Beijing Huitongtianxia Logistics and Technology Co., Ltd. (hereinafter referred to as "the company" or "we") is the operator of G7_lite (hereinafter referred to as "the software"), and we attach great importance to the privacy of users and the protection of personal information. When you use our products or services, we may collect and use your relevant information. We hope to explain to you through the "G7_lite Privacy Policy" ("this Privacy Policy") how we collect, use, save, share and transfer this information when you use our products or services, and how we provide you with access, updates , delete and protect this information. This policy will help you understand the following:
1. How we collect and use your personal information
2. How we use cookies and similar technologies
3. How do we share, transfer and publicly disclose your personal information
4. How we protect and save your personal information
5. How do you manage personal information
6. Protection of information of minors
7. Notices and Amendments
This privacy policy is closely related to the G7_lite service you use and the various business functions included in the service (hereinafter collectively referred to as "our products or services"). We hope you read it carefully before using our products or services and confirm that you have fully Understand what is written in this policy and allow you to make the choices you deem appropriate in accordance with the guidelines of this privacy policy. For the relevant terms involved in this Privacy Policy, we try to be concise and concise, and provide links to further explanations for your better understanding. If you use or continue to use our products or services after we update this Privacy Policy (we will prompt you to update in a timely manner), it means that you agree to the contents of this Privacy Policy (including the updated version) and agree that we will follow this Privacy Policy in accordance with the Collect, use, save and share information about you.
1. How we collect and use your personal information
The personal information involved in this Privacy Policy refers to various information recorded electronically or in other ways that can identify the identity of a specific natural person or reflect the activities of a specific natural person alone or in combination with other information. The personal information involved in this privacy policy includes: basic information (including personal name, birthday, gender, address, personal phone number, e-mail address, etc.); personal identification information (including ID card, driver's license, etc.); network identification information ( Including system account number, IP address, email address and passwords, passwords, and password-protected answers related to the foregoing); personal Internet access records (including software browsing records, software usage records, and click records); personal commonly used equipment information (including hardware models, equipment MAC address, operating system type, unique device identification code in the software list (such as IMEI/android ID/IDFA/OPENUDID/GUID, SIM card IMSI information, etc., which describe the basic information of commonly used personal devices); personal location information (including itinerary information, precise positioning information, domicile/workplace location information, longitude and latitude, etc.); Personal sensitive information means that once leaked, illegally provided or abused, it may endanger personal and property safety, easily lead to damage to personal reputation, physical and mental health, or discriminatory treatment The personal sensitive information involved in this Privacy Policy includes: personal identification information (including ID cards, driver's licenses, etc.); network identification information (including account names, account nicknames, email addresses, and passwords related to the aforementioned accounts) ); other information (including personal phone number, mobile phone number, browsing history, residence/workplace location information, precise positioning information). Our products need to collect your device Mac address, unique device identification code (IMEI/android ID/IDFA) /OPENUDID/GUID, SIM card IMSI information) to provide statistical analysis services, and to calibrate the accuracy of report data through geographic location to provide basic anti-cheating capabilities.
(1) We will only collect and use your personal information for the following purposes:
1. To provide you with personalized services;
2. Help us design new services and improve existing service experience;
3. When we provide services, for identity verification, customer service, security prevention, fraud detection, archiving and backup purposes, to ensure the security of the products and services we provide to you and to improve the quality of products and services;
4. Carry out internal audit, data analysis and research to better improve our products, services and communication with users.
(2) Circumstances where you must authorize us to collect and use your personal information
Our products or services include core business functions and additional functions. The core business functions include product services such as monitoring large screens, risk and security event reminders, full image monitoring, trajectory playback, data statistical reports, vehicle management, driver management, fuel consumption management, etc., improving our products or services and ensuring account security. required function. We need to collect, store and use the above-mentioned information about you in order to realize the above-mentioned core business functions. If you do not provide relevant information, you will not be able to enjoy the products or services we provide. These features mainly include:
1. To realize the necessary functions of our products and services
We need to collect your personal information. When you log in to the software, you need to provide your account and password. We will verify your identity based on the account information you provide. In addition, when you create a user of this software, you need to provide the user's real identity information, including basic information (user name, avatar, gender, contact number, etc.), user information (email, user name, etc.), personal information (position , date of birth, employee code, department, etc.) to verify user identity and ensure the security of your account.
2. The functions necessary to improve our products or services
We may collect information such as your browsing records so that we can understand your preferences and provide data support for us to provide you with better products or services. We may also obtain you for the reasonable needs of providing services and improving service quality. other information. For information collected from your various devices, we may associate them so that we can provide you with consistent services on these devices. We may combine information from one service with information from other services in order to provide you with services, personalised content and recommendations.
3. Functions necessary to ensure transaction security
In order to improve the security of your system when you use our products or services, more accurately prevent phishing website fraud and protect account security, we may judge you by understanding your browsing history, your commonly used software information, device information, etc. account risks, and may record some links ("URLs") that we consider to be risky; we will also collect your device information to analyze the system problems of this software, count traffic and troubleshoot possible risks, or if you choose Troubleshoot when unusual information is sent to us.
(3) You can choose whether to authorize us to collect and use your personal information
1. In order to enable you to enjoy more convenient or more interesting services in the service of this software, thereby improving your service experience in this software, we may collect and use your personal information in the following additional functions. If you do not provide this personal information, you can still use our other functions, but you may not be able to use these additional functions or need to fill in some information repeatedly when using some attachment functions. These additional features include:
(1) Additional functions based on image upload: You can upload photos in this software to set your avatar, and we will use the photos you upload to identify and serve you.
(2) Additional functions based on system notifications: We will apply to you for this permission, so that the software can send notification messages to your device in time when there is a safety incident or risk in the vehicle, so as not to miss important messages.
2. The above additional functions may require you to enable us to access your photo album (picture library) and system notifications in your device, so as to realize the collection and use of the information involved in these functions. Please note that when you open these permissions, you authorize us to collect and use these personal information to achieve the above functions. If you close the permissions, you cancel these authorizations, and we will no longer continue to collect and use your personal information. information, nor can it provide you with the above-mentioned functions corresponding to these authorizations. Your decision to close the permission will not affect the processing of personal information previously based on your authorization.
(4) You are fully aware that in the following situations, we do not need your authorization and consent to collect and use personal information:
1. Related to national security and national defense security;
2. Those related to public safety, public health, and major public interests;
3. Related to criminal investigation, prosecution, trial and execution of judgments;
4. In order to protect the life and property of the personal information subject or other individuals, but it is difficult to obtain the consent of the individual;
5. The collected personal information is disclosed to the public by the subject of personal information;
6. Your personal information is collected from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels;
7. Necessary to sign a contract according to your request;
8. Necessary for maintaining the safe and stable operation of the products or services provided, such as discovering and disposing of faults in the products or services;
9. Necessary for legitimate news reporting;
10. When it is necessary for academic research institutions to carry out statistical or academic research based on public interests, and when providing the results of academic research or description to the outside world, the personal information contained in the results is de-identified;
11. Other circumstances stipulated by laws and regulations.
(5) Rules for the use of your personal information
1. We will use the personal information collected in accordance with the provisions of this Privacy Policy and in order to realize the functions of our products or services.
2. After collecting your personal information, we will de-identify the data through technical means, and the de-identified information will not be able to identify the subject. Please understand and agree that in this case, we have the right to use the de-identified information; and on the premise of not disclosing your personal information, we have the right to analyze the user database and make commercial use.
3. Please note that all personal information you provide when using our products or services will continue to be authorized by us during your use of our products or services unless you delete it or refuse us to collect it through system settings. When you cancel your account, we will stop using and delete your personal information.
4. We will collect statistics on the usage of our products or services, and may share these statistical information with the public or third parties to show the overall usage trends of our products or services. However, these statistics do not contain any identifying information about you.
5. When we display your personal information, we will desensitize your information by means of content replacement and anonymization to protect your information security.
6. When we want to use your personal information for other purposes not specified in this policy, or use the information collected for a specific purpose for other purposes, we will ask you in advance by making a check on your own initiative. consent.
2. How we use cookies and similar technologies
(1) Use of Cookies
1. In order to realize the personalized needs of your online experience, so that you can get an easier access experience. We send one or more small data files called Cookies on your computer or mobile device. Cookies assigned to you are unique and can only be read by the web server in the domain that issued the Cookies to you. We send you cookies to simplify your repeated login steps, store your vehicle driving records, risk status and other data to provide you with better services, and to help determine your login status and account or data security.
2. We will not use cookies for any purpose other than those described in this Privacy Policy. You can manage or delete cookies according to your preferences. You can clear all cookies saved on your device, most web browsers will automatically accept cookies, but you can usually modify the browser settings to reject cookies according to your needs; in addition, you can also clear all the saved cookies in the software Cookies. However, if you do this, you may need to personally change the user settings every time you visit the software website, and the corresponding information you have previously recorded will also be deleted, which may have a certain impact on the security of the services you use. .
(2) The use of network Beacon and similar technologies
In addition to cookies, we also use other similar technologies such as web beacons on our website. Our web pages often contain electronic images (called "single-pixel" GIF files or "web beacons"). We use network beacons in the following ways:
1. By using the network beacon on the software, the number of user visits is calculated, and the registered users of the software are identified through the visit cookie.
2. Provide you with personalized services through the obtained cookie information.
3. How do we share, transfer and publicly disclose your personal information
(1) Sharing
1. We will not share your personal information with any company, organization or individual, except in the following cases:
(1) Obtain your express consent or authorization in advance;
(2) Provided in accordance with applicable laws and regulations, requirements of legal procedures, mandatory administrative or judicial requirements;
(3) To the extent permitted by laws and regulations, it is necessary to protect the software operator, its affiliates or partners, you or other users of the software or the public interest, property or safety from damage. ;
(4) Only by sharing your information can we realize the core functions of our products or services or provide the products or services you need;
(5) To handle disputes or disputes between you and others according to your needs;
(6) Provided in accordance with the relevant agreements signed with you (including electronic agreements signed online and corresponding platform rules) or other legal documents;
(7) Use based on academic research;
(8) Use based on social and public interests that comply with laws and regulations.
2. We may share your personal information with our affiliates or partners. However, we will only share necessary personal information and are bound by the purposes stated in this Privacy Policy. At the same time, we will sign strict confidentiality agreements with our partners, requiring them to process your personal information in accordance with our instructions, this Privacy Policy and any other relevant confidentiality and security measures. If our affiliates or partners want to change the purpose of processing personal information, they will seek your authorization again.
(2) Transfer
We will not transfer your personal information to any companies, organizations and individuals, except in the following cases:
1. Obtain your express consent or authorization in advance;
2. Provided in accordance with applicable laws and regulations, requirements of legal procedures, mandatory administrative or judicial requirements;
3. Provided in accordance with the relevant agreements signed with you (including electronic agreements signed online and corresponding platform rules) or other legal documents;
4. When it comes to mergers, acquisitions, asset transfers or similar transactions, if it involves the transfer of personal information, we will require new companies and organizations that hold your personal information to continue to be governed by this Privacy Policy.
Otherwise, we will require the company or organization to seek authorization from you again.
(3) Public disclosure
We will only publicly disclose your personal information under the following circumstances and on the premise of taking industry-standard security protection measures:
1. According to your needs, disclose the personal information you designate in the disclosure method that you expressly agree to;
2. When it is necessary to provide your personal information according to the requirements of laws, regulations, mandatory administrative law enforcement or judicial requirements, we may publicly disclose your personal information according to the required type and disclosure method of personal information. Under the premise of compliance with laws and regulations, when we receive the above-mentioned request for information disclosure, we will require the issuance of corresponding legal documents, such as subpoenas or investigation letters. We strongly believe in being as transparent as possible about the information we are asked to provide, to the extent permitted by law. All requests are carefully reviewed to ensure they have a legitimate basis and are limited to data law enforcement has a legitimate right to obtain for specific investigative purposes. Under the premise of laws and regulations, the files we disclose are under the protection of encryption keys.
4. How we protect and save your personal information
(1) Our technologies and measures to protect your personal information
We take personal information security very seriously and take all reasonably practicable measures to protect your personal information:
1. Data security technical measures
We will adopt industry-standard security protection measures, including establishing reasonable system specifications and security technologies to prevent your personal information from being accessed, used and modified without authorization, and to avoid data damage or loss.
The network service of this software adopts encryption technology such as transport layer security protocol, and provides browsing services through https and other methods to ensure the security of user data during the transmission process.
This software adopts encryption technology to encrypt and save the user's personal information, and isolate it through isolation technology.
When using personal information, such as personal information display and personal information association calculation, we will use a variety of data desensitization technologies including content replacement and SHA256 to enhance the security of personal information in use.
This software uses strict data access control and multi-identity authentication technology to protect personal information and prevent data from being used illegally.
This software uses code security automatic inspection, data access log analysis technology to conduct personal information security audit.
2. Other security measures taken by this software to protect personal information
This software manages and regulates the storage and use of personal information by establishing a data classification and grading system, data security management specifications, and data security development specifications.
The software carries out comprehensive security control of data through confidentiality agreements, monitoring and auditing mechanisms for information contacts.
The software establishes a data security committee and sets up a full-time information protection department and a data security emergency response organization to promote and ensure the security of personal information.
Security certification and services. Our underlying cloud technology for storing your personal data has obtained the third-level certification of "Trusted Cloud" certification issued by the Data Center Alliance, passed the third-level security level protection certification of the Ministry of Public Security, and also obtained the ISO27000 certification.
Strengthen safety awareness. We also conduct security and privacy protection training courses to enhance employees' awareness of the importance of protecting personal information.
3. We only allow employees of the software operator and its affiliates and partners of the software who need to know the information to access personal information, and have set up strict access control and monitoring mechanisms for this purpose. We also require all personnel who may have access to your personal information to fulfill corresponding confidentiality obligations. If these obligations are not fulfilled, the above-mentioned persons may be held legally responsible or suspended from the cooperation relationship with this software.
4. We will take all reasonable and feasible measures to ensure that irrelevant personal information is not collected. We will only retain your personal information for as long as is necessary to achieve the purposes described in this policy, unless an extension of the retention period is required or permitted by law.
5. The Internet environment is not 100% secure, and we will try our best to ensure or guarantee the security of any information you send to us. If our physical, technical, or management protection facilities are damaged, resulting in unauthorized access, public disclosure, tampering, or destruction of information, resulting in damage to your legitimate rights and interests, we will assume corresponding legal responsibilities.
6. In order to deal with the possible risks of personal information leakage, damage and loss, the software has formulated a number of systems to clarify the classification and grading standards of security incidents and security vulnerabilities and the corresponding processing procedures. The software also establishes a special emergency response team for security incidents. In accordance with the requirements of security incident handling specifications, it starts security plans for different security incidents, stops losses, analyzes, locates, formulates remedial measures, and cooperates with relevant departments to trace and attack the source.
In the event of an unfortunate personal information security incident, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, and the measures you can take to prevent and reduce risks on your own. Recommendations, remedies for you, etc. At the same time, we will promptly notify you of the relevant information of the event by email, letter, telephone, push notification, etc. When it is difficult to inform the personal information subjects one by one, we will take a reasonable and effective way to publish an announcement. At the same time, we will also proactively report the handling of personal information security incidents in accordance with the requirements of regulatory authorities.
(II) Preservation of your personal information 1. Your personal information will be stored in the territory of the Republic of Singapore. If it is necessary to transmit your personal information to other countries, we will obtain your authorization and consent separately and require the recipient to handle these in accordance with local laws and regulations, our instructions, this Privacy Policy and any other relevant confidentiality and security measures Personal information. 2. Unless otherwise stipulated by laws and regulations, we will keep your personal information until the date of your account cancellation. After you cancel your account, we will delete or anonymize your personal information. 3. If we terminate the service or operation, we will notify you at least 30 days in advance, and delete or anonymize your personal information after the termination of the service or operation.
5. How do you manage your personal information
This software attaches great importance to your concern about personal information, and makes every effort to protect your rights to access, correct, delete and withdraw consent to your personal information, so that you have sufficient ability to protect your privacy and security. Your rights include:
1. Delete your personal information
Personal information that you can clear or delete directly from our product or service pages.
You may request us to delete personal information in the following circumstances:
(1) If our handling of personal information violates laws and regulations;
(2) If we collect and use your personal information without your consent;
(3) If our handling of personal information violates our agreement with you;
(4) If you cancel the account of this software;
(5) If we terminate the service and operation.
If we decide to respond to your deletion request, we will also notify the legal entities that have obtained your personal information from us and require them to delete it in a timely manner, unless otherwise required by laws and regulations, or these legal entities have obtained your separate authorization. When you delete information from our service, we may not delete the corresponding information from the backup system immediately, but will delete the information when the backup is updated.
2. Change the scope of your authorization or withdraw your authorization
You can change the scope of your authorization to continue to collect personal information or withdraw your authorization by deleting the information. You can also withdraw all authorization for us to continue to collect your personal information by canceling your account. Please understand that each business function requires some basic personal information to be completed. After you withdraw your consent or authorization, we cannot continue to provide you with the services corresponding to the withdrawal of consent or authorization, nor will we process your corresponding personal information. . However, your decision to withdraw your consent or authorization will not affect the previous processing of personal information based on your authorization.
3. Cancellation of account
You can directly cancel your account in our web products. After you cancel your account, we will stop providing you with products or services, and at your request, unless otherwise provided by laws and regulations, we will delete your personal information.
4. Respond to your request
If you cannot access, correct or delete your personal information through the above methods, or you need to access, correct or delete other personal information generated when you use our products or services, or you believe that the software violates any laws or regulations or You may file a complaint with your agreement regarding the collection or use of personal information. For security purposes, we may require a written request from you, or otherwise prove your identity, and we will respond to your request within 30 days of receiving your request and verifying your identity. For your reasonable requests, we do not charge fees in principle, but for repeated requests that exceed reasonable limits, we will charge a certain cost as appropriate. For those that are unnecessarily repetitive, require excessive technical means (eg, need to develop new systems or fundamentally change existing practices), pose risks to the legitimate rights and interests of others, or are highly impractical (eg, involve backing up information stored on tapes). requests, we may refuse them.
In the following cases, we will not be able to respond to your request in accordance with the requirements of laws and regulations:
(1) Related to national security and national defense security;
(2) Those related to public safety, public health, and major public interests;
(3) related to criminal investigation, prosecution and trial;
(4) There is sufficient evidence to show that you have subjective malice or abuse of rights;
(5) Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations.
6. Personal information protection of minors
1. This software attaches great importance to the protection of minors' personal information. If you are a minor under the age of 18, you should obtain the prior written consent of your parent or legal guardian before using our products or services. This software protects the personal information of minors in accordance with the relevant national laws and regulations.
2. For the collection of minors' personal information with the consent of parents or legal guardians, we will only use or publicly disclose this information when permitted by law, expressly consented by parents or guardians, or necessary to protect minors.
3. If we find that we have collected personal information of minors without the prior consent of a verifiable parent or legal guardian, we will try to delete the relevant data as soon as possible.
7. Notice and Amendment
1. In order to provide you with better services and with the development of this software business, this Privacy Policy will also be updated accordingly. However, we will not reduce your rights under this Privacy Policy without your express consent. We will issue an updated version on the website of the software and the mobile terminal of the software and remind you of the update of the relevant content through website announcements or other appropriate means before it takes effect. Please also visit the software to keep abreast of the latest privacy policy.
2. For major changes, we will also provide more prominent notices (we will explain the specific changes to the privacy policy by means of, but not limited to, emails, text messages or special reminders on the page). Material changes referred to in this policy include, but are not limited to:
(1) Significant changes in our service model, such as the purpose of processing personal information, the type of personal information processed, the way personal information is used, etc.;
(2) Significant changes in our ownership structure, organizational structure, etc., such as business adjustments, changes in owners caused by bankruptcy, mergers and acquisitions, etc.;
(3) The main objects of personal information sharing, transfer or public disclosure have changed;
(4) Significant changes in your rights to participate in the processing of personal information and the manner in which it is exercised;
(5) When there are changes to the responsible department, contact information and complaint channels that we are responsible for handling personal information security;
(6) When the personal information security impact assessment report indicates that there is a high risk.
3. We will also archive the old version of this policy for your review.