VEICHI IOT隐私政策
应用名称:VEICHI IOT
更新日期:2025年6月13日
生效日期:2025年6月13日
开发者:苏州伟创电气科技股份有限公司
欢迎使用"VEICHI IOT"提供的产品和服务!VEICHI IOT(或简称"我们")由苏州伟创电气科技股份有限公司创建和运营,我们的注册地址为:苏州市吴中区苏州伟创电气科技股份有限公司。我们深知个人信息对您的重要性,我们一向庄严承诺 保护使用我们的产品和服务(以下统称"VEICHI IOT")之用户(以下统称"用户"或"您")的个人信息及隐私安全。您在使用VEICHI IOT时,我们可能会收集和使用您的相关个人信息(或简称"个人信息")。
《VEICHI IOT隐私政策》(以下简称"本政策")适用于我们提供的VEICHI IOT服务。未满十八周岁的用户,请在法定监护人的陪同下阅读本政策,并特别注意未成年人使用条款。特别地,如果您是未满14周岁的儿童经监护人同意后,您方可使用VEICHI IOT服务。
我们希望通过本政策向您说明我们在收集和使用您相关个人信息时对应的处理规则,以及我们为您提供的访问、更正、删除和保护这些个人信息的方式,以便更好的保障您的权益。
本政策将帮助您了解以下内容:
一、我们收集哪些您的个人信息
二、我们如何使用您的个人信息
三、Cookie技术的使用
四、第三方SDK使用
五、获取手机权限的使用目的
六、我们如何委托处理、共享、转让、公开披露您的个人信息
七、一般储存期限
八、我们如何确保您的信息安全
九、您的权利
十、我们如何处理儿童的个人信息
十一、您的个人信息的存储地点和出境情况
十二、本个人信息保护政策不适用的范围
十三、本个人信息保护政策如何更新
十四、隐私政策的查阅与更新通知
十五、联系我们
请务必仔细阅读本个人信息保护政策,特别是免除/限制责任的条款(以粗体标识),因为只要您使用我们的服务,就表示您同意个人信息保护政策及补充条文中所描述的做法。如果您不同意本个人信息保护政策中所描述的做法,您将无法使用我们的服务。
一、我们收集哪些您的个人信息
为了向您提供我们的服务,我们会要求您提供向您提供服务所必需的个人信息。如果您不提供个人信息,我们可能无法向您提供我们的产品或服务。"个人信息"指以电子或者其他方式记录的能够单独或者与其他信息结合识别特定自然人身份或者反映特定自然人活动情况的各种信息。
1.您提供的个人信息:某些服务会要求您直接向我们提供信息,如用登录、修改手机号码、修改密码、昵称、头像。
(1)登录:当您登录VEICHI IOT时,需要您输入用户名和密码。
2.来自设备的个人信息:我们还可能通过SDK/APP收集您使用我们的服务的相关信息,如设备信息、日志信息、位置信息。
(1)设备信息:在您使用VEICHI IOT,我们可能会读取与您移动设备相关的信息,包括设备厂商、设备型号、操作系统、唯一设备标识符(Android端如AndroidID/OAID, iOS端如iOS14.5之前的IDFA)、软件版本号、接入网络的方式、类型和状态、网络质量数据、硬件型号、传感器信息、设备序列号、IMEI号以及用于访问服务的设备的设置;读取您使用的VEICHI IOT的使用情况,包括设备运行状态、设备参数、某些设备内置摄像头可能会拍摄设备的使用情况、设备安装的应用信息、正在运行的进程信息或设备内存中寄存的数据。
(2)日志信息:在您使用VEICHI IOT,VEICHI IOT自动接收并记录的您的浏览器和设备上的信息,包括(a)浏览器的类型、使用的语言、访问日期和时间、软硬件特征信息及您需求的网页记录数据;(b)您设备的日志信息。
(3)位置信息(仅适用于特定服务/功能):您下载或使用VEICHI IOT,以及使用VEICHI IOT时,可能会读取与您位置相关的各类信息,如设备的GPS信号或附近的WiFi接入点和手机信号发射塔的相关信息、国家代码、城市代码、小区标识、经纬度信息和语言设置,这些信息可能会在您使用以上服务时传送给我们。
3.设备权限调用:VEICHI IOT可能会调用您的设备权限,以下是调用权限对应的业务功能、我们调用权限的目的、以及调用权限前向您询问的情况。
设备权限 调用权限目的 是否询问 用户是否可关闭
相机 需要通过相机拍摄头像、作业现场照片 首次使用相应功能时弹框询问 是
照片 需要通过照片上传头像、工作现场照片 首次使用相应功能时弹框询问 是
通知 需要通过通知发送消息 iOS客户端首次打开APP时弹框询问 是
位置 需要通过获取设备位置记录设备位置 首次使用相应功能时弹框询问 是
无线数据 需要网络请求APP相关功能数据 iOS客户端会在首次打开APP时询问 是
存储 需要存储工单图片 Android客户端会在首次存储照片时询问 是
剪切板 需要方便用户复制粘贴输入 首次使用时根据系统要求是否弹框询问 是
蓝牙 需要连接您手机的蓝牙来查找蓝牙设备、连接蓝牙设备进行读写数据 首次使用时根据系统要求是否弹框询问 是
二、我们如何使用您的个人信息
收集个人信息的目的在于向您提供产品和/或服务,并且保证我们遵守适用法律。我们可能将所收集的个人信息用于以下用途和目的:
1.登录注册您的VEICHI IOT账号。将通过网站创建VEICHI数字账号时收集的个人信息用于建立用户的个人VEICHI数字账户和资料页。
2.收集账号信息是为了帮助您完成VEICHI IOT注册和使用VEICHI IOT基本功能,保护你帐号的安全。收集、使用手机号码是为了满足相关法律法规的真实身份信息认证要求。若您不提供这类信息,您可能无法正常使用我们的服务。
3.收集设备厂商、设备型号、操作系统、唯一设备标识符(Android端如AndroidID/OAID, iOS端如iOS14.5之前的IDFA)、登录IP地址、软件版本号、接入网络的方式、类型和状态、网络质量数据、硬件型号、传感器信息、设备序列号、IMEI号、设备的设置、设备运行状态、设备参数、某些设备内置摄像头,是为了保障您正常使用我们的服务,维护我们服务的正常运行,改进及优化我们的服务体验以及保障您的帐号安全。同时为了预防病毒、木马程序或其他恶意程序、网站攻击,我们可能会收集你设备安装的应用信息、正在运行的进程信息或设备内存中寄存的数据,以防止你的个人信息泄露。
4.评估和分析市场、客户、产品及服务(包括询问您对我们的产品和服务的意见,以及执行客户调查),改善用户体验。我们可能会将来自某项服务的个人信息与来自其他服务的信息结合起来,用于改善服务并开发新产品和服务。我们可能使用某些选择性加入功能(例如用户体验计划)的数据,以分析用户如何使用VEICHI IOT服务,改善用户体验。
5.发送通知。我们可能会不时使用您的个人信息来发送重要通知,例如有设备重要信息、与业务相关的信息。
6.安全管理。保障向您提供的服务的安全稳定运行,我们可能会不时使用您的设备信息和日志信息。
7.提供其他VEICHI IOT服务。
请注意,以上的使用方式涵盖了VEICHI IOT使用个人信息的主要方式。VEICHI IOT可能时不时地通过更新网站页面、APP版本或设备固件方式,为用户提供更加多样化的服务。
三、Cookie技术的使用
1.Cookie技术:您访问VEICHI IOT相关网站或使用VEICHI IOT提供的服务时,我们可能会通过小型数据文件识别您的身份,这么做是为了帮您省去重复输入注册信息的步骤,或者帮助判断您的账户安全。这些数据文件可能是Cookie、Flash
Cookie或您的浏览器或关联应用程序提供的其他本地存储(统称"Cookie")。
Cookie是计算机、电视、手机或其他设备上存储信息的小文件。在您的设备上放置Cookie的实体可以通过Cookie在不同网站、服务、设备和/或浏览会话中识别您。Cookie具有许多用途。例如:Cookie可以记住您的登录凭据,这样您就不必在每次登录服务时都输入这些凭据。Cookie帮助我们和第三方了解我们的哪部分服务最受欢迎,因为Cookie有助于我们查看访问者访问的是哪些页面和功能,以及在这些页面上花费多长时间。了解此类信息后,我们就能更有效地改善服务并为您提供更好的体验。Cookie通过收集您使用我们的服务以及其他网站和应用程序的信息。如果您使用Web浏览器访问服务,可以将浏览器配置为接受所有Cookie、拒绝所有Cookie或发送Cookie时通知您。每种浏览器都是不同的,因此请查看浏览器的"帮助"菜单以了解如何更改您的Cookie首选项。您的设备的操作系统可能包含其他Cookie控件。
请您理解,我们的某些服务只能通过使用"Cookie"才可得到实现。如果您的浏览器或浏览器附加服务允许,您可以根据自己的偏好修改对Cookie的接受程度或者拒绝伟创的Cookie,您可以清除计算机上保存的所有Cookie,大部分网络浏览器都设有阻止Cookie的功能,修改或删除Cookie的方法,请参见您的浏览器的使用帮助。但这一举动在某些情况下可能会影响您安全访问伟创相关网站和使用伟创提供的服务。
四、第三方SDK使用
我们会对SDK或其他类似的应用程序进行严格的安全检测,并要求合作伙伴采取严格的措施来保护您的个人数据。在满足新的服务需求及业务功能变更时,我们可能会调整我们接入的第三方 SDK ,并及时在本说明中向您公开说明接入第三方 SDK 的最新情况。请注意,第三方SDK可能因为版本升级、策略调整等原因导致数据类型存在一些变化,请以其公示的官方说明为准。
1.数据使用过程中涉及合作方的基本原则
我们与合作方合作过程中,将遵守以下原则:
a) 合法原则:涉及数据处理活动的,应当遵守合法原则。
b) 正当与最小必要原则:数据使用必须具有正当目的,且应以达成目的必要为限。
c) 安全审慎原则: 我们将审慎评估合作方使用数据的目的,对这些合作方的安全保障能力进行综合评估,并要求其遵循合作法律协议。我们会对合作方获取信息的软件工具开发包(SDK)、应用程序接口(API)进行严格的安全监测,以保护数据安全。
目前本应用接入的第三方 SDK 如下:
第三方SDK名称:Google地图定位 SDK
收集个人数据类型:
1. 位置信息(经纬度、精确位置、粗略位置):为了给应用返回用户位置信息,并供开发者基于用户的位置信息提供相应服务;为了便于售后派工人员更好的定位打卡获取位置信息;
2. 设备信息(如IP 地址、GNSS信息、WiFi状态、WiFi参数、WiFi列表、SSID、BSSID、基站信息、WiFi信号强度的信息、蓝牙信息、传感器信息(矢量、加速度、压力)、设备信号强度信息、外部存储目录):为了帮助开发者向用户提供定位、辅助定位,实现给开发者提供最终用户更精准的位置信息;
3. 设备标识信息(IDFA、OAID)、当前应用信息(应用名、应用版本号)、设备参数及系统信息(系统属性、设备型号、操作系统、运营商信息):为了提供定位服务准确性和成功率,追踪、排查、诊断、统计服务中的各类问题,保障产品和服务安全正常运行;
使用目的:获取用户位置信息以提升用户体验
官网链接:https://www.google.com.hk/maps/about/#!/
隐私政策:https://support.google.com/contributionpolicy/answer/7401426?hl=zh-Hans
五、获取手机权限的使用目的
1.位置权限
1.1在设备分布中需要位置权限展示设备的所在地址
2.相机权限
2.1在app使用过程中,需要访问您手机相机权限来进行图片上传操作
2.2在添加设备中,需要扫一扫识别蓝牙信息
3.蓝牙权限
3.1在app使用过程中,需要连接您手机的蓝牙来查找蓝牙设备、连接蓝牙设备进行读写数据
六、我们如何委托处理、共享、转让、公开披露您的个人信息
1.委托处理
本业务功能中某些具体的模块或功能由外部供应商提供。例如我们会聘请服务提供商来协助我们提供客户支持。
对我们委托处理个人信息的公司、组织和个人,我们会与其签署严格的保密协定,要求他们按照我们的要求、本个人信息保护政策以及其他任何相关的保密和安全措施来处理个人信息。
2.共享
未经您的同意,我们将不会向VEICHI IOT以外的第三方共享您的信息
。但是,我们可能和下列第三方共享您的信息:
(1)苏州伟创科技股份有限股份有限公司。为保护伟创或其他用户或公众的人身财产安全免遭侵害,您的个人信息可能会在伟创的关联公司之间共享。我们只会共享必要的个人信息,如果我们共享您的个人敏感信息或关联公司改变个人信息的使用及处理目的,将再次征求您的授权同意。
(2)授权合作伙伴。我们可能与可信的授权合作伙伴共享您的信息。我们可能会向授权合作伙伴共享您的账户信息、设备信息,以保障为您提供的服务顺利完成。但我们仅会出于合法、正当、必要、特定、明确的目的共享您的个人信息,并且只会共享提供服务所必要的个人信息。我们的合作伙伴无权将共享的个人信息用于任何其他用途。目前,我们的授权合作伙伴包括以下类型:
a.分析服务类的授权合作伙伴。
b.供应商、服务提供商和其他合作伙伴。我们的供应商和服务提供商包括提供技术服务、电信服务、客户服务、风控服务、审计服务、法律服务的机构、金融机构。
对我们与之共享个人信息的公司、组织和个人,我们会与其签署严格的保密协定,并会以适当的方式要求他们按照我们的说明、本个人信息保护政策以及其他任何相关的保密和安全措施来处理个人信息。在个人敏感数据使用上,我们要求第三方采用加密技术,从而更好地保护用户数据。一经发现其违反协议约定将会采取有效措施乃至终止合作。
遵守法律法规强制性要求、法院命令或政府主管部门要求、维护社会公共利益,或保护我们的客户、伟创或伟创员工的人身和财产安全或合法权益所合理必需的用途。
(3)单独获得您同意的其他方。除本个人信息保护政策中描述的共享情况之外,我们也可能在您同意共享或提出共享请求时与第三方共享您的信息。
(4) 与国家安全、国防安全直接相关的;
(5) 与公共安全、公共卫生、重大公共利益直接相关的;
(6) 与犯罪侦查、起诉、审判和判决执行等直接相关的;
(7) 出于维护您或其他个人的生命、财产等重大合法权益但又很难得到本人同意的;
(8) 您自行向社会公众公开的个人信息;
(9) 从合法公开披露的信息中收集个人信息的,如合法的新闻报道、政府信息公开等渠道。
(10) 根据个人信息主体要求签订和履行合同所必需的;
(11) 用于维护所提供的产品或服务的安全稳定运行所必需的,例如发现、处置产品或服务的故障;
(12) 法律法规规定的其他情形。
根据法律规定,共享、转让经去标识化处理的个人信息,且确保数据接收方无法复原并重新识别个人信息主体的,不属于个人信息的对外共享、转让及公开披露行为,对此类数据的保存及处理将无需另行向您通知并征得您的同意。
3.转让
我们不会将您的个人信息转让给任何公司、组织和个人,但以下情况除外:
(1)获得您的明确同意后;
(2)在涉及合并、收购或破产清算时,如涉及到个人信息转让,我们会在要求新的持有您个人信息的公司、组织继续受此个人信息保护政策的约束,否则我们将要求该公司、组织重新向您征求授权同意。
(3) 与国家安全、国防安全直接相关的;
(4) 与公共安全、公共卫生、重大公共利益直接相关的;
(5) 与犯罪侦查、起诉、审判和判决执行等直接相关的;
(6) 出于维护您或其他个人的生命、财产等重大合法权益但又很难得到本人同意的;
(7) 您自行向社会公众公开的个人信息;
(8) 从合法公开披露的信息中收集个人信息的,如合法的新闻报道、政府信息公开等渠道。
(9) 根据个人信息主体要求签订和履行合同所必需的;
(10) 用于维护所提供的产品或服务的安全稳定运行所必需的,例如发现、处置产品或服务的故障;
(11) 法律法规规定的其他情形。
根据法律规定,共享、转让经去标识化处理的个人信息,且确保数据接收方无法复原并重新识别个人信息主体的,不属于个人信息的对外共享、转让及公开披露行为,对此类数据的保存及处理将无需另行向您通知并征得您的同意。
4.公开披露 我们仅会在以下情况下,公开披露您的个人信息:
(1)获得您明确同意后;
(2)基于法律的披露:基于法律法规强制性要求、法院命令或政府主管要求的情况下,我们会公开披露您的个人信息。
(3) 与国家安全、国防安全直接相关的;
(4) 与公共安全、公共卫生、重大公共利益直接相关的;
(5) 与犯罪侦查、起诉、审判和判决执行等直接相关的;
(6) 出于维护您或其他个人的生命、财产等重大合法权益但又很难得到本人同意的;
(7) 您自行向社会公众公开的个人信息;
(8) 从合法公开披露的信息中收集个人信息的,如合法的新闻报道、政府信息公开等渠道。
(9) 根据个人信息主体要求签订和履行合同所必需的;
(10) 用于维护所提供的产品或服务的安全稳定运行所必需的,例如发现、处置产品或服务的故障;
(11) 法律法规规定的其他情形。
根据法律规定,共享、转让经去标识化处理的个人信息,且确保数据接收方无法复原并重新识别个人信息主体的,不属于个人信息的对外共享、转让及公开披露行为,对此类数据的保存及处理将无需另行向您通知并征得您的同意。
七、一般储存期限
除非法律另有明文规定或经您允许,我们只会在本个人信息保护政策所述目的所需的期限内保留您的个人信息。为了保持服务的持续性和用户体验的一致性,个人信息通常不会在单项服务完成后立即删除。
您在使用VEICHI产品及服务期间,我们将持续为您保存您的个人信息。如果您注销帐户或主动删除上述信息,我们将依据网络安全法等法律法规规定保存您的信息。在您注销帐户或主动删除上述信息后,我们不会再对您的个人信息进行商业化使用,但我们可能会对您的个人信息进行匿名化处理后使用。
如果你注销账号、主动删除个人信息或信息超出必要的保存期限后,我们将对你的个人信息进行删除或匿名化处理,但以下情况除外:
• 遵从法律法规有关信息留存的要求(例如:《电子商务法》规定:商品和服务信息、交易信息保存时间自交易完成之日起不少于三年)。
• 出于财务、审计、争议解决等目的需要合理延长期限的。
八、我们如何确保您的信息安全
1.数据安全技术措施
我们已使用符合业界标准的安全防护措施保护您提供的个人信息,防止数据遭到未经授权访问、公开披露、使用、修改、损坏或丢失。我们会采取一切合理可行的措施,保护您的个人信息。例如,在您的浏览器与"服务"之间交换数据(如信用卡信息)时受SSL加密保护;我们同时对部分网站提供https安全浏览方式;我们会使用加密技术确保数据的保密性;对用户密码我们采用md5加密机制散列化保存;我们会使用受信赖的保护机制防止数据遭到恶意攻击;我们会部署访问控制机制,确保只有授权人员才可访问个人信息;为保障您的信息安全,我们努力采取各种合理的物理、电子和管理方面的安全措施来保护您的信息,使您的信息不会被泄漏、毁损或者丢失,包括但不限于SSL、信息加密存储、数据中心的访问控制。
我们通过建立数据安全管理规范、数据安全开发规范来管理和规范个人信息的存储和使用。我们会举办安全和个人信息保护培训课程,加强员工对于保护个人信息重要性的认识。我们对可能接触到您的信息的员工或外包人员、供应商合作伙伴也采取了严格管理,包括但不限于根据岗位的不同采取不同的权限控制,与他们签署保密协议和数据处理协议,监控他们的操作情况措施。伟创会按现有技术提供相应的安全措施来保护您的信息,提供合理的安全保障,伟创将尽力做到使您的信息不被泄漏、毁损或丢失。
2.互联网环境并非百分之百安全,我们将尽力确保或担保您发送给我们的任何信息的安全性。如果我们的物理、技术、或管理防护设施遭到破坏,导致信息被非授权访问、公开披露、篡改、或毁坏,导致您的合法权益受损,我们会制定网络安全事件应急预案,及时处置系统漏洞、计算机病毒、网络攻击、网络侵入等安全风险,在发生危害网络安全的事件时,我们会立即启动应急预案,采取相应的补救措施,并按照规定向有关主管部门报告。
3.在发生个人信息安全事件后,我们将按照法律法规的要求,及时向您告知:安全事件的基本情况和可能的影响、我们已采取或将要采取的处置措施、您可自主防范和降低风险的建议、对您的补救措施等。我们将及时将事件相关情况告知您。
4.您的账户均有安全保护功能,请妥善保管您的账户及密码信息。同时,为了保障您的信息安全,请在向第三方永久性售出或转让您的设备使用权之前,确保退出您的账户并删除配对网站或APP,以确保您的设备不再(重新)匹配到您的账户。如果您售出的是设备,则应重置设备并恢复出厂设置。这样,您的设备与账户之间将不再关联。如果您购买了二手的设备,请检查APP中或设备商的账户设置以确保没有未知用户和您的设备相关联。如果还有任何疑问,您可以选择恢复出厂设置。伟创将通过备份、对用户密码进行加密安全措施确保您的信息不丢失,不被滥用和变造。尽管有前述安全措施,但同时也请您理解在信息网络上不存在"完美的安全措施"。
九、您的权利
按照中国相关的法律、法规、标准,以及其他国家、地区的通行做法,我们保障您对 自己的个人信息行使以下权利:
1.访问您的个人信息
您有权访问您的个人信息。如果您想行使数据访问权,可以通过以下方式自行访问。账户信息:如果您希望访问或编辑您的账户中的个人资料信息、更改您的密码、修改手机号码或注销您的账户,您可以登录您的账户后通过访问设置页面执行此类操作。登陆掌上VEICHI IOTAPP,进入右下角【我的】页面,即可访问您的头像、账号名称、手机号。
2.更正您的个人信息
当您发现我们处理的关于您的个人信息有错误时,您有权自行或要求我们做出更正。对于账户信息,您可以登录您的账户后通过访问设置页面执行此类操作。对于其他个人信息,请通过第十五节列明的联系方式与我们取得联系
3.删除您的个人信息
在以下情形中,您可以向我们提出删除个人信息的请求:
(1)如果我们处理个人信息的行为违反法律法规;
(2)如果我们收集、使用您的个人信息,却未征得您的同意;
(3)如果我们处理个人信息的行为违反了与您的约定;
(4)如果您注销了账号;
(5)如果我们不再为您提供产品和服务。
当您从我们的服务中删除信息后,我们可能不会立即在备份系统中删除相应的信息,但会在备份更新时删除这些信息。在您注销帐户或主动删除上述信息后,我们不会再对您的个人信息进行商业化使用,但我们可能会对您的个人信息进行匿名化处理后使用。
4.改变您授权同意的范围
您可以通过提交请求,撤销授权我们收集、使用和/或披露我们掌握或控制的您的个人信息的许可。您可以通过第十五节列明的联系方式联系我们进行相关操作。我们将会在您做出请求后的合理时间内处理您的请求,并且会根据您的请求,在此后不再收集、使用和/或披露您的个人信息。请注意,由于每个业务场景需要一些基本的个人信息才能得以完成,您撤销同意可能导致部分伟创服务不可用.
您可以通过移动设备的设置功能,关闭相应权限(包括位置、照片、麦克风、相机、通知等),撤回对获取您个人信息的授权。
当您撤回同意后,我们将不再处理相应的个人信息。但您撤回同意的决定,不会影响此前基于您的授权而开展的个人信息处理。
5.注销账户
您随时可通过第十五节列明的联系方式与我们取得联系,注销此前注册的账户。
注销账户会影响您正常使用所有相关应用和服务。我们在此善意地提醒您,您注销账户的行为会给您后续使用伟创服务带来诸多不便,且注销伟创账户后,我们将停止为您提供服务,您的个人信息会保持不可被检索、访问的状态,或被匿名化处理,法律法规另有规定的除外。如您通过第三方账号快捷登录的,您需要联系该第三方处理注销账号事宜。
6.如您无法通过上述方式访问、更正、删除个人信息,撤回同意或注销账户,您可以通过第十五节列明的联系方式与我们取得联系。我们可能需要验证您的身份,并在验证您的身份后15个工作日作出答复或合理解释。
十、我们如何处理儿童的个人信息
我们的服务主要面向成人
a) 若你是未满18周岁的未成年人,在使用伟创及相关服务前,应在你的父母或其他监护人监护、指导下共同阅读并同意本隐私政策。
b) 若你是未满14周岁的未成年人的监护人,在使用伟创及相关服务前,应为你的被监护人阅读并同意《儿童个人信息网络保护规定》
如果我们发现自己在未事先获得可证实的父母或监护人同意的情况下收集了未成年人的个人信息,则会设法尽快删除相关数据。如果家长或监护人有理由相信未成年人未经他们事先同意而向伟创提交了个人信息,请联系我们以确保删除此类个人信息,并保证未成年人取消订阅任何适用的伟创服务。
十一、您的个人信息的存储地点和出境情况
我们在中华人民共和国境内收集和产生的个人信息,将存储在中华人民共和国境内,并不会出境,仅在中华人民共和国境内处理。
十二、本个人信息保护政策不适用的范围
我们的个人信息保护政策不适用于第三方提供的产品和服务。伟创产品和服务可能包括第三方的产品和服务,以及第三方网站的链接。当您使用这些产品或服务时,也可能收集您的信息。因此,我们强烈建议您花时间阅读该第三方的个人信息保护政策,就像阅读我们的政策一样。我们不对第三方如何使用他们向您收集的个人信息负责,也不能控制其使用。我们的个人信息保护政策不适用通过我们的服务链接的其他网站
使用第三方功能:您可能通过伟创提供的应用端来使用第三方服务,例如打开、访问、浏览、检索或注册登录视频网站、音乐应用、地图应用、天气查询应用。您在使用第三方功能时需要遵守第三方的服务条款和个人信息保护政策。
十三、本个人信息保护政策如何更新
我们的个人信息保护政策可能变更。未经您明确同意,我们不会削减您按照本个人信息保护政策所应享有的权利。我们会在本页面上发布对本个人信息保护政策所做的任何变更。对于重大变更,我们还会提供更为显著的通知(包括对于某些服务,我们会通过电子邮件发送通知,说明个人信息保护政策的具体变更内容)。本政策所指的重大变更包括但不限于:
1.我们的服务模式(如处理个人信息的目的、处理的个人信息类型、个人信息的使用方式)发生重大变化;
2.我们的所有权结构发生重大变化(如业务调整、破产并购引起的所有者变更);
3.个人信息公开披露的主要对象发生变化;
4.参与个人信息处理方面的权利及其行使方式发生重大变化;
5.我们负责处理个人信息安全的责任部门、联络方式及投诉渠道发生变化时;
6.个人信息安全影响评估报告表明存在高风险时。
十四、隐私政策的查阅与更新通知
1.查阅
a.你可以在登录页面【隐私政策】页面查看本隐私政策。
b.请你了解,为了满足运营需要,我们可能会根据你所使用的手机型号、系统版本、移动客户端等因素开发不同的版本,因此在你使用特定版本时,对应的功能可能与本隐私政策描述的有所区别,但不会影响数据处理的目的、方式和范围,具体可用功能以你实际使用的情况为准。
2.更新及通知
a.为了给你提供更好的服务,伟创产品和服务将不时更新与变化,我们会适时对本隐私政策进行修订。未经你明确同意,我们不会削减你依据当前生效的隐私政策所应享受的权利。
b.本隐私政策更新后,我们会在伟创发出更新版本,并通过站内信或其他适当的方式提醒你更新的内容,以便你及时了解本隐私政策的最新版本。
c.我们也可能通过功能更新,帮助你更好地管理你的个人信息,请你留意相关的功能说明。
十五、联系我们
1.联系方式
如果你对个人信息保护问题有疑问或建议,可选择通过以下方式联系我们:
a) 电子邮件:yy759422344@163.com
b) 客服电话:400-600-0303
2.响应您的请求
为保障安全,您可能需要提供书面请求,或以其他方式证明您的身份。一般情况下,我们将在15个工作日内回复。如果您对我们的回复不满意,特别是我们的个人信息处理行为损害了您的合法权益,您还可以向网信、电信、公安及工商等监管部门进行投诉或举报。
我们可能会先要求您验证自己的身份,然后再处理您的请求。我们将在15个工作日内做出答复。如您不满意,还可以通过本节列明的联系方式联系我们进行投诉。
对于您合理的请求,我们原则上不收取费用,但对多次重复、超出合理限度的请求,我们将酌情收取一定的成本费用。对于那些无端重复、需要过多技术手段(例如,需要开发新系统或从根本上改变现行惯例)、给他人合法权益带来风险或者非常不切实际(例如,涉及备份磁带上存放的信息)的请求,我们可能会予以拒绝。
在以下情形中,按照法律法规要求,我们将无法响应您的请求:
(1)与国家安全、国防安全有关的;
(2)与公共安全、公共卫生、重大公共利益有关的;
(3)与犯罪侦查、起诉、审判和判决执行等有关的;
(4)出于维护个人信息主体或其他个人的生命、财产等重大合法权益但又很难得到本人同意的;
(5)所涉及的个人信息是个人信息主体或监护人自行向社会公众公开的;
(6)从合法公开披露的信息中收集的您的个人信息的,如合法的新闻报道、政府信息公开等渠道;
(7)根据您的要求签订和履行合同所必需的;
(8)用于维护所提供的产品与/或服务的安全稳定运行所必需的,例如发现、处置产品与/或服务的故障;
(9)为合法的新闻报道所必需的;
(10)学术研究机构基于公共利益开展统计或学术研究所必要,且对外提供学术研究或描述的结果时,对结果中所包含的个人信息进行去标识化处理的;
(11)法律法规规定的其他情形。
官方网站:[https://www.veichi.com] 感谢您对我们的信任和支持!
版权所有
@苏州伟创电气科技股份有限公司
2023 保留一切权利
VEICHI IOT Privacy Policy
App Name: VEICHI IOT
Update Date: June 13, 2025
Effective Date: June 13, 2025
Developer: Suzhou Veichi Electric Technology Co., Ltd.
Welcome to use the products and services provided by "VEICHI IOT"! VEICHI IOT (or "we") is created and operated by Suzhou Veichi Electric Technology Co., Ltd., with our registered address at: Suzhou Veichi Electric Technology Co., Ltd., Wuzhong District, Suzhou. We deeply understand the importance of personal information to you and are committed to protecting the personal information and privacy security of users (collectively referred to as "users" or "you") who use our products and services (collectively referred to as "VEICHI IOT"). When you use VEICHI IOT, we may collect and use your relevant personal information (or "personal information").
The "VEICHI IOT Privacy Policy" (hereinafter referred to as "this Policy") applies to the VEICHI IOT services we provide. Users under the age of eighteen, please read this Policy accompanied by a legal guardian, paying special attention to the terms for minors. Specifically, if you are a child under 14 years old, you may use VEICHI IOT services only with the consent of your guardian.
We hope to explain to you through this Policy the processing rules corresponding to the collection and use of your relevant personal information, as well as the methods we provide for you to access, correct, delete, and protect this personal information, in order to better protect your rights.
This Policy will help you understand the following:
1. What Personal Information We Collect
2. How We Use Your Personal Information
3. Use of Cookie Technology
4. Third-party SDK Usage
5. Purpose of Obtaining Mobile Permissions
6. How We Entrust Processing, Share, Transfer, and Publicly Disclose Your Personal Information
7. General Storage Period
8. How We Ensure Your Information Security
9. Your Rights
10. How We Handle Children's Personal Information
11. Storage Location and Cross-border Transfer of Your Personal Information
12. Scope of Inapplicability of This Personal Information Protection Policy
13. How This Personal Information Protection Policy is Updated
14. Access and Update Notification of Privacy Policy
15. Contact Us
Please read this Personal Information Protection Policy carefully, especially the exemption/limitation of liability clauses (marked in bold), because by using our services, you agree to the practices described in the Personal Information Protection Policy and supplementary provisions. If you do not agree with the practices described in this Personal Information Protection Policy, you will not be able to use our services.
1. What Personal Information We Collect
In order to provide you with our services, we will require you to provide the personal information necessary to provide you with the services. If you do not provide personal information, we may not be able to provide you with our products or services. "Personal information" refers to various information recorded electronically or by other means that can identify a specific natural person alone or in combination with other information, or reflect the activities of a specific natural person.
1. Personal information provided by you: Certain services require you to provide information directly to us, such as login, modifying mobile phone number, modifying password, nickname, and avatar.
(1) Login: When you log in to VEICHI IOT, you need to enter your username and password.
2. Personal information from devices: We may also collect information related to your use of our services through SDK/APP, such as device information, log information, and location information.
(1)Device Information: When you use VEICHI IOT, we may read information related to your mobile device, including device manufacturer, device model, operating system, unique device identifier (Android side such as Android ID/OAID, iOS side such as IDFA before iOS 14.5), software version number, method of accessing the network, type and status, network quality data, hardware model, sensor information, device serial number, IMEI number, and settings of the device used to access the services; read the usage of VEICHI IOT you use, including device operating status, device parameters, some built-in device cameras may capture the usage of the device, application information installed on the device, running process information, or data stored in the device memory.
(2)Log Information: When you use VEICHI IOT, VEICHI IOT automatically receives and records information on your browser and device, including (a) browser type, language used, access date and time, software and hardware characteristic information, and the web page record data you need; (b) log information of your device.
(3)Location Information (only applicable to specific services/functions): When you download or use VEICHI IOT, and when using VEICHI IOT, we may read various types of information related to your location, such as the device's GPS signal or nearby WiFi access points and mobile phone signal tower related information, country code, city code, cell identifier, latitude and longitude information, and language settings. This information may be transmitted to us when you use the above services.
3. Device permission calls: VEICHI IOT may call your device permissions. The following are the business functions corresponding to the permission calls, the purpose of our permission calls, and the situation of asking you before calling the permission.
Device Permission Purpose of Permission Call Whether to Ask User Whether Can Close
Camera Need to take avatar, work site photos First use of corresponding function pop-up inquiry Yes
Photos Need to upload avatar, work site photos First use of corresponding function pop-up inquiry Yes
Notifications Need to send messages via notifications iOS client first open APP pop-up inquiry Yes
Location Need to obtain device location to record device location First use of corresponding function pop-up inquiry Yes
Wireless Data Need network request APP related function data iOS client will ask when first opening APP Yes
Storage Need to store work order pictures Android client will ask when first storing photos Yes
Clipboard Need to facilitate user copy and paste input First use according to system requirements whether to pop-up inquiry Yes
Bluetooth Need to connect your phone's Bluetooth to search for Bluetooth devices, connect Bluetooth devices for read and write data First use according to system requirements whether to pop-up inquiry Yes
2. How We Use Your Personal Information
The purpose of collecting personal information is to provide you with products and/or services, and to ensure that we comply with applicable laws. We may use the collected personal information for the following purposes:
1. Login and register your VEICHI IOT account. The personal information collected when creating a VEICHI digital account through the website is used to establish the user's personal VEICHI digital account and profile page.
2. Collecting account information is to help you complete VEICHI IOT registration and use the basic functions of VEICHI IOT, and to protect the security of your account. Collecting and using mobile phone numbers is to meet the real identity information authentication requirements of relevant laws and regulations. If you do not provide such information, you may not be able to use our services normally.
3. Collecting device manufacturer, device model, operating system, unique device identifier (Android side such as Android ID/OAID, iOS side such as IDFA before iOS 14.5), login IP address, software version number, method of accessing the network, type and status, network quality data, hardware model, sensor information, device serial number, IMEI number, device settings, device operating status, device parameters, some built-in device cameras, is to ensure your normal use of our services, maintain the normal operation of our services, improve and optimize our service experience, and protect the security of your account. At the same time, to prevent viruses, Trojan programs or other malicious programs, and website attacks, we may collect information about applications installed on your device, running process information, or data stored in the device memory to prevent the leakage of your personal information.
4. Evaluate and analyze the market, customers, products and services (including asking for your opinions on our products and services, and conducting customer surveys), and improve user experience. We may combine personal information from one service with information from other services to improve services and develop new products and services. We may use data from certain opt-in features (such as the user experience program) to analyze how users use VEICHI IOT services and improve the user experience.
5. Send notifications. We may use your personal information from time to time to send important notifications, such as important device information and business-related information.
6. Security management. To ensure the safe and stable operation of the services provided to you, we may use your device information and log information from time to time.
7. Provide other VEICHI IOT services.
Please note that the above usage methods cover the main ways VEICHI IOT uses personal information. VEICHI IOT may from time to time provide users with more diverse services by updating website pages, APP versions, or device firmware.
3. Use of Cookie Technology
1. Cookie Technology: When you visit VEICHI IOT related websites or use the services provided by VEICHI IOT, we may identify your identity through small data files. This is done to save you the step of repeatedly entering registration information, or to help determine the security of your account. These data files may be Cookies, Flash Cookies, or other local storage provided by your browser or associated applications (collectively referred to as "Cookies").
Cookies are small files that store information on computers, TVs, mobile phones, or other devices. The entity that places Cookies on your device can identify you across different websites, services, devices, and/or browsing sessions through Cookies. Cookies have many uses. For example: Cookies can remember your login credentials so you don't have to enter them every time you log in to the service. Cookies help us and third parties understand which parts of our services are most popular, because Cookies help us see which pages and functions visitors visit, and how much time they spend on these pages. After understanding such information, we can more effectively improve services and provide you with a better experience. Cookies collect information about your use of our services and other websites and applications. If you use a web browser to access the service, you can configure the browser to accept all Cookies, reject all Cookies, or notify you when Cookies are sent. Each browser is different, so please check the browser's "Help" menu to learn how to change your Cookie preferences. Your device's operating system may contain other Cookie controls.
Please understand that some of our services can only be implemented by using "Cookies". If your browser or browser additional services allow, you can modify the acceptance level of Cookies or reject Veichi's Cookies according to your preferences. You can clear all Cookies saved on your computer. Most web browsers have the function of blocking Cookies. For methods to modify or delete Cookies, please refer to the usage help of your browser. However, this action may in some cases affect your secure access to Veichi-related websites and the use of services provided by Veichi.
4. Third-party SDK Usage
We conduct strict security testing on SDKs or similar applications and require partners to take strict measures to protect your personal data. When meeting new service requirements and business function changes, we may adjust the third-party SDKs we integrate and promptly disclose the latest situation of integrated third-party SDKs in this statement. Please note that third-party SDKs may have some changes in data types due to version upgrades, policy adjustments, etc. Please refer to their official statements for details.
1. Basic principles involved in data usage with partners
In the process of cooperating with partners, we will comply with the following principles:
a) Legitimacy principle: Data processing activities shall comply with the principle of legality.
b) Justification and minimum necessity principle: Data usage must have legitimate purposes and should be limited to what is necessary to achieve the purposes.
c) Security and prudence principle: We will prudently evaluate the purposes of partners' data usage, comprehensively assess their security capabilities, and require them to comply with cooperation legal agreements. We will conduct strict security monitoring on the software tool development kits (SDKs) and application programming interfaces (APIs) used by partners to obtain information to protect data security.
Currently, the third-party SDKs integrated by this application are as follows:
Third-party SDK Name: Google Maps Location SDK
Types of Personal Data Collected:
1. Location information (latitude and longitude, precise location, approximate location): To return user location information to the application, and enable developers to provide corresponding services based on user location information; To facilitate after-sales dispatch personnel to better locate and clock in to obtain location information;
2. Device information (such as IP address, GNSS information, WiFi status, WiFi parameters, WiFi list, SSID, BSSID, base station information, WiFi signal strength information, Bluetooth information, sensor information (vector, acceleration, pressure), device signal strength information, external storage directory): To help developers provide users with positioning and assisted positioning, and provide developers with more accurate location information of end users;
3. Device identification information (IDFA, OAID), current application information (application name, application version number), device parameters and system information (system properties, device model, operating system, operator information): To improve the accuracy and success rate of positioning services, track, troubleshoot, diagnose, and count various problems in services, and ensure the safe and normal operation of products and services;
Purpose of Use: Obtain user location information to improve user experience
Official Website: https://www.google.com.hk/maps/about/#!/
Privacy Policy: https://support.google.com/contributionpolicy/answer/7401426?hl=zh-Hans
5. Purpose of Obtaining Mobile Permissions
1. Location Permission
1.1 Location permission is required in device distribution to display the address where the device is located
2. Camera Permission
2.1 During app usage, access to your phone's camera permission is required for image upload operations
2.2 In device addition, scan function is needed to identify Bluetooth information
3. Bluetooth Permission
3.1 During app usage, connection to your phone's Bluetooth is required to search for Bluetooth devices, connect to Bluetooth devices for read and write data
6. How We Entrust Processing, Share, Transfer, and Publicly Disclose Your Personal Information
1. Entrusted Processing
Some specific modules or functions in this business function are provided by external suppliers. For example, we hire service providers to assist us in providing customer support.
For companies, organizations, and individuals that we entrust to process personal information, we will sign strict confidentiality agreements with them, requiring them to process personal information in accordance with our requirements, this Personal Information Protection Policy, and any other relevant confidentiality and security measures.
2. Sharing
Without your consent, we will not share your information with third parties outside VEICHI IOT.
However, we may share your information with the following third parties:
(1) Suzhou Veichi Electric Technology Co., Ltd. To protect Veichi or other users or the public from personal and property safety hazards, your personal information may be shared among Veichi's affiliated companies. We will only share necessary personal information. If we share your sensitive personal information or affiliated companies change the purpose of personal information use and processing, we will seek your authorization and consent again.
(2) Authorized partners. We may share your information with trusted authorized partners. We may share your account information and device information with authorized partners to ensure the smooth completion of services provided to you. However, we will only share your personal information for legal, legitimate, necessary, specific, and clear purposes, and will only share personal information necessary to provide the services. Our partners have no right to use shared personal information for any other purpose. Currently, our authorized partners include the following types:
a. Authorized partners for analysis services.
b. Suppliers, service providers and other partners. Our suppliers and service providers include institutions and financial institutions that provide technical services, telecommunications services, customer services, risk control services, audit services, and legal services.
For companies, organizations, and individuals with whom we share personal information, we will sign strict confidentiality agreements with them, and require them in an appropriate manner to process personal information in accordance with our instructions, this Personal Information Protection Policy, and any other relevant confidentiality and security measures. For the use of sensitive personal data, we require third parties to adopt encryption technology to better protect user data. Once found violating the agreement, effective measures will be taken or even cooperation will be terminated.
Purposes reasonably necessary to comply with mandatory requirements of laws and regulations, court orders or requirements of government authorities, safeguard public interests, or protect the personal and property safety or legitimate rights and interests of our customers, Veichi or Veichi employees.
(3) Other parties with your separate consent. In addition to the sharing situations described in this Personal Information Protection Policy, we may also share your information with third parties when you consent to sharing or make a sharing request.
(4) Directly related to national security and national defense security;
(5) Directly related to public security, public health, and major public interests;
(6) Directly related to criminal investigation, prosecution, trial and execution of judgments;
(7) Necessary for safeguarding the life, property and other major legitimate rights and interests of you or other individuals but difficult to obtain the consent of the individual;
(8) Personal information that you have made public on your own;
(9) Personal information collected from legally publicly disclosed information, such as legal news reports and government information disclosure channels.
(10) Necessary for concluding and performing a contract as requested by the personal information subject;
(11) Necessary for ensuring the safe and stable operation of the provided products or services, for example, discovering and handling faults of the products or services;
(12) Other circumstances stipulated by laws and regulations.
According to legal provisions, sharing and transferring de-identified personal information, and ensuring that the data recipient cannot restore and re-identify the personal information subject, does not belong to the external sharing, transfer and public disclosure of personal information. The storage and processing of such data will not require separate notification to you and your consent.
3. Transfer
We will not transfer your personal information to any company, organization or individual, except in the following circumstances:
(1) After obtaining your explicit consent;
(2) In the event of merger, acquisition or bankruptcy liquidation, if personal information transfer is involved, we will require the new company or organization holding your personal information to continue to be bound by this Personal Information Protection Policy, otherwise we will require the company or organization to seek your authorization and consent again.
(3) Directly related to national security and national defense security;
(4) Directly related to public security, public health, and major public interests;
(5) Directly related to criminal investigation, prosecution, trial and execution of judgments;
(6) Necessary for safeguarding the life, property and other major legitimate rights and interests of you or other individuals but difficult to obtain the consent of the individual;
(7) Personal information that you have made public on your own;
(8) Personal information collected from legally publicly disclosed information, such as legal news reports and government information disclosure channels.
(9) Necessary for concluding and performing a contract as requested by the personal information subject;
(10) Necessary for ensuring the safe and stable operation of the provided products or services, for example, discovering and handling faults of the products or services;
(11) Other circumstances stipulated by laws and regulations.
According to legal provisions, sharing and transferring de-identified personal information, and ensuring that the data recipient cannot restore and re-identify the personal information subject, does not belong to the external sharing, transfer and public disclosure of personal information. The storage and processing of such data will not require separate notification to you and your consent.
4. Public Disclosure We will only publicly disclose your personal information under the following circumstances:
(1) After obtaining your explicit consent;
(2) Disclosure based on law: Under circumstances of mandatory requirements of laws and regulations, court orders or requirements of government authorities, we will publicly disclose your personal information.
(3) Directly related to national security and national defense security;
(4) Directly related to public security, public health, and major public interests;
(5) Directly related to criminal investigation, prosecution, trial and execution of judgments;
(6) Necessary for safeguarding the life, property and other major legitimate rights and interests of you or other individuals but difficult to obtain the consent of the individual;
(7) Personal information that you have made public on your own;
(8) Personal information collected from legally publicly disclosed information, such as legal news reports and government information disclosure channels.
(9) Necessary for concluding and performing a contract as requested by the personal information subject;
(10) Necessary for ensuring the safe and stable operation of the provided products or services, for example, discovering and handling faults of the products or services;
(11) Other circumstances stipulated by laws and regulations.
According to legal provisions, sharing and transferring de-identified personal information, and ensuring that the data recipient cannot restore and re-identify the personal information subject, does not belong to the external sharing, transfer and public disclosure of personal information. The storage and processing of such data will not require separate notification to you and your consent.
7. General Storage Period
Unless otherwise expressly provided by law or with your permission, we will only retain your personal information for the period necessary for the purposes described in this Personal Information Protection Policy. In order to maintain the continuity of services and the consistency of user experience, personal information is usually not deleted immediately after the completion of a single service.
During your use of VEICHI products and services, we will continue to store your personal information for you. If you cancel your account or actively delete the above information, we will save your information in accordance with the provisions of the Cybersecurity Law and other laws and regulations. After you cancel your account or actively delete the above information, we will no longer commercially use your personal information, but we may use your personal information after anonymization.
If you cancel your account, actively delete personal information, or the information exceeds the necessary storage period, we will delete or anonymize your personal information, except in the following circumstances:
• Comply with legal requirements for information retention (for example: the "E-commerce Law" stipulates that commodity and service information and transaction information shall be kept for not less than three years from the date of transaction completion).
• Reasonable extension of the period is required for financial, audit, dispute resolution and other purposes.
8. How We Ensure Your Information Security
1. Data Security Technical Measures
We have used security protection measures that comply with industry standards to protect the personal information you provide, preventing data from unauthorized access, public disclosure, use, modification, damage or loss. We will take all reasonably feasible measures to protect your personal information. For example, when exchanging data (such as credit card information) between your browser and the "service", it is protected by SSL encryption; we also provide https secure browsing for some websites; we use encryption technology to ensure data confidentiality; we use md5 encryption mechanism to hash and save user passwords; we use trusted protection mechanisms to prevent data from malicious attacks; we deploy access control mechanisms to ensure that only authorized personnel can access personal information; to ensure your information security, we strive to take various reasonable physical, electronic and management security measures to protect your information, so that your information will not be leaked, damaged or lost, including but not limited to SSL, information encryption storage, and data center access control.
We manage and standardize the storage and use of personal information by establishing data security management specifications and data security development specifications. We will hold security and personal information protection training courses to strengthen employees' awareness of the importance of protecting personal information. We also strictly manage employees or outsourcing personnel, supplier partners who may have access to your information, including but not limited to adopting different permission controls according to different positions, signing confidentiality agreements and data processing agreements with them, and monitoring their operations. Veichi will provide corresponding security measures according to existing technology to protect your information and provide reasonable security guarantees. Veichi will try its best to prevent your information from being leaked, damaged or lost.
2. The Internet environment is not 100% secure. We will strive to ensure or guarantee the security of any information you send to us. If our physical, technical, or management protection facilities are damaged, resulting in unauthorized access, public disclosure, tampering, or destruction of information, causing damage to your legitimate rights and interests, we will formulate emergency plans for network security incidents, promptly dispose of system vulnerabilities, computer viruses, network attacks, network intrusions and other security risks. When a network security incident occurs, we will immediately activate the emergency plan, take corresponding remedial measures, and report to the relevant competent authorities in accordance with regulations.
3. After the occurrence of a personal information security incident, we will inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, suggestions for your independent prevention and risk reduction, and remedial measures for you. We will inform you of the relevant situation of the incident in a timely manner.
4. Your account has security protection functions. Please keep your account and password information properly. At the same time, to ensure your information security, please ensure that you log out of your account and delete the paired website or APP before permanently selling or transferring your device usage rights to a third party, to ensure that your device is no longer (re)matched to your account. If you are selling a device, you should reset the device and restore factory settings. In this way, your device will no longer be associated with your account. If you purchase a second-hand device, please check the account settings in the APP or the device manufacturer to ensure that no unknown users are associated with your device. If you have any questions, you can choose to restore factory settings. Veichi will ensure that your information is not lost, misused or altered through backup and encryption security measures for user passwords. Despite the aforementioned security measures, please understand that there is no "perfect security measure" on the information network.
9. Your Rights
In accordance with China's relevant laws, regulations, standards, and common practices in other countries and regions, we guarantee you the following rights over your personal information:
1. Access to your personal information
You have the right to access your personal information. If you want to exercise your right of data access, you can access it yourself in the following ways. Account information: If you want to access or edit the personal profile information in your account, change your password, modify your mobile phone number or cancel your account, you can perform such operations by accessing the settings page after logging into your account. Log in to the VEICHI IOT APP, enter the [My] page in the lower right corner, and you can access your avatar, account name, and mobile phone number.
2. Correct your personal information
When you find errors in the personal information we process about you, you have the right to make corrections yourself or ask us to make corrections. For account information, you can perform such operations by accessing the settings page after logging into your account. For other personal information, please contact us through the contact method listed in Section 15.
3. Delete your personal information
Under the following circumstances, you can request us to delete personal information:
(1) If our processing of personal information violates laws and regulations;
(2) If we collect and use your personal information without obtaining your consent;
(3) If our processing of personal information violates the agreement with you;
(4) If you cancel your account;
(5) If we no longer provide you with products and services.
When you delete information from our services, we may not immediately delete the corresponding information from the backup system, but will delete it when the backup is updated. After you cancel your account or actively delete the above information, we will no longer commercially use your personal information, but we may use your personal information after anonymization.
4. Change the scope of your authorization and consent
You can submit a request to revoke the permission for us to collect, use and/or disclose your personal information that we hold or control. You can contact us through the contact method listed in Section 15 for related operations. We will process your request within a reasonable time after you make the request, and based on your request, we will no longer collect, use and/or disclose your personal information thereafter. Please note that since each business scenario requires some basic personal information to be completed, your revocation of consent may make some Veichi services unavailable.
You can close the corresponding permissions (including location, photos, microphone, camera, notifications, etc.) through the settings function of the mobile device, and withdraw the authorization to obtain your personal information.
After you withdraw your consent, we will no longer process the corresponding personal information. However, your decision to withdraw consent will not affect the previous personal information processing based on your authorization.
5. Cancel account
You can contact us through the contact method listed in Section 15 at any time to cancel the previously registered account.
Canceling your account will affect your normal use of all related applications and services. We kindly remind you that canceling your Veichi account will cause you many inconveniences in subsequent use of Veichi services. After canceling your Veichi account, we will stop providing services to you. Your personal information will remain irretrievable and inaccessible, or will be anonymized, unless otherwise stipulated by laws and regulations. If you log in through a third-party account, you need to contact the third party to cancel the account.
6. If you cannot access, correct, or delete personal information, withdraw consent, or cancel your account through the above methods, you can contact us through the contact method listed in Section 15. We may need to verify your identity and will respond or provide a reasonable explanation within 15 working days after verifying your identity.
10. How We Handle Children's Personal Information
Our services are mainly for adults
a) If you are a minor under the age of 18, before using Veichi and related services, you should read and agree to this privacy policy under the supervision and guidance of your parents or other guardians.
b) If you are the guardian of a minor under the age of 14, before using Veichi and related services, you should read and agree to the "Regulations on the Protection of Children's Personal Information Online" for your ward.
If we find that we have collected personal information from minors without prior verifiable parental or guardian consent, we will try to delete the relevant data as soon as possible. If parents or guardians have reason to believe that minors have submitted personal information to Veichi without their prior consent, please contact us to ensure the deletion of such personal information, and ensure that minors unsubscribe from any applicable Veichi services.
11. Storage Location and Cross-border Transfer of Your Personal Information
The personal information we collect and generate within the territory of the People's Republic of China will be stored within the territory of the People's Republic of China, will not be transferred abroad, and will only be processed within the territory of the People's Republic of China.
12. Scope of Inapplicability of This Personal Information Protection Policy
Our personal information protection policy does not apply to products and services provided by third parties. Veichi products and services may include third-party products and services, as well as links to third-party websites. When you use these products or services, your information may also be collected. Therefore, we strongly recommend that you take time to read the third party's personal information protection policy, just like reading our policy. We are not responsible for how third parties use the personal information they collect from you, nor can we control their use. Our personal information protection policy does not apply to other websites linked through our services.
Use of third-party functions: You may use third-party services through the application terminal provided by Veichi, such as opening, accessing, browsing, retrieving or registering and logging in to video websites, music applications, map applications, and weather query applications. You need to comply with the third party's terms of service and personal information protection policy when using third-party functions.
13. How This Personal Information Protection Policy is Updated
Our personal information protection policy may change. Without your explicit consent, we will not reduce your rights under this Personal Information Protection Policy. We will post any changes to this Personal Information Protection Policy on this page. For major changes, we will also provide more prominent notice (including for certain services, we will send notifications via email explaining the specific changes to the personal information protection policy). Major changes referred to in this Policy include but are not limited to:
1. Major changes in our service model (such as the purpose of processing personal information, the type of personal information processed, and the way personal information is used);
2. Major changes in our ownership structure (such as changes in ownership caused by business adjustments, bankruptcy mergers and acquisitions);
3. Major changes in the main objects of personal information public disclosure;
4. Major changes in the rights involved in personal information processing and their exercise methods;
5. Changes in the responsible department, contact method, and complaint channel for our personal information security processing;
6. When the personal information security impact assessment report indicates a high risk.
14. Access and Update Notification of Privacy Policy
1. Access
a. You can view this privacy policy on the [Privacy Policy] page of the login page.
b. Please understand that in order to meet operational needs, we may develop different versions based on the mobile phone model, system version, mobile client and other factors you use. Therefore, when you use a specific version, the corresponding functions may be different from those described in this privacy policy, but it will not affect the purpose, method and scope of data processing. The specific available functions are subject to your actual use.
2. Update and Notification
a. In order to provide you with better services, Veichi products and services will be updated and changed from time to time, and we will revise this privacy policy in a timely manner. Without your explicit consent, we will not reduce the rights you should enjoy under the currently effective privacy policy.
b. After this privacy policy is updated, we will issue an updated version on Veichi and notify you of the updated content through station letters or other appropriate methods so that you can keep up with the latest version of this privacy policy in a timely manner.
c. We may also help you better manage your personal information through function updates. Please pay attention to the relevant function descriptions.
15. Contact Us
1. Contact Information
If you have any questions or suggestions about personal information protection, you can contact us in the following ways:
a) Email: yy759422344@163.com
b) Customer Service Hotline: 400-600-0303
2. Responding to Your Requests
To ensure security, you may need to provide a written request or prove your identity in other ways. Generally, we will reply within 15 working days. If you are not satisfied with our reply, especially if our personal information processing behavior has damaged your legitimate rights and interests, you can also complain or report to regulatory authorities such as cyberspace administration, telecommunications, public security, and industry and commerce.
We may first ask you to verify your identity before processing your request. We will respond within 15 working days. If you are not satisfied, you can also contact us for complaints through the contact information listed in this section.
For your reasonable requests, we do not charge fees in principle, but for repeated requests multiple times that exceed reasonable limits, we will charge a certain cost fee as appropriate. For those unreasonable repeated requests that require excessive technical means (for example, requiring the development of new systems or fundamental changes to current practices), pose risks to the legitimate rights and interests of others, or are very impractical (for example, involving information stored on backup tapes), we may refuse them.
In the following circumstances, according to legal requirements, we will be unable to respond to your request:
(1) Related to national security and defense security;
(2) Related to public security, public health, and major public interests;
(3) Related to criminal investigation, prosecution, trial and execution of judgments;
(4) Necessary for safeguarding the life, property and other major legitimate rights and interests of the personal information subject or other individuals but difficult to obtain the consent of the individual;
(5) The personal information involved is made public by the personal information subject or guardian on their own;
(6) Collected from legally publicly disclosed information, such as legal news reports and government information disclosure channels;
(7) Necessary for concluding and performing a contract as requested by the personal information subject;
(8) Necessary for ensuring the safe and stable operation of the provided products and/or services, for example, discovering and handling faults of the products and/or services;
(9) Necessary for legitimate news reporting;
(10) Necessary for academic research institutions to carry out statistics or academic research based on public interests, and when providing academic research or description results to the outside world, the personal information contained in the results is de-identified;
(11) Other circumstances stipulated by laws and regulations.
Official Website: [https://www.veichi.com] Thank you for your trust and support!