隐私政策

引言

北京汇通天下物联科技有限公司(以下简称“本公司”或“我们”)是G7_lite(以下简称“本软件”)的运营商,我们非常重视用户的隐私和个人信息保护。您在使用我们的产品或服务时,我们可能会收集和使用您的相关信息。我们希望通过《G7_lite隐私政策》(“本隐私政策”)向您说明我们在您使用我们的产品或服务时如何收集、使用、保存、共享和转让这些信息,以及我们为您提供的访问、更新、删除和保护这些信息的方式。 本政策将帮助您了解以下内容:

1、我们如何收集和使用您的个人信息

2、我们如何使用 Cookie 和同类技术

3、我们如何共享、转让、公开披露您的个人信息

4、我们如何保护和保存您的个人信息

5、您如何管理个人信息

6、未成年人信息的保护

7、通知和修订

本隐私政策与您所使用的G7_lite服务以及该服务所包括的各种业务功能(以下统称“我们的产品或服务”)息息相关,希望您在使用我们的产品或服务前仔细阅读并确认您已经充分理解本政策所写明的内容,并让您可以按照本隐私政策的指引做出您认为适当的选择。本隐私政策中涉及的相关术语,我们尽量简明扼要地表述,并提供进一步说明的链接,以便您更好地理解。您使用或在我们更新本隐私政策后(我们会及时提示您更新的情况)继续使用我们的产品或服务,即意味着您同意本隐私政策(含更新版本)内容,并且同意我们按照本隐私政策收集、使用、保存和共享您的相关信息。

一、我们如何收集和使用您的个人信息

本隐私政策中涉及的个人信息是指以电子或者其他方式记录的能够单独或者与其他信息结合识别特定自然人身份或者反映特定自然人活动情况的各种信息。本隐私政策中涉及的个人信息包括:基本信息(包括个人姓名、生日、性别、住址、个人电话号码、电子邮箱等);个人身份信息(包括身份证、驾驶证等);网络身份标识信息(包括系统账号、IP地址、邮箱地址及与前述有关的密码、口令、口令保护答案);个人上网记录(包括软件浏览记录、软件使用记录、点击记录);个人常用设备信息(包括硬件型号、设备MAC地址、操作系统类型、软件列表唯一设备识别码(如IMEI/android ID/IDFA/OPENUDID/GUID、SIM卡IMSI信息等在内的描述个人常用设备基本情况的信息);个人位置信息(包括行程信息、精准定位信息、住所/工作场所位置信息、经纬度等); 个人敏感信息是指一旦泄露、非法提供或滥用可能危害人身和财产安全,极易导致个人名誉、身心健康受到损害或歧视性待遇等的个人信息,本隐私政策中涉及的个人敏感信息包括:个人身份信息(包括身份证、驾驶证等);网络身份识别信息(包括账户名、账户昵称、邮箱地址及与前述账户有关的密码);其他信息(包括个人电话号码、手机号码、浏览记录、住所/工作场所位置信息、精准定位信息)。我们的产品需要收集您的设备Mac地址、唯一设备识别码(IMEI/android ID/IDFA/OPENUDID/GUID、SIM 卡 IMSI 信息)以提供统计分析服务,并通过地理位置校准报表数据准确性,提供基础反作弊能力。

(一)我们仅会出于以下目的,收集和使用您的个人信息:

1、为您提供个性化服务;

2、帮助我们设计新服务,提升现有服务体验;

3、在我们提供服务时,用于身份验证、客户服务、安全防范、诈骗检测、存档和备份用途,确保我们向您提供的产品和服务的安全性并提升产品和服务的质量;

4、开展内部审计、数据分析和研究,以更好的改善我们的产品、服务以及与用户之间的沟通。

(二)您须授权我们收集和使用您个人信息的情形

我们的产品或服务包括核心业务功能和附加功能。核心业务功能包含为实现监控大屏、风险及安全事件提醒、全图监控、轨迹回放、数据统计报表、车辆管理、司机管理、油耗管理等产品服务,改进我们的产品或服务及保障账户安全所必须的功能。我们需要收集、保存和使用上述与您有关的信息才能实现上述核心业务功能。如果您不提供相关信息,您将无法享受我们提供的产品或服务。这些功能主要包括:

1、实现我们的产品服务所必须的功能

我们需要收集您的个人信息,在您登陆本软件时,需要提供您的账户和密码,我们会根据您提供的账户信息验证您的身份。此外,在您创建本软件的用户时,需要提供创建用户的真实身份信息,包括基础信息(用户姓名、头像、性别、联系电话等)、用户信息(邮箱、用户名等)、个人信息(职位、出生日期、员工编码、所属部门等),用于验证用户身份,保证您的账户安全。

2、改进我们的产品或服务所必须的功能

我们可能会收集您的浏览记录等信息,以便我们了解您的偏好,为我们给您提供更好的产品或服务提供数据支撑,我们还可能为了提供服务及改进服务质量的合理需要而获得的您的其他信息。对于从您的各种设备上收集到的信息,我们可能会将它们进行关联,以便我们能在这些设备上为您提供一致的服务。我们可能会将来自某项服务的信息与来自其他服务的信息结合起来,以便为您提供服务、个性化内容和建议。

3、保障交易安全所必须的功能

为提高您使用我们的产品或服务时系统的安全性,更准确地预防钓鱼网站欺诈和保护账户安全,我们可能会通过了解您的浏览记录、您常用的软件信息、设备信息等手段来判断您的账号风险,并可能会记录一些我们认为有风险的链接(“URL”);我们也会收集您的设备信息对于本软件系统问题进行分析、统计流量并排查可能存在的风险,或在您选择向我们发送异常信息时予以排查。

(三)您可选择是否授权我们收集和使用您的个人信息的情形

1、为使您在使用本软件的服务中享受更便捷或更有乐趣的服务,从而提升您在本软件的服务体验,我们的以下附加功能中可能会收集和使用您的个人信息。如果您不提供这些个人信息,您依然可以使用我们的其他用功能,但您可能无法使用这些附加功能或在使用某些附件功能时需要重复填写一些信息。这些附加功能包括:

(1)基于图片上传的附加功能:您可以在本软件上传照片来设置您的头像,我们会使用您所上传的照片来识别为您服务。

(2)基于系统通知的附加功能:我们会向您申请获取此权限,以便本软件在车辆出现安全事件或风险时,及时发送通知消息给您的设备,以免您错过重要的消息。

2、上述附加功能可能需要您在您的设备中向我们开启您的相册(图片库)、系统通知的访问权限,以实现这些功能所涉及的信息的收集和使用。请您注意,您开启这些权限即代表您授权我们可以收集和使用这些个人信息来实现上述的功能,您关闭权限即代表您取消了这些授权,则我们将不再继续收集和使用您的这些个人信息,也无法为您提供上述与这些授权所对应的功能。您关闭权限的决定不会影响此前基于您的授权所进行的个人信息的处理。

(四)您充分知晓,以下情形中,我们收集、使用个人信息无需征得您的授权同意:

1、与国家安全、国防安全有关的;

2、与公共安全、公共卫生、重大公共利益有关的;

3、与犯罪侦查、起诉、审判和判决执行等有关的;

4、出于维护个人信息主体或其他个人的生命、财产等重大合法权益但又很难得到本人同意的;

5、所收集的个人信息是个人信息主体自行向社会公众公开的;

6、从合法公开披露的信息中收集的您的个人信息的,如合法的新闻报道、政府信息公开等渠道;

7、根据您的要求签订合同所必需的;

8、用于维护所提供的产品或服务的安全稳定运行所必需的,例如发现、处置产品或服务的故障;

9、为合法的新闻报道所必需的;

10、学术研究机构基于公共利益开展统计或学术研究所必要,且对外提供学术研究或描述的结果时,对结果中所包含的个人信息进行去标识化处理的;

11、法律法规规定的其他情形。

(五)您个人信息使用的规则

1、我们会根据本隐私政策的约定并为实现我们的产品或服务功能对所收集的个人信息进行使用。

2、在收集您的个人信息后,我们将通过技术手段对数据进行去标识化处理,去标识化处理的信息将无法识别主体。请您了解并同意,在此情况下我们有权使用已经去标识化的信息;并在不透露您个人信息的前提下,我们有权对用户数据库进行分析并予以商业化的利用。

3、请您注意,您在使用我们的产品或服务时所提供的所有个人信息,除非您删除或通过系统设置拒绝我们收集,否则将在您使用我们的产品或服务期间持续授权我们使用。在您注销账号时,我们将停止使用并删除您的个人信息。

4、我们会对我们的产品或服务使用情况进行统计,并可能会与公众或第三方共享这些统计信息,以展示我们的产品或服务的整体使用趋势。但这些统计信息不包含您的任何身份识别信息。

5、当我们展示您的个人信息时,我们会采用包括内容替换、匿名处理方式对您的信息进行脱敏,以保护您的信息安全。

6、当我们要将您的个人信息用于本政策未载明的其它用途时,或基于特定目的收集而来的信息用于其他目的时,会通过您主动做出勾选的形式事先征求您的同意。

二、我们如何使用 Cookie 和同类技术

(一)Cookies的使用

1、为实现您联机体验的个性化需求,使您获得更轻松的访问体验。我们会在您的计算机或移动设备上发送一个或多个名为Cookies的小数据文件,指定给您的Cookies是唯一的,它只能被将Cookies发布给您的域中的Web服务器读取。我们向您发送Cookies是为了简化您重复登录的步骤、存储您的车辆行驶记录、风险状况等数据进而为您提供更好地服务,并帮助判断您的登录状态以及账户或数据安全。

2、我们不会将Cookies 用于本隐私政策所述目的之外的任何用途。您可根据自己的偏好管理或删除Cookies。您可以清除您设备上保存的所有Cookies,大部分网络浏览器会自动接受Cookies,但您通常可根据自己的需要来修改浏览器的设置以拒绝Cookies;另外,您也可以清除软件内保存的所有Cookies。但如果您这么做,您可能需要在每一次访问本软件网站时亲自更改用户设置,而且您之前所记录的相应信息也均会被删除,并且可能会对您所使用服务的安全性有一定影响。

(二)网络Beacon和同类技术的使用

除 Cookie 外,我们还会在网站上使用网络Beacon等其他同类技术。我们的网页上常会包含一些电子图像(称为"单像素" GIF 文件或 "网络 beacon")。我们使用网络beacon的方式有:

1、通过在本软件上使用网络beacon,计算用户访问数量,并通过访问cookie辨认注册的本软件用户。

2、通过得到的cookies信息,为您提供个性化服务。

三、我们如何共享、转让、公开披露您的个人信息

(一)共享

1、我们不会任何公司、组织和个人共享您的个人信息,但以下情况除外:

(1)事先获得您明确的同意或授权;

(2)根据适用的法律法规、法律程序的要求、强制性的行政或司法要求所必须的情况下进行提供;

(3)在法律法规允许的范围内,为维护本软件运营商、本软件运营商的关联方或合作伙伴、您或其他本软件用户或社会公众利益、财产或安全免遭损害而有必要提供;

(4)只有共享您的信息,才能实现我们的产品或服务的核心功能或提供您需要的产品或服务;

(5)应您需求为您处理您与他人的纠纷或争议;

(6)符合与您签署的相关协议(包括在线签署的电子协议以及相应的平台规则)或其他的法律文件约定所提供;

(7)基于学术研究而使用;

(8)基于符合法律法规的社会公共利益而使用。

2、我们可能会将您的个人信息与我们的关联方或合作伙伴共享。但我们只会共享必要的个人信息,且受本隐私政策中所声明目的的约束。同时我们会与我们的合作伙伴签署严格的保密协定,要求其按照我们的说明、本隐私政策以及其他任何相关的保密和安全措施来处理您的个人信息。我们的关联方或合作伙伴如要改变个人信息的处理目的,将再次征求您的授权同意。

(二)转让

我们不会将您的个人信息转让给任何公司、组织和个人,但以下情况除外:

1、事先获得您明确的同意或授权;

2、根据适用的法律法规、法律程序的要求、强制性的行政或司法要求所必须的情况进行提供;

3、符合与您签署的相关协议(包括在线签署的电子协议以及相应的平台规则)或其他的法律文件约定所提供;

4、在涉及合并、收购、资产转让或类似的交易时,如涉及到个人信息转让,我们会要求新的持有您个人信息的公司、组织继续受本隐私政策的约束,否则,我们将要求该公司、组织重新向您征求授权同意。

(三)公开披露

我们仅会在以下情况下,且采取符合业界标准的安全防护措施的前提下,才会公开披露您的个人信息:

1、根据您的需求,在您明确同意的披露方式下披露您所指定的个人信息;

2、根据法律、法规的要求、强制性的行政执法或司法要求所必须提供您个人信息的情况下,我们可能会依据所要求的个人信息类型和披露方式公开披露您的个人信息。在符合法律法规的前提下,当我们收到上述披露信息的请求时,我们会要求必须出具与之相应的法律文件,如传票或调查函。我们坚信,对于要求我们提供的信息,应该在法律允许的范围内尽可能保持透明。我们对所有的请求都进行了慎重的审查,以确保其具备合法依据,且仅限于执法部门因特定调查目的且有合法权利获取的数据。在法律法规许可的前提下,我们披露的文件均在加密密钥的保护之下。

四、我们如何保护和保存您的个人信息

(一)我们保护您个人信息的技术与措施

我们非常重视个人信息安全,并采取一切合理可行的措施,保护您的个人信息:

1、数据安全技术措施

我们会采用符合业界标准的安全防护措施,包括建立合理的制度规范、安全技术来防止您的个人信息遭到未经授权的访问使用、修改,避免数据的损坏或丢失。

本软件的网络服务采取了传输层安全协议等加密技术,通过https等方式提供浏览服务,确保用户数据在传输过程中的安全。

本软件采取加密技术对用户个人信息进行加密保存,并通过隔离技术进行隔离。

在个人信息使用时,例如个人信息展示、个人信息关联计算,我们会采用包括内容替换、SHA256在内多种数据脱敏技术增强个人信息在使用中安全性。

本软件采用严格的数据访问权限控制和多重身份认证技术保护个人信息,避免数据被违规使用。

本软件采用代码安全自动检查、数据访问日志分析技术进行个人信息安全审计。

2、本软件为保护个人信息采取的其他安全措施

本软件通过建立数据分类分级制度、数据安全管理规范、数据安全开发规范来管理规范个人信息的存储和使用。

本软件通过信息接触者保密协议、监控和审计机制来对数据进行全面安全控制。

本软件建立数据安全委车员会并下设信息保护专职部门、数据安全应急响应组织来推进和保障个人信息安全。

安全认证和服务。我们存储您个人数据的底层云技术取得了数据中心联盟颁发的“可信云”认证三级认证、通过了公安部安全等级保护三级认证,同时还获得了ISO27000认证。

加强安全意识。我们还会举办安全和隐私保护培训课程,加强员工对于保护个人信息重要性的认识。

3、我们仅允许有必要知晓这些信息的本软件运营商及本软件运营商关联方的员工、本软件的合作伙伴访问个人信息,并为此设置了严格的访问权限控制和监控机制。我们同时要求可能接触到您个人信息的所有人员履行相应的保密义务。如果未能履行这些义务,上述人员可能会被追究法律责任或被中止与本软件的合作关系。

4、我们会采取一切合理可行的措施,确保未收集无关的个人信息。我们只会在达成本政策所述目的所需的期限内保留您的个人信息,除非需要延长保留期或受到法律的允许。

5、互联网环境并非百分之百安全,我们将尽力确保或担保您发送给我们的任何信息的安全性。如果我们的物理、技术、或管理防护设施遭到破坏,导致信息被非授权访问、公开披露、篡改、或毁坏,导致您的合法权益受损,我们将承担相应的法律责任。

6、为应对个人信息泄露、损毁和丢失等可能出现的风险,本软件制定了多项制度,明确安全事件、安全漏洞的分类分级标准及相应的处理流程。本软件也为安全事件建立了专门的应急响应团队,按照安全事件处置规范要求,针对不同安全事件启动安全预案,进行止损、分析、定位、制定补救措施、联合相关部门进行溯源和打击。

在不幸发生个人信息安全事件后,我们将按照法律法规的要求,及时向您告知:安全事件的基本情况和可能的影响、我们已采取或将要采取的处置措施、您可自主防范和降低风险的建议、对您的补救措施等。我们同时将及时将事件相关情况以邮件、信函、电话、推送通知等方式告知您,难以逐一告知个人信息主体时,我们会采取合理、有效的方式发布公告。同时,我们还将按照监管部门要求,主动上报个人信息安全事件的处置情况。

(二)您个人信息的保存 1、您的个人信息将全被存储于新加坡共和国境内。如需要向其他国家传输您的个人信息的,我们会单独征得您的授权同意并要求接收方按照当地的法律法规、我们的说明、本隐私政策以及其他任何相关的保密和安全措施来处理这些个人信息。 2、除非法律法规另有规定,您的个人信息我们将保存至您账号注销之日。当您注销账户之后,我们会对您的个人信息进行删除或匿名化处理。 3、如果我们终止服务或运营,我们会至少提前三十日向您通知,并在终止服务或运营后对您的个人信息进行删除或匿名化处理。

五、您如何管理您的个人信息

本软件非常重视您对个人信息的关注,并尽全力保护您对于您个人信息访问、更正、删除以及撤回同意的权利,以使您拥有充分的能力保障您的隐私和安全。您的权利包括:

1、删除您的个人信息

您在我们的产品或服务页面中可以直接清除或删除的个人信息。

在以下情形中,您可以向我们提出删除个人信息的请求:

(1)如果我们处理个人信息的行为违反法律法规;

(2)如果我们收集、使用您的个人信息,却未征得您的同意;

(3)如果我们处理个人信息的行为违反了与您的约定;

(4)如果您注销了本软件账户;

(5)如果我们终止服务及运营。

若我们决定响应您的删除请求,我们还将同时通知从我们获得您的个人信息的法律实体,要求其及时删除,除非法律法规另有规定,或这些法律实体获得您的单独授权。当您从我们的服务中删除信息后,我们可能不会立即备份系统中删除相应的信息,但会在备份更新时删除这些信息。

2、改变您授权同意的范围或撤回您的授权

您可以通过删除信息方式改变您授权我们继续收集个人信息的范围或撤回您的授权。您也可以通过注销账户的方式,撤回我们继续收集您个人信息的全部授权。 请您理解,每个业务功能需要一些基本的个人信息才能得以完成,当您撤回同意或授权后,我们无法继续为您提供撤回同意或授权所对应的服务,也不再处理您相应的个人信息。但您撤回同意或授权的决定,不会影响此前基于您的授权而开展的个人信息处理。

3、注销账户

您可以在我们的网页端产品中直接注销账户,您注销账户后,我们将停止为您提供产品或服务,并依据您的要求,除法律法规另有规定外,我们将删除您的个人信息。

4、响应您的请求

如果您无法通过上述方式访问、更正或删除您的个人信息,或您需要访问、更正或删除您在使用我们产品或服务时所产生的其他个人信息,或您认为本软件存在任何违反法律法规或与您关于个人信息的收集或使用的约定,您可提出申诉。为了保障安全,我们可能需要您提供书面请求,或以其他方式证明您的身份,我们将在收到您请求并验证您的身份后的30天内答复您的请求。对于您合理的请求,我们原则上不收取费用,但对多次重复、超出合理限度的请求,我们将视情收取一定成本费用。对于那些无端重复、需要过多技术手段(例如,需要开发新系统或从根本上改变现行惯例)、给他人合法权益带来风险或者非常不切实际(例如,涉及备份磁带上存放的信息)的请求,我们可能会予以拒绝。

在以下情形中,按照法律法规要求,我们将无法响应您的请求:

(1)与国家安全、国防安全有关的;

(2)与公共安全、公共卫生、重大公共利益有关的;

(3)与犯罪侦查、起诉和审判等有关的;

(4)有充分证据表明您存在主观恶意或滥用权利的;

(5)响应您的请求将导致您或其他个人、组织的合法权益受到严重损害的。

六、未成年人的个人信息保护

1、本软件非常重视对未成年人个人信息的保护。若您是18周岁以下的未成年人,在使用我们的产品或服务前,应事先取得您家长或法定监护人的书面同意。本软件根据国家相关法律法规的规定保护未成年人的个人信息。

2、对于经父母或法定监护人同意而收集未成年人个人信息的情况,我们只会在受到法律允许、父母或监护人明确同意或者保护未成年人所必要的情况下使用或公开披露此信息。

3、如果我们发现自己在未事先获得可证实的父母或法定监护人同意的情况下收集了未成年人的个人信息,则会设法尽快删除相关数据。

七、通知和修订

1、为给您提供更好的服务以及随着本软件业务的发展,本隐私政策也会随之更新。但未经您明确同意,我们不会削减您依据本隐私政策所应享有的权利。我们会通过在本软件网站、本软件移动端上发出更新版本并在生效前通过网站公告或以其他适当方式提醒您相关内容的更新,也请您访问本软件以便及时了解最新的隐私政策。

2、对于重大变更,我们还会提供更为显著的通知(我们会通过包括但不限于邮件、短信或在页面做特别提示等方式,说明隐私政策的具体变更内容)。本政策所指的重大变更包括但不限于:

(1)我们的服务模式发生重大变化,如处理个人信息的目的、处理的个人信息类型、个人信息的使用方式等;

(2)我们在所有权结构、组织架构等方面发生重大变化,如业务调整、破产并购等引起的所有者变更等;

(3)个人信息共享、转让或公开披露的主要对象发生变化;

(4)您参与个人信息处理方面的权利及其行使方式发生重大变化;

(5)我们负责处理个人信息安全的责任部门、联络方式及投诉渠道发生变化时;

(6)个人信息安全影响评估报告表明存在高风险时。

3、我们还会将本策略的旧版本存档,供您查阅。

Privacy Policy

Beijing Huitongtianxia Logistics and Technology Co., Ltd. (hereinafter referred to as "the company" or "we") is the operator of G7_lite (hereinafter referred to as "the software"), and we attach great importance to the privacy of users and the protection of personal information. When you use our products or services, we may collect and use your relevant information. We hope to explain to you through the "G7_lite Privacy Policy" ("this Privacy Policy") how we collect, use, save, share and transfer this information when you use our products or services, and how we provide you with access, updates , delete and protect this information. This policy will help you understand the following:

1. How we collect and use your personal information

2. How we use cookies and similar technologies

3. How do we share, transfer and publicly disclose your personal information

4. How we protect and save your personal information

5. How do you manage personal information

6. Protection of information of minors

7. Notices and Amendments

This privacy policy is closely related to the G7_lite service you use and the various business functions included in the service (hereinafter collectively referred to as "our products or services"). We hope you read it carefully before using our products or services and confirm that you have fully Understand what is written in this policy and allow you to make the choices you deem appropriate in accordance with the guidelines of this privacy policy. For the relevant terms involved in this Privacy Policy, we try to be concise and concise, and provide links to further explanations for your better understanding. If you use or continue to use our products or services after we update this Privacy Policy (we will prompt you to update in a timely manner), it means that you agree to the contents of this Privacy Policy (including the updated version) and agree that we will follow this Privacy Policy in accordance with the Collect, use, save and share information about you.

1. How we collect and use your personal information

The personal information involved in this Privacy Policy refers to various information recorded electronically or in other ways that can identify the identity of a specific natural person or reflect the activities of a specific natural person alone or in combination with other information. The personal information involved in this privacy policy includes: basic information (including personal name, birthday, gender, address, personal phone number, e-mail address, etc.); personal identification information (including ID card, driver's license, etc.); network identification information ( Including system account number, IP address, email address and passwords, passwords, and password-protected answers related to the foregoing); personal Internet access records (including software browsing records, software usage records, and click records); personal commonly used equipment information (including hardware models, equipment MAC address, operating system type, unique device identification code in the software list (such as IMEI/android ID/IDFA/OPENUDID/GUID, SIM card IMSI information, etc., which describe the basic information of commonly used personal devices); personal location information (including itinerary information, precise positioning information, domicile/workplace location information, longitude and latitude, etc.); Personal sensitive information means that once leaked, illegally provided or abused, it may endanger personal and property safety, easily lead to damage to personal reputation, physical and mental health, or discriminatory treatment The personal sensitive information involved in this Privacy Policy includes: personal identification information (including ID cards, driver's licenses, etc.); network identification information (including account names, account nicknames, email addresses, and passwords related to the aforementioned accounts) ); other information (including personal phone number, mobile phone number, browsing history, residence/workplace location information, precise positioning information). Our products need to collect your device Mac address, unique device identification code (IMEI/android ID/IDFA) /OPENUDID/GUID, SIM card IMSI information) to provide statistical analysis services, and to calibrate the accuracy of report data through geographic location to provide basic anti-cheating capabilities.

(1) We will only collect and use your personal information for the following purposes:

1. To provide you with personalized services;

2. Help us design new services and improve existing service experience;

3. When we provide services, for identity verification, customer service, security prevention, fraud detection, archiving and backup purposes, to ensure the security of the products and services we provide to you and to improve the quality of products and services;

4. Carry out internal audit, data analysis and research to better improve our products, services and communication with users.

(2) Circumstances where you must authorize us to collect and use your personal information

Our products or services include core business functions and additional functions. The core business functions include product services such as monitoring large screens, risk and security event reminders, full image monitoring, trajectory playback, data statistical reports, vehicle management, driver management, fuel consumption management, etc., improving our products or services and ensuring account security. required function. We need to collect, store and use the above-mentioned information about you in order to realize the above-mentioned core business functions. If you do not provide relevant information, you will not be able to enjoy the products or services we provide. These features mainly include:

1. To realize the necessary functions of our products and services

We need to collect your personal information. When you log in to the software, you need to provide your account and password. We will verify your identity based on the account information you provide. In addition, when you create a user of this software, you need to provide the user's real identity information, including basic information (user name, avatar, gender, contact number, etc.), user information (email, user name, etc.), personal information (position , date of birth, employee code, department, etc.) to verify user identity and ensure the security of your account.

2. The functions necessary to improve our products or services

We may collect information such as your browsing records so that we can understand your preferences and provide data support for us to provide you with better products or services. We may also obtain you for the reasonable needs of providing services and improving service quality. other information. For information collected from your various devices, we may associate them so that we can provide you with consistent services on these devices. We may combine information from one service with information from other services in order to provide you with services, personalised content and recommendations.

3. Functions necessary to ensure transaction security

In order to improve the security of your system when you use our products or services, more accurately prevent phishing website fraud and protect account security, we may judge you by understanding your browsing history, your commonly used software information, device information, etc. account risks, and may record some links ("URLs") that we consider to be risky; we will also collect your device information to analyze the system problems of this software, count traffic and troubleshoot possible risks, or if you choose Troubleshoot when unusual information is sent to us.

(3) You can choose whether to authorize us to collect and use your personal information

1. In order to enable you to enjoy more convenient or more interesting services in the service of this software, thereby improving your service experience in this software, we may collect and use your personal information in the following additional functions. If you do not provide this personal information, you can still use our other functions, but you may not be able to use these additional functions or need to fill in some information repeatedly when using some attachment functions. These additional features include:

(1) Additional functions based on image upload: You can upload photos in this software to set your avatar, and we will use the photos you upload to identify and serve you.

(2) Additional functions based on system notifications: We will apply to you for this permission, so that the software can send notification messages to your device in time when there is a safety incident or risk in the vehicle, so as not to miss important messages.

2. The above additional functions may require you to enable us to access your photo album (picture library) and system notifications in your device, so as to realize the collection and use of the information involved in these functions. Please note that when you open these permissions, you authorize us to collect and use these personal information to achieve the above functions. If you close the permissions, you cancel these authorizations, and we will no longer continue to collect and use your personal information. information, nor can it provide you with the above-mentioned functions corresponding to these authorizations. Your decision to close the permission will not affect the processing of personal information previously based on your authorization.

(4) You are fully aware that in the following situations, we do not need your authorization and consent to collect and use personal information:

1. Related to national security and national defense security;

2. Those related to public safety, public health, and major public interests;

3. Related to criminal investigation, prosecution, trial and execution of judgments;

4. In order to protect the life and property of the personal information subject or other individuals, but it is difficult to obtain the consent of the individual;

5. The collected personal information is disclosed to the public by the subject of personal information;

6. Your personal information is collected from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels;

7. Necessary to sign a contract according to your request;

8. Necessary for maintaining the safe and stable operation of the products or services provided, such as discovering and disposing of faults in the products or services;

9. Necessary for legitimate news reporting;

10. When it is necessary for academic research institutions to carry out statistical or academic research based on public interests, and when providing the results of academic research or description to the outside world, the personal information contained in the results is de-identified;

11. Other circumstances stipulated by laws and regulations.

(5) Rules for the use of your personal information

1. We will use the personal information collected in accordance with the provisions of this Privacy Policy and in order to realize the functions of our products or services.

2. After collecting your personal information, we will de-identify the data through technical means, and the de-identified information will not be able to identify the subject. Please understand and agree that in this case, we have the right to use the de-identified information; and on the premise of not disclosing your personal information, we have the right to analyze the user database and make commercial use.

3. Please note that all personal information you provide when using our products or services will continue to be authorized by us during your use of our products or services unless you delete it or refuse us to collect it through system settings. When you cancel your account, we will stop using and delete your personal information.

4. We will collect statistics on the usage of our products or services, and may share these statistical information with the public or third parties to show the overall usage trends of our products or services. However, these statistics do not contain any identifying information about you.

5. When we display your personal information, we will desensitize your information by means of content replacement and anonymization to protect your information security.

6. When we want to use your personal information for other purposes not specified in this policy, or use the information collected for a specific purpose for other purposes, we will ask you in advance by making a check on your own initiative. consent.

2. How we use cookies and similar technologies

(1) Use of Cookies

1. In order to realize the personalized needs of your online experience, so that you can get an easier access experience. We send one or more small data files called Cookies on your computer or mobile device. Cookies assigned to you are unique and can only be read by the web server in the domain that issued the Cookies to you. We send you cookies to simplify your repeated login steps, store your vehicle driving records, risk status and other data to provide you with better services, and to help determine your login status and account or data security.

2. We will not use cookies for any purpose other than those described in this Privacy Policy. You can manage or delete cookies according to your preferences. You can clear all cookies saved on your device, most web browsers will automatically accept cookies, but you can usually modify the browser settings to reject cookies according to your needs; in addition, you can also clear all the saved cookies in the software Cookies. However, if you do this, you may need to personally change the user settings every time you visit the software website, and the corresponding information you have previously recorded will also be deleted, which may have a certain impact on the security of the services you use. .

(2) The use of network Beacon and similar technologies

In addition to cookies, we also use other similar technologies such as web beacons on our website. Our web pages often contain electronic images (called "single-pixel" GIF files or "web beacons"). We use network beacons in the following ways:

1. By using the network beacon on the software, the number of user visits is calculated, and the registered users of the software are identified through the visit cookie.

2. Provide you with personalized services through the obtained cookie information.

3. How do we share, transfer and publicly disclose your personal information

(1) Sharing

1. We will not share your personal information with any company, organization or individual, except in the following cases:

(1) Obtain your express consent or authorization in advance;

(2) Provided in accordance with applicable laws and regulations, requirements of legal procedures, mandatory administrative or judicial requirements;

(3) To the extent permitted by laws and regulations, it is necessary to protect the software operator, its affiliates or partners, you or other users of the software or the public interest, property or safety from damage. ;

(4) Only by sharing your information can we realize the core functions of our products or services or provide the products or services you need;

(5) To handle disputes or disputes between you and others according to your needs;

(6) Provided in accordance with the relevant agreements signed with you (including electronic agreements signed online and corresponding platform rules) or other legal documents;

(7) Use based on academic research;

(8) Use based on social and public interests that comply with laws and regulations.

2. We may share your personal information with our affiliates or partners. However, we will only share necessary personal information and are bound by the purposes stated in this Privacy Policy. At the same time, we will sign strict confidentiality agreements with our partners, requiring them to process your personal information in accordance with our instructions, this Privacy Policy and any other relevant confidentiality and security measures. If our affiliates or partners want to change the purpose of processing personal information, they will seek your authorization again.

(2) Transfer

We will not transfer your personal information to any companies, organizations and individuals, except in the following cases:

1. Obtain your express consent or authorization in advance;

2. Provided in accordance with applicable laws and regulations, requirements of legal procedures, mandatory administrative or judicial requirements;

3. Provided in accordance with the relevant agreements signed with you (including electronic agreements signed online and corresponding platform rules) or other legal documents;

4. When it comes to mergers, acquisitions, asset transfers or similar transactions, if it involves the transfer of personal information, we will require new companies and organizations that hold your personal information to continue to be governed by this Privacy Policy.

Otherwise, we will require the company or organization to seek authorization from you again.

(3) Public disclosure

We will only publicly disclose your personal information under the following circumstances and on the premise of taking industry-standard security protection measures:

1. According to your needs, disclose the personal information you designate in the disclosure method that you expressly agree to;

2. When it is necessary to provide your personal information according to the requirements of laws, regulations, mandatory administrative law enforcement or judicial requirements, we may publicly disclose your personal information according to the required type and disclosure method of personal information. Under the premise of compliance with laws and regulations, when we receive the above-mentioned request for information disclosure, we will require the issuance of corresponding legal documents, such as subpoenas or investigation letters. We strongly believe in being as transparent as possible about the information we are asked to provide, to the extent permitted by law. All requests are carefully reviewed to ensure they have a legitimate basis and are limited to data law enforcement has a legitimate right to obtain for specific investigative purposes. Under the premise of laws and regulations, the files we disclose are under the protection of encryption keys.

4. How we protect and save your personal information

(1) Our technologies and measures to protect your personal information

We take personal information security very seriously and take all reasonably practicable measures to protect your personal information:

1. Data security technical measures

We will adopt industry-standard security protection measures, including establishing reasonable system specifications and security technologies to prevent your personal information from being accessed, used and modified without authorization, and to avoid data damage or loss.

The network service of this software adopts encryption technology such as transport layer security protocol, and provides browsing services through https and other methods to ensure the security of user data during the transmission process.

This software adopts encryption technology to encrypt and save the user's personal information, and isolate it through isolation technology.

When using personal information, such as personal information display and personal information association calculation, we will use a variety of data desensitization technologies including content replacement and SHA256 to enhance the security of personal information in use.

This software uses strict data access control and multi-identity authentication technology to protect personal information and prevent data from being used illegally.

This software uses code security automatic inspection, data access log analysis technology to conduct personal information security audit.

2. Other security measures taken by this software to protect personal information

This software manages and regulates the storage and use of personal information by establishing a data classification and grading system, data security management specifications, and data security development specifications.

The software carries out comprehensive security control of data through confidentiality agreements, monitoring and auditing mechanisms for information contacts.

The software establishes a data security committee and sets up a full-time information protection department and a data security emergency response organization to promote and ensure the security of personal information.

Security certification and services. Our underlying cloud technology for storing your personal data has obtained the third-level certification of "Trusted Cloud" certification issued by the Data Center Alliance, passed the third-level security level protection certification of the Ministry of Public Security, and also obtained the ISO27000 certification.

Strengthen safety awareness. We also conduct security and privacy protection training courses to enhance employees' awareness of the importance of protecting personal information.

3. We only allow employees of the software operator and its affiliates and partners of the software who need to know the information to access personal information, and have set up strict access control and monitoring mechanisms for this purpose. We also require all personnel who may have access to your personal information to fulfill corresponding confidentiality obligations. If these obligations are not fulfilled, the above-mentioned persons may be held legally responsible or suspended from the cooperation relationship with this software.

4. We will take all reasonable and feasible measures to ensure that irrelevant personal information is not collected. We will only retain your personal information for as long as is necessary to achieve the purposes described in this policy, unless an extension of the retention period is required or permitted by law.

5. The Internet environment is not 100% secure, and we will try our best to ensure or guarantee the security of any information you send to us. If our physical, technical, or management protection facilities are damaged, resulting in unauthorized access, public disclosure, tampering, or destruction of information, resulting in damage to your legitimate rights and interests, we will assume corresponding legal responsibilities.

6. In order to deal with the possible risks of personal information leakage, damage and loss, the software has formulated a number of systems to clarify the classification and grading standards of security incidents and security vulnerabilities and the corresponding processing procedures. The software also establishes a special emergency response team for security incidents. In accordance with the requirements of security incident handling specifications, it starts security plans for different security incidents, stops losses, analyzes, locates, formulates remedial measures, and cooperates with relevant departments to trace and attack the source.

In the event of an unfortunate personal information security incident, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, and the measures you can take to prevent and reduce risks on your own. Recommendations, remedies for you, etc. At the same time, we will promptly notify you of the relevant information of the event by email, letter, telephone, push notification, etc. When it is difficult to inform the personal information subjects one by one, we will take a reasonable and effective way to publish an announcement. At the same time, we will also proactively report the handling of personal information security incidents in accordance with the requirements of regulatory authorities.

(II) Preservation of your personal information 1. Your personal information will be stored in the territory of the Republic of Singapore. If it is necessary to transmit your personal information to other countries, we will obtain your authorization and consent separately and require the recipient to handle these in accordance with local laws and regulations, our instructions, this Privacy Policy and any other relevant confidentiality and security measures Personal information. 2. Unless otherwise stipulated by laws and regulations, we will keep your personal information until the date of your account cancellation. After you cancel your account, we will delete or anonymize your personal information. 3. If we terminate the service or operation, we will notify you at least 30 days in advance, and delete or anonymize your personal information after the termination of the service or operation.

5. How do you manage your personal information

This software attaches great importance to your concern about personal information, and makes every effort to protect your rights to access, correct, delete and withdraw consent to your personal information, so that you have sufficient ability to protect your privacy and security. Your rights include:

1. Delete your personal information

Personal information that you can clear or delete directly from our product or service pages.

You may request us to delete personal information in the following circumstances:

(1) If our handling of personal information violates laws and regulations;

(2) If we collect and use your personal information without your consent;

(3) If our handling of personal information violates our agreement with you;

(4) If you cancel the account of this software;

(5) If we terminate the service and operation.

If we decide to respond to your deletion request, we will also notify the legal entities that have obtained your personal information from us and require them to delete it in a timely manner, unless otherwise required by laws and regulations, or these legal entities have obtained your separate authorization. When you delete information from our service, we may not delete the corresponding information from the backup system immediately, but will delete the information when the backup is updated.

2. Change the scope of your authorization or withdraw your authorization

You can change the scope of your authorization to continue to collect personal information or withdraw your authorization by deleting the information. You can also withdraw all authorization for us to continue to collect your personal information by canceling your account. Please understand that each business function requires some basic personal information to be completed. After you withdraw your consent or authorization, we cannot continue to provide you with the services corresponding to the withdrawal of consent or authorization, nor will we process your corresponding personal information. . However, your decision to withdraw your consent or authorization will not affect the previous processing of personal information based on your authorization.

3. Cancellation of account

You can directly cancel your account in our web products. After you cancel your account, we will stop providing you with products or services, and at your request, unless otherwise provided by laws and regulations, we will delete your personal information.

4. Respond to your request

If you cannot access, correct or delete your personal information through the above methods, or you need to access, correct or delete other personal information generated when you use our products or services, or you believe that the software violates any laws or regulations or You may file a complaint with your agreement regarding the collection or use of personal information. For security purposes, we may require a written request from you, or otherwise prove your identity, and we will respond to your request within 30 days of receiving your request and verifying your identity. For your reasonable requests, we do not charge fees in principle, but for repeated requests that exceed reasonable limits, we will charge a certain cost as appropriate. For those that are unnecessarily repetitive, require excessive technical means (eg, need to develop new systems or fundamentally change existing practices), pose risks to the legitimate rights and interests of others, or are highly impractical (eg, involve backing up information stored on tapes). requests, we may refuse them.

In the following cases, we will not be able to respond to your request in accordance with the requirements of laws and regulations:

(1) Related to national security and national defense security;

(2) Those related to public safety, public health, and major public interests;

(3) related to criminal investigation, prosecution and trial;

(4) There is sufficient evidence to show that you have subjective malice or abuse of rights;

(5) Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations.

6. Personal information protection of minors

1. This software attaches great importance to the protection of minors' personal information. If you are a minor under the age of 18, you should obtain the prior written consent of your parent or legal guardian before using our products or services. This software protects the personal information of minors in accordance with the relevant national laws and regulations.

2. For the collection of minors' personal information with the consent of parents or legal guardians, we will only use or publicly disclose this information when permitted by law, expressly consented by parents or guardians, or necessary to protect minors.

3. If we find that we have collected personal information of minors without the prior consent of a verifiable parent or legal guardian, we will try to delete the relevant data as soon as possible.

7. Notice and Amendment

1. In order to provide you with better services and with the development of this software business, this Privacy Policy will also be updated accordingly. However, we will not reduce your rights under this Privacy Policy without your express consent. We will issue an updated version on the website of the software and the mobile terminal of the software and remind you of the update of the relevant content through website announcements or other appropriate means before it takes effect. Please also visit the software to keep abreast of the latest privacy policy.

2. For major changes, we will also provide more prominent notices (we will explain the specific changes to the privacy policy by means of, but not limited to, emails, text messages or special reminders on the page). Material changes referred to in this policy include, but are not limited to:

(1) Significant changes in our service model, such as the purpose of processing personal information, the type of personal information processed, the way personal information is used, etc.;

(2) Significant changes in our ownership structure, organizational structure, etc., such as business adjustments, changes in owners caused by bankruptcy, mergers and acquisitions, etc.;

(3) The main objects of personal information sharing, transfer or public disclosure have changed;

(4) Significant changes in your rights to participate in the processing of personal information and the manner in which it is exercised;

(5) When there are changes to the responsible department, contact information and complaint channels that we are responsible for handling personal information security;

(6) When the personal information security impact assessment report indicates that there is a high risk.

3. We will also archive the old version of this policy for your review.