Privacy
Policy
The following is a
legal software license agreement between you, as the end user of this software,
and the provider of this software (aiCarEye),
Zhejiang Xinmai Silicon Co., Ltd.
(hereinafter referred to as "we" or "us"). Please read this
license agreement carefully before using the software and its related services.
Installing or using the software or services on a computer or other hardware
devices indicates that you have read this license agreement and agree to its
terms, as well as the terms of service and privacy policy.
1. How We Collect
Information
We collect
information based on the principles of legality, legitimacy, and necessity, and
only gather the necessary information to realize product functions. The main
sources of personal information collection by our company include: information
you provide, information obtained during your use of our products or services,
and information shared by third parties. We collect and use your personal
information for the purposes of the following product functions. If you do not
provide relevant information or do not agree to our collection of relevant
information, you may not be able to register as our user or enjoy certain
services provided by us, or you may not achieve the desired service effect.
1.1 Device
Information
Device information
refers to the information about the device you use when accessing our products
or services. To ensure compatibility and provide secure services, we collect
information such as the device name, model, identifier, operating system and
application version, language settings, resolution, and network ID (PLMN) when
you use our products or services. This information is collected to help us
analyze bugs, ensure the normal use of our products and services, improve and
optimize the product experience, and ensure the security of your account.
Unless explicitly stated otherwise in this policy, we will not share your
device information with any third party. However, we cannot guarantee that
third parties will not obtain your device information through other means and
combine it with other information to identify your personal identity. Any loss
caused by this should be claimed against the third party. The device
information is the basic information collected to provide the service. If you
do not want us to collect your device information, it may result in our
inability to provide you with normal services.
1.2 Location
Information
Location
information refers to information about your location that is collected when
you enable device location functions and use location-based services. This
mainly includes:
When you enable
device location functions and use related products or services, we may collect
and process information about your actual location using GPS, WiFi, or other technologies. Location tracking and precise
location information are considered personal sensitive information. Unless
required by specific product or service functions, our products or services
will not collect such sensitive personal information.
Real-time
information about your geographic location provided by you or other users. This
includes information shared by you or others that indicates your current or
past location, as well as geotagging information contained in photos shared by
you or others.
If you do not want
to be accessed, you can choose to disable the relevant functions on the device
or in the product/service, but this may affect our ability to provide you with
relevant services.
1.3 Other
Information Collected with Your Consent
To provide you
with more convenient, high-quality, and personalized products or services, certain
specific features of our products and services may require you to provide
specific sensitive personal information. If you choose not to provide such
information, you may not be able to use the corresponding features normally,
but it will not affect your use of other functions within the service. These
features include:
Access to
photos/videos based on gallery access: You can use the corresponding functions
to access your photos/images/videos after enabling gallery permissions.
Voice recording
based on microphone access: You can directly use the microphone to record or
utilize the corresponding features after enabling microphone permissions. In
these features, we may collect your recordings to recognize your voice content
and achieve the corresponding functionality.
File editing based
on file read permissions: You can edit files on your phone using the
corresponding functions after enabling file read/storage permissions.
You understand and
agree that the above-mentioned features may require you to grant us access to
your gallery (photo library), microphone (voice), or files on your device to
collect and use the information involved in these functions. Please note that
we will obtain your consent through pop-ups or other prominent means before
collecting sensitive personal information. If you voluntarily provide your
sensitive personal information, it means you agree to our processing of your
sensitive personal information as described in this policy.
2. How We Use the
Collected Information
We strictly comply
with legal regulations and agreements with users and use the collected
information for the following purposes. If we use your information beyond these
purposes, we will explain the situation to you again and obtain your consent.
2.1 To meet your
personalized needs: For example, language settings, location settings, and
personalized help services.
2.2 To provide
services, product development, and service optimization: For example, when our
system experiences a failure, we will record and analyze the information
generated during the system failure to optimize our services.
2.3 To ensure
security: For example, we will use your information for identity verification,
security prevention, anti-fraud monitoring, archiving, and backup, and for
providing customer security services. For example, security software you
download or install may detect malicious programs or viruses or help identify
fraudulent information.
2.4 To recommend
advertisements and information that may interest you.
2.5 To evaluate and
improve the effectiveness of our advertising and other promotional activities.
2.6 To manage
software: For example, to authenticate software, upgrade software, etc.
2.7 To invite you to
participate in surveys related to our services.
2.8 To collect and use
your relevant information in accordance with laws and regulations under the
following circumstances, without the need for your authorization:
Related to
national security and national defense security;
Related to public
safety, public health, and major public interests;
Related to
criminal investigations, prosecutions, trials, and executions of judgments;
For protecting the
life, property, and other major legal rights of the subject of personal
information or other individuals, where it is difficult to obtain the
individual's consent;
Necessary for
maintaining the safe and stable operation of the products and/or services
provided, such as detecting and dealing with product and/or service failures;
Necessary for
legitimate news reporting;
Necessary for
statistical or academic research conducted by research institutions based on
public interest, where the results of academic research or descriptions are
de-identified when provided to the public;
Other situations
as stipulated by laws and regulations.
2.9 For other purposes
with your consent.
To provide you
with a better experience, improve our services, or for other purposes with your
consent, we may use the information collected through certain services for our
other services, provided that it complies with relevant laws and regulations.
For example, we may use the information collected during your use of one of our
services to display personalized content or advertisements in another service
or for user research analysis and statistics.
To ensure the
security of the service and to help us better understand the operation of our
applications, we may record related information, such as the frequency of your
use of the application, fault information, overall usage, performance data, and
the source of the application. We will not combine the information stored in
the analytics software with the personal identity information you provide in
the application.
3. How We Share,
Transfer, and Publicly Disclose Your Personal Information
We fully
understand the legal responsibilities we bear for the illegal sharing,
transfer, or public disclosure of personal information, and will strictly
adhere to the following terms for all sharing, transfer, and public disclosure
of your personal information:
3.1 Sharing
Respecting user
privacy is one of our fundamental principles. Except for the following
circumstances, we will not share your personal information with any company,
organization, or individual:
Sharing with
explicit consent: With your explicit consent, we will share your personal
information with other parties.
Sharing as
required by judicial or administrative authorities: We may share your personal
information as required by judicial or administrative authorities.
Sharing with
affiliated companies: Your personal information may be shared with our
affiliated companies. We will only share necessary personal information and it
will be subject to the purposes stated in this privacy policy. If affiliated
companies wish to change the processing purposes of personal information, they
will seek your authorization and consent again.
Sharing with
authorized partners: To achieve the purposes stated in this policy, some of our
services will be provided by authorized partners. We may share some of your
personal information with partners to provide better customer service and user
experience. We will only share the necessary personal information for providing
the service, such as sharing your information with logistics companies when you
purchase our products online. Our partners are not authorized to use the shared
personal information for any other purpose.
For companies,
organizations, and individuals with whom we share personal information, we will
sign strict confidentiality agreements and require them to handle personal
information according to our instructions, this privacy policy, and any other
relevant confidentiality and security measures.
3.2 Transfer
We will not
transfer your personal information to any company, organization, or individual
except in the following cases:
Transfer with
explicit consent: With your explicit consent, we will transfer your personal
information to other parties.
Transfer during
mergers, acquisitions, or bankruptcy liquidation: If a transfer of personal
information is involved in mergers, acquisitions, or bankruptcy liquidation, we
will request the new company or organization that holds your personal
information to continue to be bound by this privacy policy. Otherwise, we will
require the company or organization to obtain your authorization and consent
again.
3.3 Public
Disclosure
We will only
publicly disclose your personal information under the following circumstances:
Disclosure of the
personal information you specify in a manner you explicitly agree to;
Disclosure of your
personal information as required by laws, regulations, mandatory administrative
enforcement, or judicial requests. When we receive such disclosure requests, we
will require the appropriate legal documents, such as subpoenas or
investigation letters, as permitted by laws and regulations.
4. How We Protect
Your Personal Information
We use
industry-standard security measures to protect the personal information you
provide, preventing data from being accessed, disclosed, used, modified,
damaged, or lost without authorization. We will take all reasonable and
feasible measures to protect your personal information. For example, when data
is exchanged between your browser and the "service" (such as credit
card information), it is protected by SSL encryption; we also provide HTTPS
secure browsing on our website; we use encryption technology to ensure data
confidentiality; we use trusted protection mechanisms to prevent data from
being maliciously attacked; we deploy access control mechanisms to ensure that
only authorized personnel can access personal information; and we conduct
security and privacy protection training courses to enhance employees'
awareness of the importance of protecting personal information.
We will take all
reasonable and feasible measures to ensure that irrelevant personal information
is not collected. Unless we obtain your written permission, we will retain your
personal information for up to 36 months after you delete or deactivate your
account. After this period, we will anonymize or delete your personal
information.
The Internet is
not an absolutely secure environment, and email, instant messaging, and other
communication methods with other users are not encrypted. We strongly recommend
that you do not send personal information through such methods. Please use
complex passwords to help ensure the security of your account.
The Internet
environment is not 100% secure, and we will strive to ensure the security of
any information you send to us or guarantee it. If our physical, technical, or
administrative protective measures are compromised, leading to unauthorized
access, disclosure, alteration, or destruction of information, and resulting in
damage to your legal rights, we will bear corresponding legal responsibilities.
In the unfortunate
event of a personal information security incident, we will promptly inform you
in accordance with the provisions of Article 42, Paragraph 2 of the
"Cybersecurity Law" about the basic situation of the security
incident and its possible impact, the measures we have taken or will take,
suggestions for you to prevent and reduce risks, and remedies for you. We will
promptly notify you of the incident by email, letter, phone, push notification,
etc. If it is difficult to inform personal information subjects individually,
we will take reasonable and effective measures to issue announcements. At the same
time, we will also actively report the handling of personal information
security incidents as required by regulatory authorities.
5. How You Can
Manage Your Personal Information
During your use of
our services, you can access, modify, and delete the registration information
and other personal information you provide. You can also contact us according
to the instructions in the notice. The scope and method of accessing,
modifying, and deleting personal information will depend on the specific
services you use.
For example, if
you wish to stop sharing your location information when using location-related
services, you can disable the function through the location settings on your
mobile device, software, hardware service providers, or communication service
providers. We recommend that you carefully read the relevant instructions.
We will only
collect and use your information to achieve the functions of our products or
services as described in this policy.
If you find that
we have violated the provisions of laws, administrative regulations, or the
agreement between both parties in collecting or using your personal
information, you can request us to delete it.
If you find that
there is an error in your personal information collected and stored by us, you can
request us to correct it.
When you access,
modify, and delete relevant information, we may require you to verify your
identity to ensure account security.
In the following
circumstances, as required by laws and regulations, we will not be able to respond
to your request:
Directly related
to national security and national defense security.
Directly related
to public safety, public health, and major public interests.
Directly related
to criminal investigations, prosecutions, trials, and the execution of
judgments.
There is
sufficient evidence to prove that you have subjective malice or abuse of
rights.
Responding to your
request will cause serious damage to your or other individuals’ or
organizations' legitimate rights and interests.
Involving trade
secrets.
6. Personal
Information of Children
Our products and
services are primarily aimed at adults. Minors are not allowed to create their
own user accounts without the consent of their parents or guardians. In the
case of collecting minors' personal information with the consent of their
parents, we will only use or disclose this information as required by judicial
or administrative authorities, with the explicit consent of the parents or
guardians, or as necessary for the protection of minors.
Although local
laws and customs have different definitions of minors, we regard anyone under
the age of 16 as a minor.
If we discover
that we have collected personal information from minors without prior
verifiable parental consent, we will try to delete the relevant data as soon as
possible.
7. How This Policy
Is Updated
Our privacy policy
will be updated from time to time.
In general, we
will not reduce your rights under this privacy policy without your explicit
consent. We will post the updated version on this page and notify you of any
significant changes to this policy in a prominent manner, such as through a
pop-up window. Once you agree to the updated policy, it means you agree to be
bound by the revised policy.
Zhejiang Xinmai Silicon Co., Ltd.
Updated/Effective Date: April 25, 2024