Guangzhou Yunxin Information Technology Co., Ltd. (hereinafter referred to as "we") is well aware of the importance of personal information to you, and will do its utmost to protect your personal information security and reliability. We are committed to maintaining your trust in us, abiding by the following principles and protecting your personal information: the principle of unanimity of power and responsibility, the principle of clear purpose, the principle of choice and consent, the principle of minimum utility, the principle of ensuring security, the principle of participation in the main body, the principle of openness and transparency. At the same time, we promise that we will take appropriate security measures to protect your personal information in accordance with the industry's mature security standards.
How do we collect and use your personal information?
Personal information refers to all kinds of information recorded electronically or otherwise that can identify a particular natural person or reflect the activities of a particular natural person individually or in combination with other information.
We will collect and use your personal information only for the purposes stated in this policy:
(A):provide family travel safety protection services for you, such as real-time location, footprints and SOS.
1, business function 1: register as an app user.
To complete the account creation, you need to provide the following information: your name, e-mail address, created username and password.
During the registration process, if you provide the following additional information, it will help us to provide you with better service and experience: mobile phone number. However, if you do not provide this information, you will not affect the basic functions of using this service.
2, business function two: continuous location function.
Based on the need to protect your travel safety and that of your family, our APP needs to be constantly positioned through the mobile phone so that you and your family know the current real-time location.
These location information data will be strictly encrypted and protected on the back-end server, while restricting the use of any unauthorized personnel.
3, business function three: Micro chat.
Based on the convenience of communication between APPs or between APPs and intelligent hardware, APP strictly encrypts and protects chat messages (voice), and strictly restricts the use of unauthorized personnel.
At the same time, the micro chat information data will not be retained on the background server after the receiving party receives it.
(B): Develop internal data analysis and research, third-party SDK statistical services, and improve our products or services
We collect data based on your interactions with us and the choices you make, including your privacy settings and the products and functions you use. The data we collected may include SDK/API/JS code versions, browsers, Internet service providers, IP addresses, platforms, timestamps, application identifiers, application versions, application distribution channels, stand-alone device identifiers, iOS advertisement identifiers (IDFAs), Android advertiser identifiers, network card (MAC) addresses, International Mobile Device Identification Code (IMEI), device model, terminal manufacturer, operating system version of terminal device, session start/stop time, language location, time zone and network status (WiFi, etc.) and battery usage.
When we want to use the information for other purposes that are not specified in this strategy, we will ask your permission beforehand.
When we want to use information gathered for specific purposes for other purposes, we will ask your permission in advance.
How do we use Cookie and similar technologies?
To ensure that the system backend works properly, we will store a small data file called Cookie on your computer or mobile device. Cookie usually contains identifiers, site names, and numbers and characters. With Cookie, APP can store data in your preferences or merchandise in a shopping basket.
We will not use Cookie for any purpose other than those stated in this policy. You can manage or delete Cookie according to your preferences. You can clear all cookies that are saved on your computer, and most Web browsers have the ability to block cookies. But if you do, you need to change the user settings in person whenever you visit our website. For more information on how to change browser settings, visit the following links: < Internet Explorer >, < Google Chrome >, < Mozilla Firefox >, < Safari > and < Opera >.
(2) website beacon and pixel labels
In addition to Cookie, we will use web site beacons and pixel labels and other similar technologies on the website. For example, the e-mail we sent to you may contain clicking URL linked to the content of our website. If you click on this link, we will track this click to help us understand your product or service preferences and improve customer service. Web beacon is usually a transparent image embedded into a website or e-mail. With the help of pixel labels in e-mail, we can learn whether or not e-mail is being opened. If you don't want your activities to be tracked in this way, you can always unsubscribe from our mailing list.
Many Web browsers have a Do Not Track feature that publishes Do Not Track requests to the Web site. At present, the major Internet standards organizations have not set up relevant policies to specify how websites should respond to such requests. But if your browser has Do Not Track enabled, then all our websites will respect your choice.
How do we share, transfer and disclose your personal information publicly?
We do not share your personal information with any other company, organization or individual except the following:
We will not transfer your personal information to any company, organization or individual, except in the following circumstances:
(3) public disclosure
We will disclose your personal information only in the following circumstances:
1, get your clear consent;
How do we protect your personal information?
(1) We have used industry-standard security measures to protect your personal information from unauthorized access, public disclosure, use, modification, damage or loss. We will take all reasonable and feasible measures to protect your personal information. For example, SSL encryption protects your browser from exchanging data (such as credit card information) with "services"; we also provide secure HTTPS browsing of our website; we use encryption technology to ensure data confidentiality; we use trusted protection mechanisms to prevent malicious attacks on data; We will deploy access control mechanisms to ensure that only authorized personnel have access to personal information, and we will conduct security and privacy training courses to enhance staff awareness of the importance of protecting personal information.
(2) we will take all reasonable and feasible measures to ensure that no personal information is collected. We will only retain your personal information within the period of time required to achieve the objectives stated in this policy, unless extended or permitted by law.
(3) The Internet is not an absolutely secure environment, and email, instant messaging, and other forms of communication with our users are not encrypted. We strongly recommend that you do not send personal information in this way. Please use complex passwords to help us ensure your account is secure.
(4) The Internet environment is not 100% secure. We will try our best to ensure or guarantee the security of any information you send us. If our physical, technical, or managerial protection facilities are damaged, resulting in unauthorized access to information, public disclosure, tampering, or destruction, resulting in damage to your legitimate rights and interests, we will assume the corresponding legal responsibility.
(5) After the unfortunate occurrence of personal information security incidents, we will inform you in time, in accordance with the requirements of laws and regulations, of the basic conditions and possible impacts of security incidents, the measures we have taken or will take to deal with them, the suggestions that you can prevent and reduce the risks on your own, and the remedial measures for you. We will promptly notify you of the relevant events by mail, letter, telephone, push notification, etc. When it is difficult to inform the subject of personal information one by one, we will adopt a reasonable and effective way to publish the announcement.
At the same time, we will also take the initiative to report the handling of personal information security incidents in accordance with regulatory requirements.
In accordance with the relevant laws, regulations, standards and practices of other countries and regions in China, we guarantee that you exercise the following rights to your personal information:
(1) visit your personal information.
You have the right to access your personal information except for exceptions provided for by laws and regulations. If you want to exercise data access, you can access it yourself in the following ways:
Account Information - If you want to access or edit personal data and payment information in your account, change your password, add security information, or close your account, you can do this by accessing APP.
As long as we don't need too much input, we will provide you with other personal information that you generate during the use of our products or services. If you want to exercise data access, please send e-mail to firstname.lastname@example.org.
(2) correct your personal information.
You have the right to ask us to make corrections when you find that there are errors in our personal information about you. You can apply for correction by way of "(I) visit your personal information".
If you can't correct these personal information through the above links, you can contact with our Web form at any time, or send an e-mail to email@example.com. We will reply to your request within 30 days.
(3) delete your personal information.
In the following circumstances, you can ask us for a request to delete personal information:
1, if we deal with personal information violations of laws and regulations;
2, if we collect and use your personal information, we have not obtained your consent.
3, if we deal with personal information violations of your agreement.
4, if you no longer use our products or services, or you write off your account number.
5, if we no longer provide you with products or services.
If we decide to respond to your request for deletion, we will also notify entities that have obtained your personal information from us to delete it in a timely manner, unless the laws and regulations provide otherwise or these entities are authorized independently by you.
When you delete information from our service, we may not delete the information immediately from the backup system, but we delete it when we backup the update.
(4) change the scope of your authorization agreement.
Each business function requires some basic personal information to complete (see Part 1 of this strategy). For the collection and use of additional personal information, you may at any time give or withdraw your authorization consent.
When you withdraw your consent, we will no longer process personal information. However, your decision to withdraw your consent will not affect the personal information processing that has been done on the basis of your authorization.
If you do not want to accept the commercial advertisement we sent you, you can cancel it at any time by email:firstname.lastname@example.org:
(5) respond to your request.
In order to ensure safety, you may need to provide written request or to prove your identity in other ways. We may ask you to verify your identity first and then process your request.
We will reply within thirty days. If you are not satisfied, you can also complain about email@example.com through the following ways
We do not charge for your reasonable request in principle, but we will charge a certain cost for repeated requests that exceed a reasonable limit. We may reject requests that are unjustifiably duplicated, require too many technical means (e.g., the need to develop new systems or radically change existing practices), pose risks to the legitimate rights and interests of others, or are very impractical (e.g., involve backing up information stored on tape).
In the following circumstances, we will not be able to respond to your request in accordance with the requirements of laws and regulations:
1, related to national security and national defense safety;
2, relating to public safety, public health and major public interests;
3, related to criminal investigation, prosecution and trial;
4, there is ample evidence that you have subjective malice or abuse of rights.
5, in response to your request, you will cause serious damage to the legitimate rights and interests of you or other individuals and organizations.
How do we deal with children's personal information
Our products, websites and services are mainly for adults. If there is no consent from parents or guardians, children shall not create their own user accounts.
In the case of collecting children's personal information with the consent of their parents, we will only use or publicly disclose this information if it is permitted by law, with the explicit consent of the parents or guardians, or if it is necessary to protect the child.
Despite the different definitions of children in local laws and customs, we treat everyone under the age of 14 as a child.
If we find ourselves collecting children's personal information without prior and verifiable parental consent, we will try to delete the data as soon as possible.
How can your personal information be transferred globally?
Since we provide products or services through resources and servers all over the world, this means that with your authorization, your personal information may be transferred to, or accessed from, the countries/regions in which you use the products or services.
Such jurisdictions may have different data protection laws, or even do not establish relevant laws. In such cases, we will ensure that your personal information is sufficiently and equally protected within the territory of the People's Republic of China. For example, we'll ask you for permission to transfer personal information across borders, or to implement security measures such as data de-identification prior to a cross-border data transfer.
How to contact us
Mailbox: firstname.lastname@example.org; Tel: +86-20-28925266
We have a Personal Information Protection Department (or Personal Information Protection Commissioner) that you can contact through the following ways: email@example.com
Under normal circumstances, we will reply within thirty days.