Privacy Policy

Here is the legal software license agreement between you as the end-user and the software (BackCam App). Please read this license agreement carefully before using the software and related services. By installing or using the software or services on a computer or other hardware device, you signify that you have read this license agreement and agree to its terms, as well as the terms of service and privacy policy.

I. How We Collect Information

We collect information necessary to provide product functions based on principles of legality, propriety, and necessity. The main sources of personal information collected by our company include information provided by you, information obtained during your use of our products or services, and information shared by third parties. We collect and use your personal information for the following product functions. If you do not provide relevant information or disagree with us collecting such information, you may not be able to register as our user, enjoy some of our services, or achieve optimal service results.

1. Device Information

Device information refers to information about the device you use when using our products or services. In order to adapt products and services to devices and provide secure services, when you use our products or services, we collect information such as the device name, device model, device identification code, operating system and application versions, language settings, resolution, and the network ID (PLMN) of the service provider. Collecting this information helps us analyze bugs, ensure your normal use of our products and services, improve and optimize your product experience, and safeguard your account security. Except as otherwise provided in this policy, we will not provide your device information to any third party. However, we cannot guarantee that other third parties will not identify your device information through other means and combine it with other information to identify your personal identity, and we are not responsible for any losses caused thereby. The above device information is collected as basic information necessary for providing services. If you do not want your device information to be collected by us, it may affect our ability to provide normal services to you.

2. Location Information

Location information refers to information collected about your location when you enable device location services and use location-based services. This mainly includes:

GPS, Wi-Fi, or other technology methods may be used to collect and process information about your actual location when you enable device location services and use related products or services. Tracking trajectories and precise location information are considered sensitive personal information. Except for specific product or service functions, our products or services will not collect such sensitive personal information.

Real-time information containing your geographic location provided by you or other users. This includes shared information that displays your current or past geographic location or geographic tag information contained in photos shared by you or others.

You can choose to disable the relevant functions in your device or product/service to prevent access, but this may affect our ability to provide relevant services to you.

3. Other Information Collected with Your Consent

In order to provide you with more convenient, higher-quality, and personalized products or services, certain specific features of our products and services may require you to provide specific sensitive personal information. If you choose not to provide such information, you may not be able to use the corresponding functions normally, but it will not affect your use of other functions in the service. These functions include:

1)Application functions based on accessing photos/videos in the album (photo library/video library): You can access and use the corresponding functions to access your photos/pictures/videos after opening the album permission.

2)Application functions based on microphone voice technology: You can directly use the microphone to record or achieve corresponding functions after opening the microphone permission. In these functions, we will collect your recording to recognize your voice content and achieve corresponding functional effects.

3)Application functions based on mobile file access: You can edit and process files in your mobile phone after opening the file read/storage permission.

You understand and agree that the above application functions may require you to enable access to your album (photo library) and microphone (voice) permissions on your device to collect and use the information involved in these functions. Please note that before collecting sensitive personal information, we will obtain your consent through pop-up windows or similar prominent methods. If you actively provide your sensitive personal information, it means you agree that we process your sensitive personal information for the purposes and in the manner described in this policy.

II. How We Use Collected Information

We strictly comply with legal regulations and agreements with users to use collected information for the following purposes. If we use your information for purposes beyond the following, we will explain it to you again and obtain your consent.

1. Meet Your Personalized Needs: For example, language settings, location settings, personalized help services.

2. Provide Services, Product Development, and Service Optimization: For example, when our system malfunctions, we record and analyze the information generated during system malfunctions to optimize our services.

3. Security Safeguards: For example, we use your information for identity verification, security prevention, anti-fraud monitoring, archive backup, and customer security services. For example, security software you download or install detects malicious programs or viruses, or identifies fraud information for you.

4. Recommend Ads, News, etc., That May Interest You.

5. Evaluate and Improve the Effectiveness of Our Advertising Placement and Other Promotional and Marketing Activities.

6. Manage Software: For example, software certification, software upgrades, etc.

7. Invite You to Participate in Surveys Related to Our Services.

8. Collect and Use Your Relevant Information in the Following Circumstances in Accordance with Laws and Regulations, and No Authorization is Required:

Related to national security, national defense security.

Related to public safety, public health, significant public interests.

Related to criminal investigation, prosecution, trial, and execution of judgments.

Necessary to protect the major legitimate rights and interests of the personal information subject or other individuals but difficult to obtain the consent of the person.

Necessary for the security and stable operation of the products and/or services provided, including discovering and disposing of faults in products and/or services.

Necessary for legitimate news reporting.

Necessary for academic research institutions to carry out statistics or academic research based on public interest, and when providing academic research or describing the results, the personal information contained in the results will be de-identified.

Other circumstances stipulated by laws and regulations.

9. Other Purposes Consented to by You.

To provide you with a better experience, improve our services, or for other purposes consented to by you, we may use information collected through certain services for our other services, under the premise of complying with relevant laws and regulations. For example, we use the information obtained when you use one of our services to display personalized content or advertisements to you in another service, or for user research analysis and statistics.

To ensure the security of the service and help us better understand the operation of our application, we may record relevant information, such as the frequency of your use of the application, fault information, overall usage, performance data, and the source of the application. We will not combine the information stored in the analytical software with the personal identity information you provide in the application.

III. How We Share, Transfer, and Publicly Disclose Your Personal Information

We fully understand the legal responsibilities that should be borne for causing damage to the personal information subject due to illegal sharing, transfer, or public disclosure of personal information. For all sharing, transfer, and public disclosure of your personal information, we will strictly follow the following terms:

(I) Sharing

Respecting user privacy is one of our fundamental principles. We will not share your personal information with any company, organization, or individual except under the following circumstances:

1、Sharing with your explicit consent: We will share your personal information with other parties when we have your explicit consent.

2、Sharing under legal obligations: We may share your personal information externally in response to judicial or administrative authority requests.

3、Sharing with affiliates: Your personal information may be shared with our affiliates. We will only share necessary personal information and they will be bound by the purposes stated in this privacy policy. If our affiliates change the purpose of processing personal information, they will seek your authorization again.

4、Sharing with authorized partners: For the purposes stated in this policy, some of our services are provided by authorized partners. We may share some of your personal information with partners to provide better customer service and user experience. We will only share your personal information for legitimate, lawful, necessary, specific, and clear purposes, and only the personal information necessary to provide the service, for example, when you purchase our products online and must share your information with a logistics company. Our partners are not permitted to use shared personal information for any other purpose.

Companies, organizations, and individuals with whom we share personal information will be required to sign strict confidentiality agreements, obliging them to process personal information in accordance with our instructions, this privacy policy, and any other relevant confidentiality and security measures.

(II) Transfer

We will not transfer your personal information to any company, organization, or individual except under the following circumstances:

1、Transfer with your explicit consent: We will transfer your personal information to other parties with your explicit consent.

2、In cases involving mergers, acquisitions, or bankruptcy liquidations, where personal information transfers are involved, we will require the new company or organization holding your personal information to continue to be bound by this privacy policy. Otherwise, we will require the company or organization to seek your authorization again.

(III) Public Disclosure

We will only disclose your personal information in the following circumstances:

1、Disclosure in the manner you explicitly consent to disclose your designated personal information.

2、In cases where it is necessary to provide your personal information in accordance with the requirements of laws, regulations, mandatory administrative law enforcement, or judicial requirements, we may disclose your personal information according to the types of personal information required and the disclosure methods. Within the framework of compliance with laws and regulations, when we receive requests for disclosure information, we require that corresponding legal documents, such as subpoenas or investigation letters, must be issued.

IV. How we protect your personal information

1. We have implemented security measures that meet industry standards to protect the personal information you provide, to prevent unauthorized access, public disclosure, use, modification, damage, or loss of data. We will take all reasonable measures to protect your personal information. For example, data exchanged between your browser and "service" for data (such as credit card information) is protected by SSL encryption; we also provide secure browsing with https for websites; we use encryption technology to ensure data confidentiality; we use trusted protection mechanisms to prevent data from malicious attacks; we deploy access control mechanisms to ensure that only authorized personnel have access to personal information; and we conduct security and privacy protection training courses to enhance employee awareness of the importance of protecting personal information.

2. We will take all reasonable measures to ensure that irrelevant personal information is not collected. Unless we obtain your written permission, we will retain your personal information for a period of 36 months after you delete or cancel your account, and after this period, we will anonymize your personal information or destroy it.

3. The internet is not a completely secure environment, and email, instant messaging, and ways of communicating with other users are not encrypted. We strongly recommend that you do not send personal information through such methods. Please use complex passwords to help us ensure the security of your account.

4. The internet environment is not 100% secure, and we will do our best to ensure or guarantee the security of any information you send to us. If our physical, technical, or administrative protective facilities are compromised, resulting in unauthorized access, public disclosure, tampering, or destruction of information, resulting in harm to your legitimate rights and interests, we will assume corresponding legal responsibilities.

5. After an unfortunate personal information security incident, we will notify you in a timely manner in accordance with the provisions of Article 42, paragraph 2 of the "Cybersecurity Law": the basic situation of the security incident and its possible impact, the measures we have taken or will take, your suggestions for autonomous prevention and risk reduction, and your remedial measures. We will promptly inform you of the relevant situation of the incident through email, letter, phone, push notification, etc., and when it is difficult to inform each personal information subject one by one, we will adopt reasonable and effective methods to issue announcements. At the same time, we will actively report to the regulatory authorities the disposal of personal information security incidents.

V. How you manage your personal information

1. You can access, modify, and delete the registration information and other personal information you provide during your use of our services, and you can contact us according to the instructions in the notification. The scope and manner in which you access, modify, and delete personal information will depend on the specific services you use.

For example, if you wish to stop sharing your location information when using location-related services, you can stop sharing by closing the location function of your mobile phone, software and hardware service providers, and communication service providers, and we suggest that you read the relevant guidelines carefully.

2. We will collect and use your information only to achieve the functions of our products or services, as described in this policy.

If you find that we violate laws, regulations, or agreements to collect and use your personal information, you can request that we delete it.

If you find errors in the personal information we collect and store, you can also request that we correct it.

When you access, modify, and delete related information, we may require you to verify your identity to ensure the security of your account.

3. In the following situations, in accordance with legal requirements, we will be unable to respond to your request:

Directly related to national security, national defense security.

Directly related to public safety, public health, and major public interests.

Directly related to criminal investigation, prosecution, trial, and enforcement of judgments.

There is sufficient evidence to show that you have subjective malice or abuse of rights.

Responding to your request will result in serious damage to your or other individuals' or organizations' legitimate rights and interests.

Involving trade secrets.

VI. Personal information about children

Our products and services are primarily aimed at adults. Minors may not create their own user accounts without the consent of their parents or guardians. For cases where personal information of minors is collected with parental consent, we will only use or disclose this information when required by judicial or administrative authorities, with explicit consent of parents or guardians, or as necessary to protect minors.

Although the definition of minors varies according to local laws and customs, we treat anyone under 16 years old as a minor.

If we find that we have collected personal information of minors without obtaining confirmed parental consent in advance, we will attempt to delete such data as soon as possible.

VII. How this policy is updated

Our privacy policy will be updated from time to time.

In general, we will not reduce your rights under this privacy policy. We will post updated versions on this page and notify you of any changes made to this policy in a prominent manner equivalent to a pop-up. Your agreement to such changes means you agree to be bound by the revised privacy policy.

Updated/Effective Date: December 27, 2023