Privacy Policy

 

The following is a legal software license agreement between you, as the end user of this software, and the provider of this software (aiCarEye), Zhejiang Xinmai Silicon Co., Ltd. (hereinafter referred to as "we" or "us"). Please read this license agreement carefully before using the software and its related services. Installing or using the software or services on a computer or other hardware devices indicates that you have read this license agreement and agree to its terms, as well as the terms of service and privacy policy.

 

1. How We Collect Information

 

We collect information based on the principles of legality, legitimacy, and necessity, and only gather the necessary information to realize product functions. The main sources of personal information collection by our company include: information you provide, information obtained during your use of our products or services, and information shared by third parties. We collect and use your personal information for the purposes of the following product functions. If you do not provide relevant information or do not agree to our collection of relevant information, you may not be able to register as our user or enjoy certain services provided by us, or you may not achieve the desired service effect.

 

1.1 Device Information

 

Device information refers to the information about the device you use when accessing our products or services. To ensure compatibility and provide secure services, we collect information such as the device name, model, identifier, operating system and application version, language settings, resolution, and network ID (PLMN) when you use our products or services. This information is collected to help us analyze bugs, ensure the normal use of our products and services, improve and optimize the product experience, and ensure the security of your account. Unless explicitly stated otherwise in this policy, we will not share your device information with any third party. However, we cannot guarantee that third parties will not obtain your device information through other means and combine it with other information to identify your personal identity. Any loss caused by this should be claimed against the third party. The device information is the basic information collected to provide the service. If you do not want us to collect your device information, it may result in our inability to provide you with normal services.

 

1.2 Location Information

 

Location information refers to information about your location that is collected when you enable device location functions and use location-based services. This mainly includes:

 

When you enable device location functions and use related products or services, we may collect and process information about your actual location using GPS, WiFi, or other technologies. Location tracking and precise location information are considered personal sensitive information. Unless required by specific product or service functions, our products or services will not collect such sensitive personal information.

 

Real-time information about your geographic location provided by you or other users. This includes information shared by you or others that indicates your current or past location, as well as geotagging information contained in photos shared by you or others.

 

If you do not want to be accessed, you can choose to disable the relevant functions on the device or in the product/service, but this may affect our ability to provide you with relevant services.

 

1.3 Other Information Collected with Your Consent

 

To provide you with more convenient, high-quality, and personalized products or services, certain specific features of our products and services may require you to provide specific sensitive personal information. If you choose not to provide such information, you may not be able to use the corresponding features normally, but it will not affect your use of other functions within the service. These features include:

 

Access to photos/videos based on gallery access: You can use the corresponding functions to access your photos/images/videos after enabling gallery permissions.

 

Voice recording based on microphone access: You can directly use the microphone to record or utilize the corresponding features after enabling microphone permissions. In these features, we may collect your recordings to recognize your voice content and achieve the corresponding functionality.

 

File editing based on file read permissions: You can edit files on your phone using the corresponding functions after enabling file read/storage permissions.

 

You understand and agree that the above-mentioned features may require you to grant us access to your gallery (photo library), microphone (voice), or files on your device to collect and use the information involved in these functions. Please note that we will obtain your consent through pop-ups or other prominent means before collecting sensitive personal information. If you voluntarily provide your sensitive personal information, it means you agree to our processing of your sensitive personal information as described in this policy.

 

2. How We Use the Collected Information

 

We strictly comply with legal regulations and agreements with users and use the collected information for the following purposes. If we use your information beyond these purposes, we will explain the situation to you again and obtain your consent.

 

2.1 To meet your personalized needs: For example, language settings, location settings, and personalized help services.

 

2.2 To provide services, product development, and service optimization: For example, when our system experiences a failure, we will record and analyze the information generated during the system failure to optimize our services.

 

2.3 To ensure security: For example, we will use your information for identity verification, security prevention, anti-fraud monitoring, archiving, and backup, and for providing customer security services. For example, security software you download or install may detect malicious programs or viruses or help identify fraudulent information.

 

2.4 To recommend advertisements and information that may interest you.

 

2.5 To evaluate and improve the effectiveness of our advertising and other promotional activities.

 

2.6 To manage software: For example, to authenticate software, upgrade software, etc.

 

2.7 To invite you to participate in surveys related to our services.

 

2.8 To collect and use your relevant information in accordance with laws and regulations under the following circumstances, without the need for your authorization:

 

Related to national security and national defense security;

Related to public safety, public health, and major public interests;

Related to criminal investigations, prosecutions, trials, and executions of judgments;

For protecting the life, property, and other major legal rights of the subject of personal information or other individuals, where it is difficult to obtain the individual's consent;

Necessary for maintaining the safe and stable operation of the products and/or services provided, such as detecting and dealing with product and/or service failures;

Necessary for legitimate news reporting;

Necessary for statistical or academic research conducted by research institutions based on public interest, where the results of academic research or descriptions are de-identified when provided to the public;

Other situations as stipulated by laws and regulations.

2.9 For other purposes with your consent.

 

To provide you with a better experience, improve our services, or for other purposes with your consent, we may use the information collected through certain services for our other services, provided that it complies with relevant laws and regulations. For example, we may use the information collected during your use of one of our services to display personalized content or advertisements in another service or for user research analysis and statistics.

 

To ensure the security of the service and to help us better understand the operation of our applications, we may record related information, such as the frequency of your use of the application, fault information, overall usage, performance data, and the source of the application. We will not combine the information stored in the analytics software with the personal identity information you provide in the application.

 

3. How We Share, Transfer, and Publicly Disclose Your Personal Information

 

We fully understand the legal responsibilities we bear for the illegal sharing, transfer, or public disclosure of personal information, and will strictly adhere to the following terms for all sharing, transfer, and public disclosure of your personal information:

 

3.1 Sharing

 

Respecting user privacy is one of our fundamental principles. Except for the following circumstances, we will not share your personal information with any company, organization, or individual:

 

Sharing with explicit consent: With your explicit consent, we will share your personal information with other parties.

 

Sharing as required by judicial or administrative authorities: We may share your personal information as required by judicial or administrative authorities.

 

Sharing with affiliated companies: Your personal information may be shared with our affiliated companies. We will only share necessary personal information and it will be subject to the purposes stated in this privacy policy. If affiliated companies wish to change the processing purposes of personal information, they will seek your authorization and consent again.

 

Sharing with authorized partners: To achieve the purposes stated in this policy, some of our services will be provided by authorized partners. We may share some of your personal information with partners to provide better customer service and user experience. We will only share the necessary personal information for providing the service, such as sharing your information with logistics companies when you purchase our products online. Our partners are not authorized to use the shared personal information for any other purpose.

 

For companies, organizations, and individuals with whom we share personal information, we will sign strict confidentiality agreements and require them to handle personal information according to our instructions, this privacy policy, and any other relevant confidentiality and security measures.

 

3.2 Transfer

 

We will not transfer your personal information to any company, organization, or individual except in the following cases:

 

Transfer with explicit consent: With your explicit consent, we will transfer your personal information to other parties.

 

Transfer during mergers, acquisitions, or bankruptcy liquidation: If a transfer of personal information is involved in mergers, acquisitions, or bankruptcy liquidation, we will request the new company or organization that holds your personal information to continue to be bound by this privacy policy. Otherwise, we will require the company or organization to obtain your authorization and consent again.

 

3.3 Public Disclosure

 

We will only publicly disclose your personal information under the following circumstances:

 

Disclosure of the personal information you specify in a manner you explicitly agree to;

 

Disclosure of your personal information as required by laws, regulations, mandatory administrative enforcement, or judicial requests. When we receive such disclosure requests, we will require the appropriate legal documents, such as subpoenas or investigation letters, as permitted by laws and regulations.

 

4. How We Protect Your Personal Information

 

We use industry-standard security measures to protect the personal information you provide, preventing data from being accessed, disclosed, used, modified, damaged, or lost without authorization. We will take all reasonable and feasible measures to protect your personal information. For example, when data is exchanged between your browser and the "service" (such as credit card information), it is protected by SSL encryption; we also provide HTTPS secure browsing on our website; we use encryption technology to ensure data confidentiality; we use trusted protection mechanisms to prevent data from being maliciously attacked; we deploy access control mechanisms to ensure that only authorized personnel can access personal information; and we conduct security and privacy protection training courses to enhance employees' awareness of the importance of protecting personal information.

 

We will take all reasonable and feasible measures to ensure that irrelevant personal information is not collected. Unless we obtain your written permission, we will retain your personal information for up to 36 months after you delete or deactivate your account. After this period, we will anonymize or delete your personal information.

 

The Internet is not an absolutely secure environment, and email, instant messaging, and other communication methods with other users are not encrypted. We strongly recommend that you do not send personal information through such methods. Please use complex passwords to help ensure the security of your account.

 

The Internet environment is not 100% secure, and we will strive to ensure the security of any information you send to us or guarantee it. If our physical, technical, or administrative protective measures are compromised, leading to unauthorized access, disclosure, alteration, or destruction of information, and resulting in damage to your legal rights, we will bear corresponding legal responsibilities.

 

In the unfortunate event of a personal information security incident, we will promptly inform you in accordance with the provisions of Article 42, Paragraph 2 of the "Cybersecurity Law" about the basic situation of the security incident and its possible impact, the measures we have taken or will take, suggestions for you to prevent and reduce risks, and remedies for you. We will promptly notify you of the incident by email, letter, phone, push notification, etc. If it is difficult to inform personal information subjects individually, we will take reasonable and effective measures to issue announcements. At the same time, we will also actively report the handling of personal information security incidents as required by regulatory authorities.

 

5. How You Can Manage Your Personal Information

 

During your use of our services, you can access, modify, and delete the registration information and other personal information you provide. You can also contact us according to the instructions in the notice. The scope and method of accessing, modifying, and deleting personal information will depend on the specific services you use.

 

For example, if you wish to stop sharing your location information when using location-related services, you can disable the function through the location settings on your mobile device, software, hardware service providers, or communication service providers. We recommend that you carefully read the relevant instructions.

 

We will only collect and use your information to achieve the functions of our products or services as described in this policy.

 

If you find that we have violated the provisions of laws, administrative regulations, or the agreement between both parties in collecting or using your personal information, you can request us to delete it.

 

If you find that there is an error in your personal information collected and stored by us, you can request us to correct it.

 

When you access, modify, and delete relevant information, we may require you to verify your identity to ensure account security.

 

In the following circumstances, as required by laws and regulations, we will not be able to respond to your request:

 

Directly related to national security and national defense security.

Directly related to public safety, public health, and major public interests.

Directly related to criminal investigations, prosecutions, trials, and the execution of judgments.

There is sufficient evidence to prove that you have subjective malice or abuse of rights.

Responding to your request will cause serious damage to your or other individuals’ or organizations' legitimate rights and interests.

Involving trade secrets.

6. Personal Information of Children

 

Our products and services are primarily aimed at adults. Minors are not allowed to create their own user accounts without the consent of their parents or guardians. In the case of collecting minors' personal information with the consent of their parents, we will only use or disclose this information as required by judicial or administrative authorities, with the explicit consent of the parents or guardians, or as necessary for the protection of minors.

 

Although local laws and customs have different definitions of minors, we regard anyone under the age of 16 as a minor.

 

If we discover that we have collected personal information from minors without prior verifiable parental consent, we will try to delete the relevant data as soon as possible.

 

7. How This Policy Is Updated

 

Our privacy policy will be updated from time to time.

 

In general, we will not reduce your rights under this privacy policy without your explicit consent. We will post the updated version on this page and notify you of any significant changes to this policy in a prominent manner, such as through a pop-up window. Once you agree to the updated policy, it means you agree to be bound by the revised policy.

 

Zhejiang Xinmai Silicon Co., Ltd.

 

Updated/Effective Date: April 25, 2024