, or
reflect the activities of a specific natural person.
2.Sensitive Personal Information: Personal information that, once
disclosed, illegally provided, or abused, may endanger personal and
property safety, and is highly likely to lead to damage to personal
reputation, physical and mental health, or discriminatory treatment.
This includes personal information such as identity card numbers,
personal biometric information, bank account details, communication
records and content, financial information, credit information, travel
routes, accommodation information, health and physiological
information, transaction information, and information about children
under 14 years old (inclusive). (For your ease of reference, specific
sensitive personal information will be prominently identified in bold
in this policy.)
3.Anonymization: The technical processing of personal information that
makes it impossible to identify or associate with an individual, and
ensures that the processed information cannot be recovered.
Information obtained through anonymization of personal information
does not constitute personal information.
4.De-identification: The technical processing of personal information
to make it impossible to identify or associate with an individual
without the aid of additional information.
5.SDK: Software Development Kit,is a collection of development tools
for building application software based on specific software packages,
software frameworks, hardware platforms, or operating systems.
6.Minor: According to the Civil Code of the People's Republic of
China, a natural person under the age of 18 is considered a minor.
However, minors over the age of 16 who primarily rely on their own
labor income for their livelihood are deemed to have full civil
capacity.
II. How We Collect and Use Your Personal Information
2.1 Scenarios Where You Must Authorize Us to Collect and Use Your
Personal Information
The purpose of collecting personal information is to provide you with
products and/or services and to ensure that we comply with applicable
laws, regulations, and other normative documents. You have the right
to choose whether to provide this information, but in most cases, if
you do not provide it, we may not be able to provide you with
corresponding services or respond to your inquiries. This information
includes:
(1) Information You Provide or Upload to Us (Including Your Contact
Information): We may collect any or all of the personal information
you provide to us, such as phone numbers, email addresses, Alcidae
Technology account information (e.g., Alcidae Technology nickname,
avatar, etc.), for purposes including creating Alcidae Technology
accounts, processing orders, providing Alcidae Technology cloud
services, improving user experience, sending notifications, sending
promotional activities, analyzing and commercializing after
de-identification, and maintaining device sharing and sharing
functions with the contact numbers or messages you add, feedback, and
any other information you voluntarily provide to us.
(2) Device-Related Information: Information related to your Alcidae
Technology devices, including UUID (for iOS devices), MAC address,
Android ID (for Android devices), Alcidae Technology version, device
manufacturer information, model name and network operator. This is
used for audio and video communication with devices (including Alcidae
smart cameras, smart doorbells, etc.), reconnecting audio and video or
displaying no network status based on changes in mobile network and
network status, discovering nearby Alcidae smart devices, providing
Alcidae cloud services, and push notifications.
(3) Network Information: Including your WLAN's SSID and BSSID, used to
check network status and apply to connect to known WLAN networks.
(4) Location Information (Only Applicable to Specific
Services/Functions): Various types of information related to your
location, such as country code, city code, mobile network code,
latitude and longitude information, and language settings. This can
provide information such as WLAN access points in relevant locations,
used to provide Alcidae cloud services, record photo location
information, and provide location-based services.
(5) Login Information: Information related to your use of certain
features, apps, and websites, such as cookies and other anonymous
identifier technologies, IP addresses, temporary message histories,
and standard system logs, used for analyzing trends, managing
websites, tracking user activities on the website, and collecting
demographic information about the entire user group.
(6) Other Information: Environmental Characteristic Values (ECV),
derived from Alcidae Technology account information, device
identifiers, connected WLAN information, and geographical location
information, used for verifying user identity and providing Alcidae
Technology cloud services.
(7) Third-party Applications: The list of installed mobile
applications required to launch third-party applications is collected
to determine whether specific Apps are installed and perform relevant
redirects (sunch as Taobao, JD.com, Alipay, WeChat, Paypal). Shopping
Apps like Taobao and JD.com enable users to quickly jump to the
purchase pages of Alcidae Technology's smart products. Payment Apps
such as Alipay, WeChat, and Paypal allow users to pay for in-app
consumable items, like cloud services.
(8) We may also collect various types of anonymous information that
are not personally identifiable. For example, when using specific
services, we may collect your device model and system version number.
The purpose of collecting such information is to improve the services
we provide to you. The categories and amounts of information collected
depend on how you use, access, or participate in our products and/or
services.
(9) We may also collect your mobile device's unique identifier. The
purpose of collecting this information is to improve the services we
provide to you.
(10) Application and Firmware Updates
To ensure you continuously enjoy the latest Alcidae Technology
services, when you check for application and device update statuses
within the Alcidae App or partner plugins, we may use your Alcidae App
or plugin version information and device model to provide upgrade
services. Additionally, we may collect the list of connected smart
devices and their version numbers to provide upgrade functionality,
ensuring you can access the latest services (including firmware
versions).
(11) Log Information
Information related to your use of certain features, applications, and websites. For example, cookies and other identifier technologies, Internet Protocol (IP) addresses, network request information, temporary message histories, standard system logs, error and crash reports, and log information generated from using the services (such as registration time, access time, activity time, etc.).
2.2 Scenarios Where You Can Choose Whether to Authorize Us to Collect
and Use Your Personal Information
To enhance your experience with Alcidae Technology's smart device
control and management, we may collect and use your personal
information in the following additional functions. If you do not
provide these personal information, you can still use Alcidae
Technology's basic services, but you may not be able to access these
convenient additional functions. These functions include:
(1) Smart Device Sharing
We support sharing your smart devices with others through your Alcidae
Technology account. After sharing, the recipient can also control the
device. To accomplish this, when you choose to share a specific
device, we may collect your account ID, the shared account ID you
provide, and the device information (device ID, device name, sharing
status), to allow you to share control and usage with other Alcidae
Technology account users, as well as to display the sharing status on
the device list page.
(2) Facial Recognition Management
If you connect specific products supporting face recognition through
the Alcidae Technology platform, you can enable the face recognition
function for a richer smart device experience. You can manually delete
face information in the product's "Settings - Face Recognition - Face
Management." You can also turn face recognition on or off in the
"Settings - Face Recognition" section of the Alcidae App or plugin.
When you enable this function, we may collect the face data you
actively upload for recognition. If you have questions about our
recognition results, you can provide feedback to help us optimize
algorithms and models. When you submit feedback, we may collect the
problematic video you provide voluntarily. Rest assured that your
feedback videos will only be used to optimize algorithms and models
and not for other purposes.
(3) Security Device Video Recording
If you connect a camera-equipped smart device through the Alcidae
Technology platform, to maintain the security of your residence, after
adding the device and enabling this function, the device will
automatically record videos when it detects motion. These videos will
be encrypted and only accessible for you to view and replay. Rest
assured that your video data will not be used for any other purpose.
You can control the video recording switch in the extension's
"Settings - Motion Detection at Entrance."
(4) Camera Cloud Storage Function
If you have subscribed to the cloud storage membership service for
camera products bound to the Alcidae Technology platform, to support
your membership benefits, we will collect your purchased membership
information, including membership type, order number, payment time,
payment amount, and remaining membership days.
(5) User Feedback
If you have questions while using the Alcidae App, you can provide
feedback through "My - Settings - Feedback." When submitting your
issue, we will collect the feedback you actively upload, the phone
number or email you fill in, attached images or videos, and submitted
problem logs. This information will be used to better understand your
issues and contact you.
(6) After-sales service of Alcidae Tech
You can use the after-sales service function of Alcidae in the Alcidae
official account to use services such as "self-service replacement and
repair" and "progress inquiry" for the devices bound to your Alcidae
Tech account. When you use the related functions of Alcidae Tech
services, we will collect your Alcidae Tech account, device name, SN,
and encrypted device ID.
2.3 Alcidae Technology Permission Invocation Instructions
In addition, the following device permissions may be triggered when
you use Alcidae Technology. To better manage your information, we will
inform you of the purpose of using these permissions and the potential
impact on your service usage if you do not grant them during the
product usage permission request process. Please review them
carefully. Before using specific features, you can choose whether to
authorize the following permissions. Additionally, you can change your
authorization settings at any time through the device's permission
settings page or the "My-Settings-System Permission Management" page
in the Alcidae Technology app. Below are the details of relevant
functions and invoked permissions for your reference:
(1) Read and Write Device Storage Permissions (Android, iOS): Used for
storing and viewing files generated by Alcidae Technology smart device
screenshots, recordings, downloads, exports, etc., as well as
uploading photo files for facial recognition and avatar setup
functions.
(2) Location Permissions (Android, iOS): Used to obtain WLAN
information when connecting to devices for device communication.
(3) Camera Permissions (Android, iOS): Used for taking photos for
facial recognition on some devices, scanning QR codes (for network
configuration and sharing), and uploading photos for avatar setup.
(4) Recording Permissions (Android, iOS): Used for the intercom
function of Alcidae Technology smart devices.
(5) Read Phone Permissions (Android Only): Used to generate a device
identifier for the phone locally within the client.
(6) Enable WLAN Permissions (Android, iOS): Used to connect to the
WLAN emitted by devices during quick connection for device
communication.
(7) Floating Window Permissions (Android Only): Used for the floating
window playback function of Alcidae Technology devices.
(8) Read App List Permissions (Android, iOS): Used to determine if
specific apps (WeChat, Alipay) are installed during cloud service
payment for redirection, and to determine if specific apps (e.g.,
Taobao, JD.com) are installed for relevant redirection in Alcidae's
splash screen ads.
2.4 You are fully understand that your consent is not required for us
to collect and use personal information in the following situations:
(1) Related to fulfilling obligations stipulated by laws and
regulations by personal information controllers.
(2) Directly related to national security and national defense
security.
(3) Directly related to public safety, public health, and significant
public interests.
(4) Directly related to criminal investigation, prosecution, trial,
and execution of judgments.
(5) Necessary for safeguarding the vital legitimate rights and
interests of the personal information subject or other individuals,
but difficult to obtain authorization or consent from the individual.
(6) The personal information involved is publicly disclosed by the
personal information subject.
(7) Necessary for signing and fulfilling contracts upon the request of
the personal information subject.
(8) Collecting personal information from legally disclosed
information, such as legitimate news reports and government
information disclosure.
(9) Necessary for maintaining the secure and stable operation of
provided products or services, such as detecting and handling product
or service failures.
(10) The personal information controller is a news organization, and
the collection is necessary for carrying out legitimate news
reporting.
(11) The personal information controller is an academic research
institution, and the collection is necessary for statistical or
academic research in the public interest. When providing research
results or descriptions externally, the personal information contained
in the results is de-identified.
2.5 Non-Personal Information
We may also collect information that cannot identify specific
individuals (i.e., information that does not constitute personal
information), such as statistical data generated during your use of
specific services, including user behavior (clicks, page jumps,
browsing time). The purpose of collecting such information is to
improve the services we provide to you. The categories and quantities
of information collected depend on how you use our products and/or
services. We aggregate this information to help us provide more useful
information to our customers and understand which parts of our
website, products, and services are most interesting to them. For the
purpose of this privacy policy, aggregated data is considered
non-personal information. If we combine non-personal information with
personal information, such information will be treated as personal
information during the combination.
III. How We Share, Transfer, and Publicly Disclose Your Personal
Information
(A) Sharing
We do not share your personal information with any company,
organization, or individual, except in the following circumstances:
1.With your explicit consent, we will share your personal information
with other parties.
2.We may share your personal information in accordance with laws and
regulations, or mandatory requirements of government authorities.
3.Sharing with our affiliated companies and related products: To
facilitate the provision of products and/or services to you, your
personal information may be shared with our affiliated companies. We
will only share necessary personal information and be bound by the
purposes stated in this policy. We protect the security of your
personal information through legal documents between affiliated
companies, internal systems, and employee access controls. If our
affiliates need to change the purpose of processing your personal
information, we will seek your authorization and consent again.
4.Sharing with our partners: We may entrust trusted partners to
provide some services, so we may share certain personal information
with them. We will only share your personal information for the
purposes stated in this privacy policy and only to the extent
necessary to provide the services. Currently, our partners include
suppliers, service providers, and other partners. We send information
to suppliers, service providers, and other partners who support our
business, including those providing basic technical services,
consulting, analytics, and other professional services. The partners
we share with may have their own independent privacy policies or
related statements. We recommend that you carefully review them before
making any authorizations and make the choices you deem appropriate.
You should be aware that if it is necessary to share your information
with the above-mentioned third parties to provide services to you, we
will carefully evaluate various factors such as the purpose, legality,
and data security capabilities of the third party's information
collection, and will clearly indicate to you through this policy or
related supplementary statements the date, purpose, scale of
information, and basic information about the third party, as well as
the consequences.
If the third party that receives the shared information violates legal
and regulatory requirements or our agreement with them regarding the
handling of your information, we will immediately require them to stop
the relevant actions and take or require them to take effective
remedial measures to control or eliminate the security risks to your
information. If necessary, we will terminate our cooperation with the
third party and require them to promptly delete your personal
information obtained from us. If a security incident occurs due to the
sharing of your personal information and causes damage to your
legitimate rights and interests, we will bear our responsibilities in
accordance with the law.
To ensure your use of the related functions of our products and
services, we will integrate software development kits (SDKs) provided
by third parties, and we will carefully evaluate the purpose of using
such SDKs. To learn more about the purposes, methods, and scope of
SDKs' processing of personal information, please click on the
"Third-Party SDK List."
(B) Transfer
We will not transfer your personal information to any company,
organization, or individual, except in the following circumstances:
1.Transfer with explicit consent: After obtaining your explicit
consent, we will transfer your personal information to other parties.
2.In the case of mergers, acquisitions, or bankruptcy liquidation
involving the transfer of personal information, we will inform you of
the situation and require the new company or organization holding your
personal information to continue to be bound by this policy.
Otherwise, we will require them to re-solicit your authorization and
consent. If we encounter bankruptcy liquidation and there is no other
company or organization investing and acting as the recipient of your
information, we will delete your personal information from the date of
receipt of the bankruptcy ruling document.
You should be aware that if it is necessary to transfer your
information to a third party under the above circumstances, we will
carefully evaluate various factors such as the purpose, legality, and
data security capabilities of the third party's information
collection, and will clearly indicate to you through this policy or
related supplementary statements the date, purpose, scale of
information, and basic information about the third party, as well as
the consequences.
If the third party that receives the transferred information violates
legal and regulatory requirements or our agreement with them regarding
the handling of your information, we will immediately require them to
stop the relevant actions and take or require them to take effective
remedial measures to control or eliminate the security risks to your
information. If necessary, we will terminate our cooperation with the
third party (except for mergers, acquisitions, or bankruptcy
liquidation) and require them to promptly delete your personal
information obtained from us. If a security incident occurs due to the
transfer of your personal information and causes damage to your
legitimate rights and interests, we will bear our responsibilities in
accordance with the law.
(C) Public Disclosure
We will not publicly disclose your personal information, except in the
following circumstances:
1.After obtaining your explicit consent;
2.Disclosure based on law:We may publicly disclose your personal
information in accordance with legal requirements, legal procedures,
litigation, or mandatory requirements from government authorities.
Furthermore, in accordance with relevant laws, regulations, and
national standards, we may share, transfer, or publicly disclose
personal information without prior authorization or consent from the
data subject in the following situations:
1) Directly related to national security and national defense
security;
2) Directly related to public safety, public health, or significant
public interests;
3) Directly related to criminal investigation, prosecution, trial, and
execution of judgments;
4) Necessary to safeguard the vital legitimate rights and interests of
the data subject or other individuals, such as life and property, yet
difficult to obtain consent from the individual;
5) Personal information voluntarily disclosed by the data subject to
the public;
6) Collecting personal information from legally publicly disclosed
sources, such as legitimate news reports, government information
disclosure, etc.
3.We will not publicly disclose the analysis results of your personal
sensitive information, including race, ethnicity, political views,
religious beliefs, etc.
If we violate the above provisions and publicly disclose your
information, upon discovery, you have the right to contact us using
the contact information provided in this policy to request deletion.
Upon verification, we will immediately cease public disclosure and
issue a notice requiring relevant recipients to delete the
corresponding information. Otherwise, if your cooperation rights and
interests are harmed, you have the right to lodge a complaint in
accordance with the law or demand that we assume liability for
compensation.
IV. How We Protect and Store Your Personal Information
(I) Protection Technologies and Measures for Personal Information
1.We attach great importance to your information security. We strive
to adopt various reasonable physical, electronic, and managerial
security measures to protect your personal information from
unauthorized access, public disclosure, use, modification, damage, or
loss. For instance, we use encryption technology to enhance the
security of personal information; we employ trusted protection
mechanisms to prevent malicious attacks on personal information; and
we deploy access control mechanisms to ensure that only authorized
personnel can access personal information.
2.We have obtained the following certifications related to information
security and privacy protection: Class III Information Security Level
Protection Certification and ISO 27001 Information Security Management
System Certification.
3.We strongly recommend that you use complex passwords to help us
ensure the security of your account. We will endeavor to safeguard the
security of any information you send us. Please understand and be
aware that the internet is not an absolutely secure environment.
Please protect your personal information properly and only provide or
share it with others when necessary. If you discover that your
personal information has been compromised, especially if your account
and password have been leaked, please immediately contact our customer
service so that we can assist you in taking appropriate measures.
4.In the event of a security incident such as a personal information
leak, we will promptly notify you in accordance with legal and
regulatory requirements, including the basic situation and potential
impact of the security incident, the measures we have taken or will
take to address it, suggestions for you to prevent and mitigate risks
independently, and remedial measures for you. We will promptly inform
you of the incident-related information via email, letter, phone, push
notifications, etc. When it is difficult to notify individual data
subjects one by one, we will issue a reasonable and effective public
announcement. Meanwhile, we will also proactively report the handling
of personal information security incidents to regulatory authorities
as required.
(II) Storage of Personal Information
1.Location of Information Storage
In accordance with laws and regulations, personal information
collected and generated during our operations within the territory of
the People's Republic of China will be stored within the territory of
the People's Republic of China.
2.Duration of Information Storage
In general, we will only retain your personal information for the
minimum period necessary to achieve the purposes outlined in this
Privacy Policy, unless there are mandatory retention requirements
imposed by law, such as the "E-Commerce Law of the People's Republic
of China" requiring the preservation of product and service
information, as well as transaction information, for no less than
three years from the date of transaction completion. Our criteria for
determining the aforementioned duration include:
1.Completing transaction-related purposes with you, maintaining
corresponding transaction and business records, and responding to
potential inquiries or complaints from you;
2.Ensuring the security and quality of services we provide to you;
3.Whether you agree to a longer retention period;
4.Whether there are any other special agreements regarding the
retention period.
After your personal information exceeds the retention period, we will
delete it or anonymize it in accordance with applicable laws.
In the event that we terminate our services or operations, we will
notify you at least thirty days in advance through system
notifications, announcements, or pop-up windows, and will delete or
anonymize your personal information after termination. Furthermore, we
will immediately cease collecting your personal information upon
termination.
V. Your Rights
Pursuant to relevant Chinese laws, regulations, and standards, during
your use of our products and/or services, you have the rights to
access, correct, delete your personal information, withdraw consent
for its use, and cancel your account. You can follow the guidelines
below to exercise these rights.
(I) Accessing and Correcting Your Personal Information
To access or modify the following information, you can click on the
relevant function buttons after entering the Alcidae Technology app:
1.To access or modify your basic information such as profile picture
and username: Click "My" and then click on the profile picture section
at the top of the page to view, modify, and maintain your data.
2.To view your device access records:
Click "Devices" → "Settings" → "Access Records" to view them.
3.To access your device information:
Click "Devices" → "Settings" function button to view device data
information.
4.To correct or supplement other information:
If you find that other information you submitted is inaccurate or
incomplete, you can contact us using the contact information provided
in this policy to make corrections or additions.
(II) Deleting Your Personal Information
You may request the deletion of your personal information in the
following situations:
1.If our handling of personal information violates laws and
regulations;
2.If we collect or use your personal information without your consent;
3.If our handling of personal information violates agreements with
you;
4.If you no longer use our products or services, or if you cancel your
account;
5.If we no longer provide products or services to you.
You can make a deletion request by calling our hotline. If we decide
to respond to your deletion request, we will also notify entities that
have obtained your personal information from us and request their
timely deletion, unless otherwise stipulated by laws and regulations
or these entities have obtained your independent authorization.
When your personal information is deleted or anonymized from our
service system, it may not be immediately deleted or anonymized in our
backup systems, but will be deleted or anonymized during backup
updates.
(III) Withdrawal of Consent
Each business function requires some basic personal information to
complete. For the collection and use of additional personal
information, you can grant or withdraw your authorization consent at
any time.
If you need to withdraw your consent for permissions: you can enter
the Alcidae Technology app and click "My" → "Settings" → "App
Permissions Settings".
Once you withdraw your consent, we will no longer process the
corresponding personal information. However, your decision to withdraw
consent will not affect the processing of personal information
previously conducted based on your authorization.
(IV) Account Cancellation
You can cancel your previously registered account at any time. After
cancelling your account, we will stop providing you with products or
services. To cancel your account, you can enter the Alcidae Technology
app and:
Unbind all devices linked to your account, and click "My" → Profile →
"Account & Security" → "Account Cancellation" button to cancel your
personal account. After account cancellation, we will delete or
anonymize your personal information within four working days. You have
the right to revoke the cancellation within three days after account
cancellation.
(V) Responding to Your Above Requests
To provide suggestions and feedback, you can enter the Alcidae
Technology app and: Click "My" → "Settings" → "Feedback" button to
give feedback on our services.
For security purposes, you may need to provide a written request or
otherwise verify your identity. We may first require you to
authenticate yourself before processing your request. We will respond
within 15 days.
In the unfortunate event of a Alcidae Technology user's demise, their
legal heirs may contact us to exercise the above-mentioned personal
information rights as stipulated by law for their legitimate and just
interests.
VI. How We Handle Minors' Personal Information
We attach great importance to the protection of minors' personal
information. Our products or services are not age-gated when offered
to users, but the nature of our products and/or services requires you
to be a fully capable adult. If you are a minor under 18 years old,
please carefully read this Privacy Policy with your parent or guardian
before using our services, and use the services or provide personal
information only with the consent of your guardian. If you collect or
submit minors' personal information through our products and/or
services for the purpose of interacting with children, please ensure
you have obtained prior authorization from their legal guardians.
If parents or other guardians have reason to believe that minors have
submitted personal information to us without their prior consent,
please contact us through the contact information in Section VIII of
this policy to request correction or deletion of the minors' personal
information.
If we discover that we have collected minors' personal information
without prior verifiable consent from their parents or legal
guardians, we will promptly delete the relevant data.
VII. How We Use Cookies and Similar Technologies
1.When you use our products/services, we may use cookies and similar
technologies to collect some of your personal information, including
your website visiting habits, browsing information, login information,
etc. The collection of such information through cookies and similar
technologies is necessary for you to use our products/services,
simplifies repetitive operations (such as registration and login),
facilitates the viewing of usage history (e.g., video viewing
history), protects your information and account
security, and enhances our products/services.
2.If you refuse our use of cookies and similar technologies to collect
and use your relevant information, you can manage, partially/fully
reject cookies and/or similar technologies through your browser
settings, provided that your browser supports this function.
Alternatively, you can delete cookies and/or similar technologies
already stored on your computer, mobile device, or other devices,
thereby preventing us from tracking your personal information fully or
partially. For detailed instructions on how to change your browser
settings, please refer to the relevant settings page of your browser.
You understand and acknowledge that some of our products/services can
only be realized through the use of cookies or similar technologies.
If you refuse to use or delete them, you may not be able to use our
related products/services normally or obtain the best service
experience through our products/services, and it may also affect the
protection of your information and account security.
VIII. Contact Us
If you have any questions about this policy, require clarification, or
have any comments, suggestions, or complaints, you can contact us
through the following methods:
1. Contact Phone: 400-800-4076;
2. Mail to the following address:
40F, Rongchao High-tech Zone United Headquarters Building, No. 63
Xuefu Road, Yuehai Street, Nanshan District, Shenzhen, Postal Code:
518075
In general, we will review the issues involved as soon as possible and
respond within 15 working days after verifying your user identity.
If you are dissatisfied with the response received, you can file a
complaint with relevant regulatory authorities such as the Cyberspace
Administration, Public Security, and Industry and Commerce, or file a
lawsuit with judicial authorities. If you need our assistance in
providing information about relevant complaint channels, we will try
our best to provide it for you.
IX. How This Policy is Updated
We may revise or change this policy from time to time.
Without your explicit consent, we will not diminish your rights under
this policy. We will publish any changes to this policy on this page.
You can view this policy on the homepage of Alcidae Technology's
official website or in the Alcidae App by clicking "My" → "About" →
"Alcidae Technology Privacy Policy Related".
You should be aware that for significant changes to this policy, we
will notify you through pop-ups or other forms and re-obtain your
consent.
Significant changes referred to in this policy include but are not
limited to:
1.Significant changes to our service model, such as the purpose of
processing personal information, the types of personal information
processed, and the methods of processing personal information;
2.Significant changes in our ownership structure, organizational
structure, etc., such as ownership changes caused by business
adjustments, bankruptcies, mergers, and acquisitions, and changes in
the purpose, methods, and types of personal information processed by
the new owner;
3.Changes in the main objects of personal information sharing,
transfer, or public disclosure, such as changes in the recipient's
processing purpose and methods;
4.Changes in your rights and the forms of exercising them in personal
information processing;
5.Changes in the responsible department, contact information, and
complaint channels for handling personal information security;
6.When the personal information security impact assessment report
indicates a high risk.
We encourage you to review our privacy policy every time you use the
Alcidae App. By continuing to use our services after the updated
policy takes effect, you acknowledge that you have fully read,
understood, and accepted the updated policy and are willing to be
bound by it.