App Name: VEICHI IOT
Update Date: June 13, 2025
Effective Date: June 13, 2025
Developer: Suzhou Veichi Electric Technology Co., Ltd.
Welcome to use the products and services provided by "VEICHI IOT"! VEICHI IOT (or "we") is created and operated by Suzhou Veichi Electric
Technology Co., Ltd., with our registered address at: Suzhou Veichi Electric Technology Co., Ltd., Wuzhong District, Suzhou. We deeply
understand the importance of personal information to you and are committed to protecting the personal information and privacy security of
users (collectively referred to as "users" or "you") who use our products and services (collectively referred to as "VEICHI IOT"). When
you use VEICHI IOT, we may collect and use your relevant personal information (or "personal information").
The "VEICHI IOT Privacy Policy" (hereinafter referred to as "this Policy") applies to the VEICHI IOT services we provide. Users under the
age of eighteen, please read this Policy accompanied by a legal guardian, paying special attention to the terms for minors. Specifically,
if you are a child under 14 years old, you may use VEICHI IOT services only with the consent of your guardian.
We hope to explain to you through this Policy the processing rules corresponding to the collection and use of your relevant personal
information, as well as the methods we provide for you to access, correct, delete, and protect this personal information, in order to
better protect your rights.
This Policy will help you understand the following:
1. What Personal Information We Collect
2. How We Use Your Personal Information
3. Use of Cookie Technology
4. Third-party SDK Usage
5. Purpose of Obtaining Mobile Permissions
6. How We Entrust Processing, Share, Transfer, and Publicly Disclose Your Personal Information
7. General Storage Period
8. How We Ensure Your Information Security
9. Your Rights
10. How We Handle Children's Personal Information
11. Storage Location and Cross-border Transfer of Your Personal Information
12. Scope of Inapplicability of This Personal Information Protection Policy
13. How This Personal Information Protection Policy is Updated
14. Access and Update Notification of Privacy Policy
15. Contact Us
Please read this Personal Information Protection Policy carefully, especially the exemption/limitation of liability clauses (marked in
bold), because by using our services, you agree to the practices described in the Personal Information Protection Policy and supplementary
provisions. If you do not agree with the practices described in this Personal Information Protection Policy, you will not be able to use
our services.
1. What Personal Information We Collect
In order to provide you with our services, we will require you to provide the personal information necessary to provide you with the
services. If you do not provide personal information, we may not be able to provide you with our products or services. "Personal
information" refers to various information recorded electronically or by other means that can identify a specific natural person alone
or in combination with other information, or reflect the activities of a specific natural person.
1. Personal information provided by you: Certain services require you to provide information directly to us, such as login, modifying
mobile phone number, modifying password, nickname, and avatar.
(1) Login: When you log in to VEICHI IOT, you need to enter your username and password.
2. Personal information from devices: We may also collect information related to your use of our services through SDK/APP, such as
device information, log information, and location information.
(1)Device Information: When you use VEICHI IOT, we may read information related to your mobile device,
including device manufacturer, device model, operating system, unique device identifier (Android side such as Android ID/OAID, iOS side
such as IDFA before iOS 14.5), software version number, method of accessing the network, type and status, network quality data, hardware
model, sensor information, device serial number, IMEI number, and settings of the device used to access the services; read the usage of
VEICHI IOT you use, including device operating status, device parameters, some built-in device cameras may capture the usage of the
device, application information installed on the device, running process information, or data stored in the device memory.
(2)Log Information: When you use VEICHI IOT, VEICHI IOT automatically receives and records information on
your browser and device, including (a) browser type, language used, access date and time, software and hardware characteristic
information, and the web page record data you need; (b) log information of your device.
(3)Location Information (only applicable to specific services/functions): When you download or use VEICHI
IOT, and when using VEICHI IOT, we may read various types of information related to your location, such as the device's GPS signal or
nearby WiFi access points and mobile phone signal tower related information, country code, city code, cell identifier, latitude and
longitude information, and language settings. This information may be transmitted to us when you use the above services.
3. Device permission calls: VEICHI IOT may call your device permissions. The following are the business functions corresponding to the
permission calls, the purpose of our permission calls, and the situation of asking you before calling the permission.
Device Permission Purpose of Permission Call Whether to Ask User Whether Can Close
Camera Need to take avatar, work site photos First use of corresponding function pop-up inquiry Yes
Photos Need to upload avatar, work site photos First use of corresponding function pop-up inquiry Yes
Notifications Need to send messages via notifications iOS client first open APP pop-up inquiry Yes
Location Need to obtain device location to record device location First use of corresponding function
pop-up inquiry Yes
Wireless Data Need network request APP related function data iOS client will ask when first opening APP
Yes
Storage Need to store work order pictures Android client will ask when first storing photos Yes
Clipboard Need to facilitate user copy and paste input First use according to system requirements whether
to pop-up inquiry Yes
Bluetooth Need to connect your phone's Bluetooth to search for Bluetooth devices, connect Bluetooth
devices for read and write data First use according to system requirements whether to pop-up inquiry Yes
2. How We Use Your Personal Information
The purpose of collecting personal information is to provide you with products and/or services, and to ensure that we comply with
applicable laws. We may use the collected personal information for the following purposes:
1. Login and register your VEICHI IOT account. The personal information collected when creating a VEICHI digital account through the
website is used to establish the user's personal VEICHI digital account and profile page.
2. Collecting account information is to help you complete VEICHI IOT registration and use the basic functions of VEICHI IOT, and to
protect the security of your account. Collecting and using mobile phone numbers is to meet the real identity information authentication
requirements of relevant laws and regulations. If you do not provide such information, you may not be able to use our services normally.
3. Collecting device manufacturer, device model, operating system, unique device identifier (Android side such as Android ID/OAID, iOS
side such as IDFA before iOS 14.5), login IP address, software version number, method of accessing the network, type and status, network
quality data, hardware model, sensor information, device serial number, IMEI number, device settings, device operating status, device
parameters, some built-in device cameras, is to ensure your normal use of our services, maintain the normal operation of our services,
improve and optimize our service experience, and protect the security of your account. At the same time, to prevent viruses, Trojan
programs or other malicious programs, and website attacks, we may collect information about applications installed on your device,
running process information, or data stored in the device memory to prevent the leakage of your personal information.
4. Evaluate and analyze the market, customers, products and services (including asking for your opinions on our products and services,
and conducting customer surveys), and improve user experience. We may combine personal information from one service with information
from other services to improve services and develop new products and services. We may use data from certain opt-in features (such as the
user experience program) to analyze how users use VEICHI IOT services and improve the user experience.
5. Send notifications. We may use your personal information from time to time to send important notifications, such as important device
information and business-related information.
6. Security management. To ensure the safe and stable operation of the services provided to you, we may use your device information and
log information from time to time.
7. Provide other VEICHI IOT services.
Please note that the above usage methods cover the main ways VEICHI IOT uses personal information. VEICHI IOT may from time to time
provide users with more diverse services by updating website pages, APP versions, or device firmware.
3. Use of Cookie Technology
1. Cookie Technology: When you visit VEICHI IOT related websites or use the services provided by VEICHI IOT, we may identify your
identity through small data files. This is done to save you the step of repeatedly entering registration information, or to help
determine the security of your account. These data files may be Cookies, Flash Cookies, or other local storage provided by your browser
or associated applications (collectively referred to as "Cookies").
Cookies are small files that store information on computers, TVs, mobile phones, or other devices. The entity that places Cookies on
your device can identify you across different websites, services, devices, and/or browsing sessions through Cookies. Cookies have many
uses. For example: Cookies can remember your login credentials so you don't have to enter them every time you log in to the service.
Cookies help us and third parties understand which parts of our services are most popular, because Cookies help us see which pages and
functions visitors visit, and how much time they spend on these pages. After understanding such information, we can more effectively
improve services and provide you with a better experience. Cookies collect information about your use of our services and other websites
and applications. If you use a web browser to access the service, you can configure the browser to accept all Cookies, reject all
Cookies, or notify you when Cookies are sent. Each browser is different, so please check the browser's "Help" menu to learn how to
change your Cookie preferences. Your device's operating system may contain other Cookie controls.
Please understand that some of our services can only be implemented by using "Cookies". If your browser or browser additional services
allow, you can modify the acceptance level of Cookies or reject Veichi's Cookies according to your preferences. You can clear all
Cookies saved on your computer. Most web browsers have the function of blocking Cookies. For methods to modify or delete Cookies, please
refer to the usage help of your browser. However, this action may in some cases affect your secure access to Veichi-related websites and
the use of services provided by Veichi.
4. Third-party SDK Usage
We conduct strict security testing on SDKs or similar applications and require partners to take strict measures to protect your personal
data. When meeting new service requirements and business function changes, we may adjust the third-party SDKs we integrate and promptly
disclose the latest situation of integrated third-party SDKs in this statement. Please note that third-party SDKs may have some changes
in data types due to version upgrades, policy adjustments, etc. Please refer to their official statements for details.
1. Basic principles involved in data usage with partners
In the process of cooperating with partners, we will comply with the following principles:
a) Legitimacy principle: Data processing activities shall comply with the principle of legality.
b) Justification and minimum necessity principle: Data usage must have legitimate purposes and should be limited to what is necessary to
achieve the purposes.
c) Security and prudence principle: We will prudently evaluate the purposes of partners' data usage, comprehensively assess their
security capabilities, and require them to comply with cooperation legal agreements. We will conduct strict security monitoring on the
software tool development kits (SDKs) and application programming interfaces (APIs) used by partners to obtain information to protect
data security.
Currently, the third-party SDKs integrated by this application are as follows:
Third-party SDK Name: Google Maps Location SDK
Types of Personal Data Collected:
1. Location information (latitude and longitude, precise location, approximate location): To return user location information to the
application, and enable developers to provide corresponding services based on user location information; To facilitate after-sales
dispatch personnel to better locate and clock in to obtain location information;
2. Device information (such as IP address, GNSS information, WiFi status, WiFi parameters, WiFi list, SSID, BSSID, base station
information, WiFi signal strength information, Bluetooth information, sensor information (vector, acceleration, pressure), device signal
strength information, external storage directory): To help developers provide users with positioning and assisted positioning, and
provide developers with more accurate location information of end users;
3. Device identification information (IDFA, OAID), current application information (application name, application version number),
device parameters and system information (system properties, device model, operating system, operator information): To improve the
accuracy and success rate of positioning services, track, troubleshoot, diagnose, and count various problems in services, and ensure the
safe and normal operation of products and services;
Purpose of Use: Obtain user location information to improve user experience
5. Purpose of Obtaining Mobile Permissions
1. Location Permission
1.1 Location permission is required in device distribution to display the address where the device is located
2. Camera Permission
2.1 During app usage, access to your phone's camera permission is required for image upload operations
2.2 In device addition, scan function is needed to identify Bluetooth information
3. Bluetooth Permission
3.1 During app usage, connection to your phone's Bluetooth is required to search for Bluetooth devices, connect to Bluetooth devices for
read and write data
6. How We Entrust Processing, Share, Transfer, and Publicly Disclose Your Personal Information
1. Entrusted Processing
Some specific modules or functions in this business function are provided by external suppliers. For example, we hire service providers
to assist us in providing customer support.
For companies, organizations, and individuals that we entrust to process personal information, we will sign strict confidentiality
agreements with them, requiring them to process personal information in accordance with our requirements, this Personal Information
Protection Policy, and any other relevant confidentiality and security measures.
2. Sharing
Without your consent, we will not share your information with third parties outside VEICHI IOT.
However, we may share your information with the following third parties:
(1) Suzhou Veichi Electric Technology Co., Ltd. To protect Veichi or other users or the public from personal and property safety
hazards, your personal information may be shared among Veichi's affiliated companies. We will only share necessary personal information.
If we share your sensitive personal information or affiliated companies change the purpose of personal information use and processing,
we will seek your authorization and consent again.
(2) Authorized partners. We may share your information with trusted authorized partners. We may share your account information and
device information with authorized partners to ensure the smooth completion of services provided to you. However, we will only share
your personal information for legal, legitimate, necessary, specific, and clear purposes, and will only share personal information
necessary to provide the services. Our partners have no right to use shared personal information for any other purpose. Currently, our
authorized partners include the following types:
a. Authorized partners for analysis services.
b. Suppliers, service providers and other partners. Our suppliers and service providers include institutions and financial institutions
that provide technical services, telecommunications services, customer services, risk control services, audit services, and legal
services.
For companies, organizations, and individuals with whom we share personal information, we will sign strict confidentiality agreements
with them, and require them in an appropriate manner to process personal information in accordance with our instructions, this Personal
Information Protection Policy, and any other relevant confidentiality and security measures. For the use of sensitive personal data, we
require third parties to adopt encryption technology to better protect user data. Once found violating the agreement, effective measures
will be taken or even cooperation will be terminated.
Purposes reasonably necessary to comply with mandatory requirements of laws and regulations, court orders or requirements of government
authorities, safeguard public interests, or protect the personal and property safety or legitimate rights and interests of our
customers, Veichi or Veichi employees.
(3) Other parties with your separate consent. In addition to the sharing situations described in this Personal Information Protection
Policy, we may also share your information with third parties when you consent to sharing or make a sharing request.
(4) Directly related to national security and national defense security;
(5) Directly related to public security, public health, and major public interests;
(6) Directly related to criminal investigation, prosecution, trial and execution of judgments;
(7) Necessary for safeguarding the life, property and other major legitimate rights and interests of you or other individuals but
difficult to obtain the consent of the individual;
(8) Personal information that you have made public on your own;
(9) Personal information collected from legally publicly disclosed information, such as legal news reports and government information
disclosure channels.
(10) Necessary for concluding and performing a contract as requested by the personal information subject;
(11) Necessary for ensuring the safe and stable operation of the provided products or services, for example, discovering and handling
faults of the products or services;
(12) Other circumstances stipulated by laws and regulations.
According to legal provisions, sharing and transferring de-identified personal information, and ensuring that the data recipient cannot
restore and re-identify the personal information subject, does not belong to the external sharing, transfer and public disclosure of
personal information. The storage and processing of such data will not require separate notification to you and your consent.
3. Transfer
We will not transfer your personal information to any company, organization or individual, except in the following circumstances:
(1) After obtaining your explicit consent;
(2) In the event of merger, acquisition or bankruptcy liquidation, if personal information transfer is involved, we will require the new
company or organization holding your personal information to continue to be bound by this Personal Information Protection Policy,
otherwise we will require the company or organization to seek your authorization and consent again.
(3) Directly related to national security and national defense security;
(4) Directly related to public security, public health, and major public interests;
(5) Directly related to criminal investigation, prosecution, trial and execution of judgments;
(6) Necessary for safeguarding the life, property and other major legitimate rights and interests of you or other individuals but
difficult to obtain the consent of the individual;
(7) Personal information that you have made public on your own;
(8) Personal information collected from legally publicly disclosed information, such as legal news reports and government information
disclosure channels.
(9) Necessary for concluding and performing a contract as requested by the personal information subject;
(10) Necessary for ensuring the safe and stable operation of the provided products or services, for example, discovering and handling
faults of the products or services;
(11) Other circumstances stipulated by laws and regulations.
According to legal provisions, sharing and transferring de-identified personal information, and ensuring that the data recipient cannot
restore and re-identify the personal information subject, does not belong to the external sharing, transfer and public disclosure of
personal information. The storage and processing of such data will not require separate notification to you and your consent.
4. Public Disclosure We will only publicly disclose your personal information under the following circumstances:
(1) After obtaining your explicit consent;
(2) Disclosure based on law: Under circumstances of mandatory requirements of laws and regulations, court orders or requirements of
government authorities, we will publicly disclose your personal information.
(3) Directly related to national security and national defense security;
(4) Directly related to public security, public health, and major public interests;
(5) Directly related to criminal investigation, prosecution, trial and execution of judgments;
(6) Necessary for safeguarding the life, property and other major legitimate rights and interests of you or other individuals but
difficult to obtain the consent of the individual;
(7) Personal information that you have made public on your own;
(8) Personal information collected from legally publicly disclosed information, such as legal news reports and government information
disclosure channels.
(9) Necessary for concluding and performing a contract as requested by the personal information subject;
(10) Necessary for ensuring the safe and stable operation of the provided products or services, for example, discovering and handling
faults of the products or services;
(11) Other circumstances stipulated by laws and regulations.
According to legal provisions, sharing and transferring de-identified personal information, and ensuring that the data recipient cannot
restore and re-identify the personal information subject, does not belong to the external sharing, transfer and public disclosure of
personal information. The storage and processing of such data will not require separate notification to you and your consent.
7. General Storage Period
Unless otherwise expressly provided by law or with your permission, we will only retain your personal information for the period
necessary for the purposes described in this Personal Information Protection Policy. In order to maintain the continuity of services and
the consistency of user experience, personal information is usually not deleted immediately after the completion of a single service.
During your use of VEICHI products and services, we will continue to store your personal information for you. If you cancel your account
or actively delete the above information, we will save your information in accordance with the provisions of the Cybersecurity Law and
other laws and regulations. After you cancel your account or actively delete the above information, we will no longer commercially use
your personal information, but we may use your personal information after anonymization.
If you cancel your account, actively delete personal information, or the information exceeds the necessary storage period, we will
delete or anonymize your personal information, except in the following circumstances:
• Comply with legal requirements for information retention (for example: the "E-commerce Law" stipulates that commodity and service
information and transaction information shall be kept for not less than three years from the date of transaction completion).
• Reasonable extension of the period is required for financial, audit, dispute resolution and other purposes.
8. How We Ensure Your Information Security
1. Data Security Technical Measures
We have used security protection measures that comply with industry standards to protect the personal information you provide,
preventing data from unauthorized access, public disclosure, use, modification, damage or loss. We will take all reasonably feasible
measures to protect your personal information. For example, when exchanging data (such as credit card information) between your browser
and the "service", it is protected by SSL encryption; we also provide https secure browsing for some websites; we use encryption
technology to ensure data confidentiality; we use md5 encryption mechanism to hash and save user passwords; we use trusted protection
mechanisms to prevent data from malicious attacks; we deploy access control mechanisms to ensure that only authorized personnel can
access personal information; to ensure your information security, we strive to take various reasonable physical, electronic and
management security measures to protect your information, so that your information will not be leaked, damaged or lost, including but
not limited to SSL, information encryption storage, and data center access control.
We manage and standardize the storage and use of personal information by establishing data security management specifications and data
security development specifications. We will hold security and personal information protection training courses to strengthen employees'
awareness of the importance of protecting personal information. We also strictly manage employees or outsourcing personnel, supplier
partners who may have access to your information, including but not limited to adopting different permission controls according to
different positions, signing confidentiality agreements and data processing agreements with them, and monitoring their operations.
Veichi will provide corresponding security measures according to existing technology to protect your information and provide reasonable
security guarantees. Veichi will try its best to prevent your information from being leaked, damaged or lost.
2. The Internet environment is not 100% secure. We will strive to ensure or guarantee the security of any information you send to us. If
our physical, technical, or management protection facilities are damaged, resulting in unauthorized access, public disclosure,
tampering, or destruction of information, causing damage to your legitimate rights and interests, we will formulate emergency plans for
network security incidents, promptly dispose of system vulnerabilities, computer viruses, network attacks, network intrusions and other
security risks. When a network security incident occurs, we will immediately activate the emergency plan, take corresponding remedial
measures, and report to the relevant competent authorities in accordance with regulations.
3. After the occurrence of a personal information security incident, we will inform you in accordance with the requirements of laws and
regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take,
suggestions for your independent prevention and risk reduction, and remedial measures for you. We will inform you of the relevant
situation of the incident in a timely manner.
4. Your account has security protection functions. Please keep your account and password information properly. At the same time, to
ensure your information security, please ensure that you log out of your account and delete the paired website or APP before permanently
selling or transferring your device usage rights to a third party, to ensure that your device is no longer (re)matched to your account.
If you are selling a device, you should reset the device and restore factory settings. In this way, your device will no longer be
associated with your account. If you purchase a second-hand device, please check the account settings in the APP or the device
manufacturer to ensure that no unknown users are associated with your device. If you have any questions, you can choose to restore
factory settings. Veichi will ensure that your information is not lost, misused or altered through backup and encryption security
measures for user passwords. Despite the aforementioned security measures, please understand that there is no "perfect security measure"
on the information network.
9. Your Rights
In accordance with China's relevant laws, regulations, standards, and common practices in other countries and regions, we guarantee you
the following rights over your personal information:
1. Access to your personal information
You have the right to access your personal information. If you want to exercise your right of data access, you can access it yourself in
the following ways. Account information: If you want to access or edit the personal profile information in your account, change your
password, modify your mobile phone number or cancel your account, you can perform such operations by accessing the settings page after
logging into your account. Log in to the VEICHI IOT APP, enter the [My] page in the lower right corner, and you can access your avatar,
account name, and mobile phone number.
2. Correct your personal information
When you find errors in the personal information we process about you, you have the right to make corrections yourself or ask us to make
corrections. For account information, you can perform such operations by accessing the settings page after logging into your account.
For other personal information, please contact us through the contact method listed in Section 15.
3. Delete your personal information
Under the following circumstances, you can request us to delete personal information:
(1) If our processing of personal information violates laws and regulations;
(2) If we collect and use your personal information without obtaining your consent;
(3) If our processing of personal information violates the agreement with you;
(4) If you cancel your account;
(5) If we no longer provide you with products and services.
When you delete information from our services, we may not immediately delete the corresponding information from the backup system, but
will delete it when the backup is updated. After you cancel your account or actively delete the above information, we will no longer
commercially use your personal information, but we may use your personal information after anonymization.
4. Change the scope of your authorization and consent
You can submit a request to revoke the permission for us to collect, use and/or disclose your personal information that we hold or
control. You can contact us through the contact method listed in Section 15 for related operations. We will process your request within
a reasonable time after you make the request, and based on your request, we will no longer collect, use and/or disclose your personal
information thereafter. Please note that since each business scenario requires some basic personal information to be completed, your
revocation of consent may make some Veichi services unavailable.
You can close the corresponding permissions (including location, photos, microphone, camera, notifications, etc.) through the settings
function of the mobile device, and withdraw the authorization to obtain your personal information.
After you withdraw your consent, we will no longer process the corresponding personal information. However, your decision to withdraw
consent will not affect the previous personal information processing based on your authorization.
5. Cancel account
You can contact us through the contact method listed in Section 15 at any time to cancel the previously registered account.
Canceling your account will affect your normal use of all related applications and services. We kindly remind you that canceling your
Veichi account will cause you many inconveniences in subsequent use of Veichi services. After canceling your Veichi account, we will
stop providing services to you. Your personal information will remain irretrievable and inaccessible, or will be anonymized, unless
otherwise stipulated by laws and regulations. If you log in through a third-party account, you need to contact the third party to cancel
the account.
6. If you cannot access, correct, or delete personal information, withdraw consent, or cancel your account through the above methods,
you can contact us through the contact method listed in Section 15. We may need to verify your identity and will respond or provide a
reasonable explanation within 15 working days after verifying your identity.
10. How We Handle Children's Personal Information
Our services are mainly for adults
a) If you are a minor under the age of 18, before using Veichi and related services, you should read and agree to this privacy policy
under the supervision and guidance of your parents or other guardians.
If we find that we have collected personal information from minors without prior verifiable parental or guardian consent, we will try to
delete the relevant data as soon as possible. If parents or guardians have reason to believe that minors have submitted personal
information to Veichi without their prior consent, please contact us to ensure the deletion of such personal information, and ensure
that minors unsubscribe from any applicable Veichi services.
11. Storage Location and Cross-border Transfer of Your Personal Information
The personal information we collect and generate within the territory of the People's Republic of China will be stored within the
territory of the People's Republic of China, will not be transferred abroad, and will only be processed within the territory of the
People's Republic of China.
12. Scope of Inapplicability of This Personal Information Protection Policy
Our personal information protection policy does not apply to products and services provided by third parties. Veichi products and
services may include third-party products and services, as well as links to third-party websites. When you use these products or
services, your information may also be collected. Therefore, we strongly recommend that you take time to read the third party's personal
information protection policy, just like reading our policy. We are not responsible for how third parties use the personal information
they collect from you, nor can we control their use. Our personal information protection policy does not apply to other websites linked
through our services.
Use of third-party functions: You may use third-party services through the application terminal provided by Veichi, such as opening,
accessing, browsing, retrieving or registering and logging in to video websites, music applications, map applications, and weather query
applications. You need to comply with the third party's terms of service and personal information protection policy when using
third-party functions.
13. How This Personal Information Protection Policy is Updated
Our personal information protection policy may change. Without your explicit consent, we will not reduce your rights under this Personal
Information Protection Policy. We will post any changes to this Personal Information Protection Policy on this page. For major changes,
we will also provide more prominent notice (including for certain services, we will send notifications via email explaining the specific
changes to the personal information protection policy). Major changes referred to in this Policy include but are not limited to:
1. Major changes in our service model (such as the purpose of processing personal information, the type of personal information
processed, and the way personal information is used);
2. Major changes in our ownership structure (such as changes in ownership caused by business adjustments, bankruptcy mergers and
acquisitions);
3. Major changes in the main objects of personal information public disclosure;
4. Major changes in the rights involved in personal information processing and their exercise methods;
5. Changes in the responsible department, contact method, and complaint channel for our personal information security processing;
6. When the personal information security impact assessment report indicates a high risk.
14. Access and Update Notification of Privacy Policy
1. Access
a. You can view this privacy policy on the [Privacy Policy] page of the login page.
b. Please understand that in order to meet operational needs, we may develop different versions based on the mobile phone model, system
version, mobile client and other factors you use. Therefore, when you use a specific version, the corresponding functions may be
different from those described in this privacy policy, but it will not affect the purpose, method and scope of data processing. The
specific available functions are subject to your actual use.
2. Update and Notification
a. In order to provide you with better services, Veichi products and services will be updated and changed from time to time, and we will
revise this privacy policy in a timely manner. Without your explicit consent, we will not reduce the rights you should enjoy under the
currently effective privacy policy.
b. After this privacy policy is updated, we will issue an updated version on Veichi and notify you of the updated content through
station letters or other appropriate methods so that you can keep up with the latest version of this privacy policy in a timely manner.
c. We may also help you better manage your personal information through function updates. Please pay attention to the relevant function
descriptions.
15. Contact Us
1. Contact Information
If you have any questions or suggestions about personal information protection, you can contact us in the following ways:
a) Email: yy759422344@163.com
b) Customer Service Hotline: 400-600-0303
2. Responding to Your Requests
To ensure security, you may need to provide a written request or prove your identity in other ways. Generally, we will reply within 15
working days. If you are not satisfied with our reply, especially if our personal information processing behavior has damaged your
legitimate rights and interests, you can also complain or report to regulatory authorities such as cyberspace administration,
telecommunications, public security, and industry and commerce.
We may first ask you to verify your identity before processing your request. We will respond within 15 working days. If you are not
satisfied, you can also contact us for complaints through the contact information listed in this section.
For your reasonable requests, we do not charge fees in principle, but for repeated requests multiple times that exceed reasonable
limits, we will charge a certain cost fee as appropriate. For those unreasonable repeated requests that require excessive technical
means (for example, requiring the development of new systems or fundamental changes to current practices), pose risks to the legitimate
rights and interests of others, or are very impractical (for example, involving information stored on backup tapes), we may refuse them.
In the following circumstances, according to legal requirements, we will be unable to respond to your request:
(1) Related to national security and defense security;
(2) Related to public security, public health, and major public interests;
(3) Related to criminal investigation, prosecution, trial and execution of judgments;
(4) Necessary for safeguarding the life, property and other major legitimate rights and interests of the personal information subject or
other individuals but difficult to obtain the consent of the individual;
(5) The personal information involved is made public by the personal information subject or guardian on their own;
(6) Collected from legally publicly disclosed information, such as legal news reports and government information disclosure channels;
(7) Necessary for concluding and performing a contract as requested by the personal information subject;
(8) Necessary for ensuring the safe and stable operation of the provided products and/or services, for example, discovering and handling
faults of the products and/or services;
(9) Necessary for legitimate news reporting;
(10) Necessary for academic research institutions to carry out statistics or academic research based on public interests, and when
providing academic research or description results to the outside world, the personal information contained in the results is
de-identified;
(11) Other circumstances stipulated by laws and regulations.
Official Website: [https://www.veichi.com] Thank you for your trust and support!