Privacy Policy License Agreement

The following is a legal software license agreement between you, the end user of the software, and isHome Software Provider (hereinafter or "we"). Please read this License Agreement carefully before using the isHome Software and its related services. By installing or using the Software or Services on a computer or other hardware device, you acknowledge that you have read this Privacy License Agreement and agree to all of its terms, including the Terms of Service and Privacy Policy.

We realize how important your personal information is to you and we make every effort to keep your personal information safe and secure. We are committed to maintaining your trust in us and to protecting your personal information by adhering to the following principles:

Consistency of authority and responsibility

Principle of Clarity of Purpose

The principle of opt-in consent

The principle of "little and enough

Ensure Security

Principle of subject participation

The principle of openness and transparency, etc.

At the same time, we promise that we will take appropriate security measures to protect your personal information in accordance with the mature security standards in the industry.

This Policy is the basic legal document for you to use our products and/or services, we hope that you will read it carefully and make it clear that you have fully understood the content of this policy agreement before using the services, and we hope that you can make appropriate choices according to your own understanding. After we update this Policy (we will promptly remind you of the update), your continued use of our products and/or services means that you agree to the contents of this Policy (including the updated version), and agree that we collect, use, preserve, disclose, and transfer your relevant information in accordance with this Policy.

This agreement will help you understand the following:

1License authorization

2The use of the content

3Distribution of content

4Registration and Privacy Policy

5Software use tracking

6Software update and marketing

7Copyright information and owner's statement

8Disclaimer

9Limited Liability Statement

10Export statement

11High Risk Activities Statement

12Declaration of Indemnity

13Revision and update of this policy

14Termination Terms

15Developer Information

16How to contact us

 

1License Authorization

This license allows you to use one copy of the software contained in this package or product on a single personal computer or hardware device. For each software licensee, the program may be used on only one personal computer or hardware device at any given time. This license does not permit you to use the Software on any hardware device or personal computer that is not owned or controlled by you, and you may not distribute over a network or make the Software available to a network where multiple devices are in use at the same time. A special license for the Software is required if the program will be installed on a network server for distribution to other computers only. You may not modify, translate, reverse assemble, decompile, disassemble, or otherwise attempt to:

(1) disrupt, avoid, bypass, remove, deactivate, or otherwise circumvent any software protection mechanisms in the Software, including, without limitation, those used to limit or control the functionality of the Software.

(2) export the source code or underlying ideas, algorithms, structure or organization from the Software (unless such activity is prohibited by applicable law)

(3) You may not use the Software for any purpose that is unlawful under the applicable laws of the jurisdiction in which you are using the Software.

 

2. Use of Content

The isHome Software is intended for use in licensed media only. You may not use the isHome Software for any purpose that infringes copyrights, trademarks, patents, trade secrets, publicity rights or any other rights of third parties.

It is your responsibility to ensure that any content or materials (including, but not limited to, text, photographs, sound and video recordings) created, copied, downloaded, compressed, recorded, played back, published and/or distributed through the Software do not infringe these rights and to obtain a license from the owner of these rights. You may not attempt to or use the Software in conjunction with any device, program or service designed to circumvent the jurisdiction of technological measures used to control access to or rights in any content files or other works protected by copyright law.

 

3. Distribution of Content

You may use the isHome Software only for your personal, non-commercial use and may not offer or use the Software in any way as part of any commercial service or application. If you are interested in any other use, please contact us. Copies of content files, including but not limited to songs and other audio recordings, downloaded or reproduced using the Software and protected by copyright laws or relevant laws of any jurisdiction, are for your own personal use only and will not be distributed to third parties or performed outside your normal circle of family and social acquaintances.

 

4. Registration and Privacy Policy

The software registration, purchase and/or activation process requires you to provide personally identifiable information, and we will not share or sell such information with any third party unless:

(1) you have given your prior consent to disclose such information; and

(2) We need to disclose such information in order to provide the product or service you have requested; or

(3) we disclose such information to fulfill a legal obligation.

This section will help you understand the following:

1) how we collect and use your personal information

2) how we use, protect and store your personal information

3)how we share your personal information

4)your rights

5)How we handle minors' personal information

 

1)How we collect and use your personal information

Personal information refers to all kinds of information recorded electronically or by other means that can identify a specific natural person or reflect the activities of a specific natural person, either alone or in combination with other information. Personal information covered by this policy includes: basic information (including personal name, date of birth, gender, address, personal telephone number, e-mail address); personal identification information (including identity card, military officer's license, passport, driver's license, relevant identification, etc.); personal common device information (including Internet service provider, terminal manufacturer, hardware model, device MAC address, type of operating system, software); personal identification information (such as IMEME); and information about your personal information. list of unique device identification (such as IMEI/androidID/IDFA/AdVertisingID/OPENUDID/GUID/UDID), SIM card IMSI, session start/stop time, language location, time zone and network status (WiFi, etc.), hard disk, CPU and battery usage, etc., etc.); information describing the basic conditions of commonly-used devices of individuals; information including Internet service providers, terminal manufacturers, hardware models, device MAC addresses, OS types, software (including information describing the basic conditions of a person's frequently used devices, such as hard disk, CPU and battery usage), video content containing personal information; and other information (including timestamps, application identifiers, application versions, application distribution channels, personal phone numbers, cell phone numbers, web browsing history, and precise location information). We will use the above information to provide you with the core functions of the app, including device event message push, live playback, etc.

Sensitive personal information refers to personal information that, if disclosed or modified, could have an adverse effect on the subject of the personal information (including reputation, damage to physical or mental health, or discriminatory treatment, etc.). Personal sensitive information covered in this policy includes: personal identification information (including ID card, military officer's card, passport, driver's license, household registration); network identification information (including system account, IP address, email address, user name and nickname in this APP, and password and secret security related to the foregoing); and other information (including timestamps, application identifiers, application versions, application distribution channels, personal phone number, cell phone number, precise location information); relevant identification; video content containing sensitive personal information. When you need to purchase services in this application and unbundle your device, we will use this information to verify your identity and protect your rights and interests from unlawful infringement.

I. Personal information we collect and use

Some of the core functions of our products/services, including cloud services, service-based related basic functions (such as monitoring video preview, device operation and control, etc.). We collect, store and use information about you to fulfill these functions. If you do not provide this information, we will not be able to provide you with the products and services you require.

Our products and/services also include some additional features, including cloud storage, value-added services such as AI Labs, message alerts, device unbundling, network detection, and so on. If you use these additional features, we will collect personal information according to the additional features you choose to use. If you do not provide such personal information, you can still purchase cloud services and use the basic features related to our software products based on the services, but you will not be able to use the corresponding additional features.

In the course of your use of our products and/or services, we will collect information that you voluntarily provide to us when you use our products and/or services or that is generated as a result of your use of our products and/or services in the following ways, in order to provide you with our products and/or services, to optimize our products and/or services, and to protect the security of your account:

1. When you register for an account for the purpose of using our products and/or services, we will collect information such as your user name, password, email address and cell phone number. We collect cell phone numbers in order to meet the requirements of the real name system of the network of relevant laws and regulations. If you log in to our products and/or services by other means, we will request your personal information from the associated third party, and we may still ask you to provide personal information that we request but the third party is unable to provide. If you refuse to provide such information, you will not be able to use our products and/or services normally.

2When you use isHome software cloud service, you need to bind your camera and other products. We will collect the serial number and product verification code of the product you bind. This kind of information is the basic information of the product with uniqueness, and it is the basic information that must be collected to bind the product and further provide you with basic and value-added services such as previewing and storing videos. When you use the storage function of the cloud service of the Software to store your videos, these videos will be saved in our servers. We will store them in an encrypted way.

3. When you purchase a product or service from isHome Software, we also collect information about your order, including the order number, information about the service you purchased, the amount you paid, and the method of payment. We will use such information to determine the transaction, payment settlement, for you to check the order as well as to provide customer service advice and after-sales service, to determine whether there is any abnormality in your transaction in order to protect your transaction security.

4When you turn on the message reminder function, we will collect the time stamps of the images captured by your camera, so as to push the message to you. You can turn off this feature through the settings.

5When you apply for product unbundling, we will also collect your ID card and other information. We need to verify this information to determine whether you are the current legal user of the product as far as possible, so as to decide whether to accept your application for unbundling. If you do not provide this information, we will not be able to provide you with the unbundling service.

6, our customer service and after-sales function will use your account information, order information, you bind the product information. To ensure the security of your account, our customer service will use your account information to verify your identity with you. When you need us to provide customer service and after-sales service related to your order information, we will check your order information. You may provide additional information when communicating with our customer service staff, such as when you ask us to change the contact person or contact number. When you need us to provide customer service and after-sales service related to your bound product information, we will query your bound product information.

7In order to provide local photo album related functions, we need to read/write external storage permissions, so that you can save the relevant key images or videos in real time.

8When you add the device, we need the location permission to get your accurate positioning, so that you can search for the relevant WIFI information. When you add a device by scanning code, you need to get the camera permission to scan the QR code so that you can add the device more conveniently and quickly.

9When you need to talk to your device through this app, we need to get your microphone permission.

10In addition to the sensitive permissions mentioned above, in order to provide you with better services, we will also need system-related network-related permissions, vibrator, ignore battery optimization, allow installation of location source permissions (for software updates), keep the screen unlocked when watching the surveillance screen and other permissions.

11, In addition, according to the business characteristics we will be online third-party service features, when you use these features, without your permission, we will not disclose, disclose your personal information to third-party service providers. When you use third-party services in this application, we will collect your hardware model, operating system version number, IP address, WLAN access point, software version number, network access mode, type, status, network quality data, operation, usage, service logs with your permission.

The third party SDKs we currently use and the details of the related privacy policies are as follows:

com.tencent.stat (Tencent Mobile Analytics)

com.tencent.bugly(Bugly; Tencent Bugly)

com.huawei.hms(Huawei; Huawei Push)

com.huawei.agconnect(Huawei; Huawei Associated Applications)

AFNetworking(network request)

BGFMD (database manipulation)

Masonry (constraints)

SDWebImage (loading images)

YYModel (data model) and other SDKs.

12. isHome needs to get the software installation list information

In order to facilitate the user login, isHome has added a new direct third-party software login portal, including WeChat, QQ, microblogging. You can use the isHome software quickly and conveniently through these login methods.

We will obtain your information after you agree to the content of the Privacy Policy.

13What third-party SDKs does isHome use?

For the convenience of users or based on advertising, traffic diversion and other cooperation, our products and/or services may contain third-party services or go to links; however, given that the third party will independently collect and process your personal information, which is not under the control of isHome, therefore, isHome is not responsible for third-party services, unless otherwise provided by law. You are required to read and refer to these third party privacy policies on your own and independently judge whether to use their services.

1)Third Party SDK:MobTechSDK

Purpose: SMS verification, social sharing, third party login

Mode: Dependent mode

Type of Personal Information Collected: System Operation Information, Network Status Information, iOS Advertising Identifier (IDFA), International Mobile Equipment Identifier (IMEI), Anonymous Equipment Identifier (OAID), International Mobile Subscriber Identifier (IMSI), Application List Information, Base Station Information, Social Platform OpenID, Geographic Location

Third party organization name: Shanghai Youkun Information Technology Co.

Third-party privacy policy link: www.mob.com/about/policy

2) Third-party SDK: MiPush_SDK

Purpose: We integrate [MiPush_SDK] in order to realize [Xiaomi message push] service

Mode: jar

Type of Personal Information Collected: We need to collect and use your [IMEI/OAID (for AndroidQ or above), IMEIMD5/MEIDMD5, AndroidID, VAID, AAID, as well as your MID (for MIUI system), device model] and other information. In order to facilitate your better understanding of the rules for the collection and use of personal information of [Xiaomi Push SDK], you can log in or visit [Xiaomi Open Platform] to learn about its Privacy Policy.

Name of Third Party Organization: Xiaomi Mobile Software Co.

Link to Third Party Privacy Policy: https://dev.mi.com/console/doc/detail?pId=1822

3) Third-party SDK: AUO push

Purpose: push announcement

Mode: Local module dependency mode

Scope: Our product integrates with AUO+ SDK, which needs to collect your device Mac address, installed App information, unique device identifier (IMEI/androidID/IDFA/OPENUDID/GUID, SIM card IMSI information) in order to provide statistical analysis services, and calibrate the report data accuracy through geolocation, providing basic anti-cheat capability.

Type of personal information collected: device information (IMEI/MAC/AndroidID/IDFA/OpenUDID/GUID/SIM card IMSI/geographic location, etc.)

Name of Third Party Organization: AUO Tongxin (Beijing) Technology Company Limited, Beijing RuiXun LingTong Technology Co.

Third party privacy policy link: https://www.umeng.com/page/policy

The above AUO pushSDK needs to integrate AgooSDK and anti-hijacking SDK technical components due to technical needs, details are as follows.

SDK Name: AgooSDK

Function: Provide the channel for message push

Type and purpose of collecting personal information:Collect device brand, model, and networking status to adapt the message push method and target system. Use utdid component to get AndroidID to identify the device only locally in the application, which is used to assist client identification.

Developer and Privacy Policy: Developer: Taobao (China) Software Co.

https://terms.alicdn.com/legal-agreement/terms/suit_bu1_taobao/suit_bu1_taobao201703241622_61002.html

SDK Name: Anti-Hijacking SDK

Function: Provide anti-hijacking technology to solve the problem of abnormal network domain names and domain name hijacking.

Type and purpose of collecting personal information: None, purely technical components. Only local acquisition of network status to determine the domain name situation.

Developer and Privacy Policy: Developer: Aliyun Computing Co.

http://terms.aliyun.com/legal-agreement/terms/suit_bu1_ali_cloud/suit_bu1_ali_cloud201902141711_54837.html

4)Third Party SDK: GetuiSDK2

Purpose: Provide message push technology services for app users

Mode: jar

Personal Information Collection Fields and Uses

1Device information such as device platform, device manufacturer and brand, device model and system version, device identification code, device serial number: used for us to identify to the independent device to realize pushing messages to specific users.

2Application list information: we use merged link technology for technical push, when a device has more than one APP push link active at the same time, we will randomly merge it into one link to achieve the purpose of saving electricity and traffic for you, so you need to get the application list information; at the same time, we provide intelligent push function, through the information to recommend more in line with your needs of the push content, to reduce the useless push information to you! We also provide intelligent push function to recommend the push content that better meets your needs through this information, so as to reduce the disturbance of useless push information to you.

3Network information and location-related information: In order to maximize the stability of the network connection and establish a long link, we need to understand the network status and changes in the device, so as to achieve stable and continuous push service. We provide the push function in response to the scene, and the location-related information will help us provide you with offline scenarios of fine-tuned push, which can recommend push content more in line with your needs and reduce the disturbance of useless push messages to you.

4Special Note: When we push messages to you, we may authorize Daily Interactive Co., Ltd. to regulate the link and promote the closed SDK push process, so as to ensure that you can receive the messages we push to you in time.

Name of Third Party Organization: Daily Interactive Co.

Third party privacy policy link: https://docs.getui.com/privacy

5) Third-party SDK: huaweipush

Purpose: To provide Huawei mobile app users with message push technology services.

Mode: Dependency

Fields and Uses of Personal Information Collected

1AAID(App anonymous identification), App Token, Topic subscription relationship, if you choose the data processing location, the data will be processed according to the data processing location you choose; otherwise the above information will not be processed.

2. Message sending records, Token application records, and display/click/close hit point reporting records require you to enable Huawei Analytics and select a data processing location before data processing is performed; otherwise, no data processing is performed.

3. The contents of cached messages are processed according to the region in which the client is located (for details, see Distribution of Data Processing Locations).

4. If your application pushes messages with the message verification function based on the Huawei account enabled, we will collect the phone user's identifier HMSCoreopenId in this scenario, and the HMSCoreopenId will be irreversibly encrypted to be saved only on the device side.

Name of third-party organization: Huawei Device Co.

Link to third-party privacy policy: https://consumer.huawei.com/cn/privacy/privacy-policy/

6) Third-party SDK: bugly

Purpose: Purpose of providing APP crash analysis and update capability

Approach: Dependency

Fields and purposes of collecting personal information: log information (including: third-party developer customized logs, Logcat logs, and APP crash stack information), device ID (including: androidid and idfv), networking information, system name, system version, and country code.

Name of Third Party Organization: Shenzhen Tencent Computer System Co.

Link to Third Party Privacy Policy:

https://privacy.qq.com/document/preview/fc748b3d96224fdb825ea79e132c1a56

7) Third party SDK: zxing

Purpose: Generate QR code, scan code

Mode: Dependency

Scope: Get camera permission, code scanning

8) Third-party SDK: OPush

Purpose: Push device alarm information from APP to your device terminal for users using OPPO cell phone.

Mode: Dependency

Collect personal information fields and purpose: Collect your device-related information (such as IMEI number, SerialNumber, IMSI, UserID, AndroidID, GoogleAdvertisingID, phone Region setting, device model, phone power, phone OS version and language), the application information using push service (e.g. app package name and version number, running status), push SDK version number, network related information (e.g. IP or domain name connection result, current network type), message sending result, notification bar status (e.g. notification bar permissions, user clicking behavior), lock screen status (e.g. whether the screen is locked or not, and whether to allow lock screen notification).

 

Name of Third Party Organization:Guangdong HuanTai Technology Co.

Link to third party privacy policy:https://open.oppomobile.com/wiki/doc#id=10288

8)Third Party SDK: vivoPush

Purpose:Provide message push technology service for Vivo mobile app users.

Mode: Dependency

Collection of personal information fields and purposes:

1. Device and application information: including operating system version number, application information, device identifiers (such as IMEI number, SIM and IMSI, mobile country code and mobile network number of VivoAndroid device, etc.), MAC address, mobile operator, language used, system settings and other system, device and application data during your use of Vivo devices and services.

2. Log information: Including login logs, network requests, access time, access times, access IPs, application operation information (including downloading, installing, switching, updating, uninstalling), error crashes, and other information generated in the course of your use of the Vivo devices and services.

3. Location information: When you request to use location-based services, such as positioning services, specific geographic location search, navigation, weather query, street view, etc., you need to provide your real-time location information (e.g., country code, region, cell ID, GPS information, latitude and longitude, base station information, etc.).

4Personal information submitted when you use the service

Name of third party organization: Guangdong Tianchen Network Technology Co.

Link to third party privacy policy: https://www.vivo.com.cn/about-vivo/privacy-policy

9) Third party SDK: weixinpay

Purpose: Payment channel for purchasing value-added services within the user's APP

Mode: jar

Collection of personal information fields and purposes: with the user to pay for the purchase of value-added services

Name of third party organizationCaifutong Payment Technology Co.

Third party privacy policy link: https://pay.weixin.qq.com/index.php/public/apply_sign/protocol_v2

10)Third party SDK: alipay

Purpose: user's payment channel for purchasing value-added services in APP

Mode: jar

Collection of Personal Information Fields and Usage: Common device information (e.g. IMEI/IMSI, SIM card serial number/MAC address, android_id) and network information will be collected for the security and wind control of user's login account and payment process, except for the above mentioned information, we will not collect any other personal data information of the user through the third-party application. In addition, if you want to know how we protect and handle your information, you can refer to "Alipay Privacy Policy".

Name of Third Party Organization: Alipay (China) Network Technology Co.

Link to Third Party Privacy Policy: https://opendocs.alipay.com/open/54/01g6qm

11)Third Party SDK: Aurora SDK

Purpose: Push message

Mode: device information: device identifier (IMEI, IDFA, AndroidID, MAC, OAID, IMSI and other related information), application information (application crash information, notification switch status, software list and other related information), device parameters and system information (device type, device model, operating system and hardware related information), network information: IP address, WiFi information, base station information and other related information.

Fields and purposes of collecting personal information: personal common device information, location information, network information, device information, geographic location, network information

Name of the third party organization:

Link to third party privacy policy: https://www.jiguang.cn/license/privacy

12) Third Party SDK: TopOnSDK

Purpose: Use TopOn's advertisement aggregation service to aggregate multiple advertisement platforms for cash generation

Method: System version name, system version number, current app package name, app version name, app version number, device manufacturer, device model, resolution, network type, example: WiFi/3G/4G, MNC(mobilenetworkcode), MCC(mobilecountrycode), system language, example: zh-CN, time zone, example GMT+08:00, timestamp, user_agent information, screen orientation, example: 1:vertical screen 2:horizontal screen, [Android domestic and overseas], device id (android_id), app installation source, [Android domestic], device id (android_id), imei (user authorization before collection), oaid iOS], idfa, idfv, mac address, [iOS].

Fields and Uses of Personal Information Collected: Personal Common Device Information, Location Information, Network Information, Device Information, Geographic Location, Network Information

Name of third party organization: TopOn

Link to third party privacy policy:

https://docs.toponad.com/#/zh-cn/android/NetworkAccess/SDK_Policy/TopOn_SDK_Privacy_Policy_CN

13)Third Party SDK:MobileCrossPlatformTools

Purpose: Sample application for testing mobile cross-platform development tools

Method: jar

Collect personal information fields and purpose: Collect personal information fields and purpose: to get the running process information, in order to monitor the wireless catling security app errors and abnormalities, as well as the platform optimization and upgrading, we will collect the application software running anomaly information.

Third party code: https://github.com/acperez/MobileCrossPlatformTools

14)Third party SDK:com.umeng

Purpose: Get device information

Method: Local module dependency

Fields and purposes of collecting personal informationType of personal information collectedDevice information (IMEI/MAC/AndroidID/IDFA/OpenUDID/GUID/SIM card IMSI/geographic location, etc.)

Name of Third Party Organization: AUO Tongxin (Beijing) Technology Co.

Third party privacy policy link: https://www.umeng.com/policy

14If we need to obtain your personal information outside of the above scenarios, we will obtain your express consent again and fully explain to you the application scenarios and the content and scope of the information obtained from you before obtaining your express consent.

15How do we use the information?

We use this information to provide, develop and improve XXXX products and services, including evaluating and recommending products, safety or energy use. We may use your contact information to send you product-related information or ask you to participate in surveys about your use of XXXX products and to send you other information from us.

We may also analyze and research this information to help us make sales, marketing and business decisions.

We use industry-standard methods to ensure that this information remains secure as it travels through your home network and the Internet to our servers. Depending on your location and the type of data, we may process your personal information on servers outside of your country.

Generally, we are the controller of information relating to our products and services for the purposes of applicable law (e.g. GDPR). However, in the case of "audio and video signals and data", you are the controller of this data and the XXXX Smart Camera is the processor.

 

Rules for the use of your personal information

We will use your personal information in accordance with the following rules: Privacy Policy License Agreement-CA Times 20231225(1).doc

(1) We will use the collected personal information according to the agreement of this policy and for the realization of our product and/or service functions.

2) We may send you commercial electronic messages (including SMS, emails, etc.) to provide you with information about products/services relevant to you. If you do not wish to receive such information, you can unsubscribe by using the "unsubscribe" function in the messages we send.

2Please note that all personal information you provide when using our products and/or services will continue to be licensed to us for the duration of your use of our products and/or services, unless you delete the software, or refuse to allow us to collect it through your account settings or system settings.

XXXX support through the problem feedback module to apply for deregistration, customer service received feedback will be within 5~7 working days, cancel the relevant account, we will stop using and delete your personal information.

3, we will be on our products and / or services use statistics, under your authorization will be shared with the public or a third party to share these statistical information to show the overall use of our products and / or services trends. However, such statistical information does not contain any identifying information about you.

4When we display your personal information, we will use, including content replacement, anonymous processing methods to desensitize your information in order to protect the security of your information.

5In order to optimize our products and provide you with better services, we will share personal data with suppliers who provide services to us. For example, companies we engage to provide data analysis services need to collect and access personal data for data statistics and analysis. In such cases, these vendors who receive data sharing must comply with our data privacy and security requirements.

6. When we want to use your personal information for other purposes not set out in this policy, or when we use the information collected for a specific purpose for other purposes, we will ask for your prior consent in the form of a check mark made by you on your own initiative.

 

C. You are fully aware that we do not need to obtain your authorized consent for the collection and use of personal information in the following cases:

1It is directly related to national security and national defense security;

2It is directly related to public safety, public health and major public interests;

3It is directly related to crime investigation, prosecution, trial and judgment execution;

4. For the purpose of safeguarding the subject of personal information or other individuals' life, property and other significant legitimate rights and interests but it is difficult to obtain the consent of the individual;

5The personal information collected is disclosed to the public by the subject of the personal information himself/herself;

6, from the legitimate public disclosure of information collected from your personal information, such as legitimate news reports, the relevant departments of information disclosure and other channels;

7Necessary for the fulfillment of the contract signed by you according to your request;

8, necessary for maintaining the safe and stable operation of the products and/or services provided, such as discovering and disposing of product and/or service failures;

9, other circumstances stipulated by laws and regulations.

 

How we use cookies and similar technologies

1Cookie

Cookie is a mechanism to support server-side (or script) storage and retrieval of information on the website or client. When you use a product or service, we will send one or more small data files called cookies on your computer or mobile device. the cookie assigned to you is unique and can only be read by the web server that publishes the cookie to your domain. cookies usually contain identifiers, site names, and some numbers and characters. We may use cookie technology to simplify the process of logging you in repeatedly, to store data such as your browsing preferences in order to provide you with preferences, to help optimize your selection of and interaction with advertisements, to help determine your log-in status, and for account or data security.

We are committed to researching cookie information only for the purpose of improving the quality of our services/products and optimizing the user experience. We will not use cookies for any purpose other than those stated in this policy. You can manage or delete cookies according to your own preferences, please see AboutCookies.org for more information. You can clear all cookies stored on your computer, most web browsers automatically accept cookies, but you can usually modify your browser settings to refuse cookies if you wish, or you can clear all cookies stored in your software. However, if you do so, you may need to change the user settings every time you visit the website or the software, and the corresponding information you have previously recorded will also be deleted, and may have a certain impact on the security of the services you use.

2. Web beacons and pixel tags

In addition to cookies, we may use other similar technologies on our website such as web beacons and pixel tags. For example, the emails we send you may contain click-through URLs that link to content on our websites, and if you click on the link, we track the click to help us understand your product or service preferences and improve customer service. A web beacon is typically a transparent image embedded in a website or email. Pixel tags in emails allow us to know if an email has been opened. If you do not want your activity to be tracked in this way, you can unsubscribe from our mailing list at any time.

2) How we protect and store your personal information

I. Protection and security measures for your personal information

We will make every reasonable effort to protect the personal information we obtain about you, and the personal information will be protected by a specialized data security department. In order to prevent unauthorized access, copying, modification, transmission, loss, destruction, processing or use of users' personal information in an accidental and unauthorized manner, we have taken and will continue to take the following measures to protect your personal information:

(1) Our network services adopt encryption technology such as transmission security protocols and provide browsing services through https and other means to ensure the security of user data during transmission.

(2) By adopting encryption technology to encrypt and save users' personal information and isolate it through isolation technology.

(3) When personal information is used, such as the display of personal information and the calculation of personal information association, we will adopt a variety of data desensitization technologies to enhance the security of personal information in use.

(4) We set up a strict data use and access system, and adopt strict data access rights control and multiple identity authentication technology to protect personal information and avoid data being used in violation of the law. We only allow authorized personnel to access personal information and require them to fulfill the corresponding confidentiality obligations.

(5) Specialized data and technical security audits are adopted, and log audits and behavioral audits are set up for a number of measures.

2Other security measures taken to protect personal information

1Manage and standardize the storage and use of personal information by establishing a data classification and grading system, data security management standards, and data security development standards.

2Establishing a dedicated department for information protection and a data security emergency response organization to promote and safeguard personal information security.

3) Strengthen security awareness. We will also organize training courses on security and privacy protection to enhance employees' awareness of the importance of protecting personal information.

3. Despite having taken reasonable and effective measures as described above and having complied with the standards required by the relevant laws and regulations, we are unable to guarantee the security of your personal information when it is communicated through unsecured means. Therefore, you should take active measures to ensure the safety of your personal information, such as: setting up complex passwords, regularly revising account passwords, and not disclosing your account passwords and other personal information to others.

4. There is always a risk of information leakage in the network environment. When there is an accident, force majeure or other circumstances that lead to the leakage of your information, we will try our best to control the situation and inform you of the cause of the incident, the security measures we have taken, the security measures you can take on your own initiative, and other related circumstances.

5After the unfortunate occurrence of a personal information security incident, we will, in accordance with the requirements of laws and regulations, inform you in a timely manner of the basic situation and possible impact of the security incident, the measures we have taken or will take to deal with the incident, the suggestions you can independently prevent and reduce the risk, and the remedial measures for you. At the same time, we will promptly inform you of the incident by email, letter, phone call, push notification, etc. When it is difficult to inform the subject of personal information one by one, we will take a reasonable and effective way to make a public announcement. At the same time, we will report to the corresponding competent authorities in accordance with the requirements of laws and regulations.

 

Preservation of your personal information

1. We will store users' personal information collected within the country in accordance with laws and regulations. If it involves the transmission of your personal information outside the country, we will clearly inform you and obtain your consent.

2We will continue to store your personal information for you during your use of our products or services. If you cancel your account or voluntarily delete your personal information, we will continue to store your information for 6 months after you cancel your account or delete your personal information in accordance with the Network Security Law and other laws and regulations.

 

III. Legal Basis for Data Processing

We have described the purpose of processing personal data above. Our legal bases for processing personal data include: to fulfill our contract with you (e.g., to provide you with the services you have requested, to identify and authenticate you so that you can use the website); to comply with legal requirements (e.g., to comply with applicable accounting rules, to fulfill mandatory disclosure requirements of law enforcement authorities); to protect our legitimate interests (e.g., to manage our relationship with you, to ensure the security of our services, to ensure the security of our services, to communicate with you about our products and services); and based on our customers' consent (e.g., to place cookies, to share your information with third parties for advertising purposes).

In some cases, you will need to provide us with personal data for the processing described above so that we can provide you with our full range of services and facilitate your use of our full range of features.

 

3) How we share your information

I. We will only share your information in the following circumstances as known to you

(1) We have obtained your or your guardian's explicit authorization or consent;

2We are required to disclose it by judicial or administrative authorities based on legal procedures;

3) When we file a lawsuit or arbitration against a user in order to protect our legitimate rights and interests;

4According to the relevant service agreements, usage rules and other agreements between you and us;

(5) Within the scope permitted by laws and regulations, when it is necessary to protect the Software and its affiliates, users of the Software and the public interest of the society from damage;

(6) In line with the relevant agreements between you and other third parties.

Second, in addition, we will share your order information, account information, device information and system message push and other information to partners and other third parties to ensure the smooth completion of the services provided to you. However, we will only share your personal information for lawful, legitimate, necessary, specific and clear purposes, and only share the personal information necessary to provide the service. Our partners are not authorized to use the shared personal information for any other purpose. Currently, our partners include technical service providers, mobile statistics service providers, system push service providers (e.g. Xiaomi, Huawei, VIVO, OPPO, Aurora). We may share your personal information with third parties that support our functionality. This support includes supplying or providing us with infrastructure technical services, payment services, data processing, message push, etc. We share this information for the purpose of enabling the core purchasing function and message push function of our products and/or services, for example, we need to share your order number and order amount with the third-party payment organization to enable it to confirm your payment instruction and complete the payment.

Third, you can share your video, location information, identity information, etc. to specific objects, and you can also share your own video, location information, identity information, etc. to specific people based on our products and/or services. We will not be liable when your sharing behavior leads to leakage of your information and other serious situations.

Others

We will publicly disclose your personal information after obtaining your explicit consent or under the mandatory requirements of laws, legal procedures, judicial organs or relevant authorities.

 

4) Your Rights

In accordance with applicable law, you have the right to object to or request the restriction of the processing of your personal data and to request the right of access, correction, deletion and portability of your own data.

Where the use of your data is based on your consent, you have the right to withdraw this consent at any time, provided that the withdrawal of consent does not affect the legality of the data processing based on the consent prior to its withdrawal.

You can submit your requests to us via the "Comments and Feedback" function.

If you notice changes or inaccuracies in your information, please notify us of these changes so that our records can be updated or corrected. If you believe that our processing of your personal data violates applicable law, you may file a complaint with a supervisory authority.

The length of time we retain your personal data depends on the need to provide you with the service or product, or as required or permitted by applicable laws such as tax and accounting laws.

In principle, we do not charge you for reasonable requests, but for requests that are repeated more than reasonably necessary, we will charge a fee for the costs incurred, as appropriate. We will refuse requests that are unnecessarily repetitive, require excessive technical means (e.g., requiring the development of a new system or a fundamental change in existing practices), pose a risk to the legal rights of others, or are highly impractical (e.g., involving the backing up of information stored on magnetic tapes).

In the following cases, we will not be able to respond to your request as required by law or regulation:

(1) Related to national security, national defense security;

2) Related to public safety, public health, and significant public interest;

(3) Related to crime investigation, prosecution, trial and judgment execution;

(4) Where there is sufficient evidence that you have subjective malice or abuse of rights;

(5) Responding to your request will lead to serious damage to your legitimate rights and interests or those of other individuals or organizations;

6Involving commercial secrets.

 

5How we handle minors' personal information

1We attach great importance to the protection of minors' personal information. If you are a minor under the age of 18, you should obtain prior written consent from your parents or legal guardian before using our products and/or services. We protect the personal information of minors in accordance with relevant national laws and regulations.

2For the collection of minors' personal information with the consent of parents or legal guardians, we will only use or publicly disclose this information when permitted by law, with the explicit consent of parents or legal guardians, or when necessary for the protection of minors.

3If we find that we have collected personal information from minors without first obtaining verifiable parental or legal guardian consent, we will attempt to delete the relevant data as soon as possible.

 

5. Software Usage Tracking

You agree that isHome Software will monitor your use of the Software in order to improve the usability of the Product. In doing so, the Software may record usage information regarding selected product features, unique machine IDs (automatically generated upon installation of the Software) and other Software products installed on the same machine. Such usage information will not be collected in conjunction with any corresponding personally identifiable information and will retain usage anonymity.

 

6. Software Updates and Marketing

The isHome Software may cause your computer, without additional and/or advance notice, to automatically connect to the Internet and communicate with the Software to check for available bug fix patches, add-ons, plug-ins, and new versions (collectively, "Software Updates"). You hereby agree that the Software may communicate to you information about Software Updates and special offers from the Software, Software Affiliates and third party partners.

7. Copyright Information and Owner's Statement

The software contained in this package or device is protected by the relevant copyright laws, international treaty provisions and all other applicable national laws. The software must be treated like all other copyrighted material (e.g. books and musical recordings). This license does not permit the software to be rented, and the written materials accompanying the software, if any, may not be copied.

Title and all intellectual property rights in the isHome Software and its accompanying documentation, as well as any copies of said documentation, remain the sole and exclusive property of the Software and/or its third party licensors. You agree to comply with copyright laws and all other applicable laws. You acknowledge that the Software contains valuable confidential information and trade secrets of the Software and/or its third party licensors.

 

8. Disclaimer

The isHome Software and Services are provided without warranty of any kind. no warranties, express or implied, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose and the warranty of non-infringement of intellectual property rights are made and the software expressly disclaims all warranties. you assume the entire risk relating to the quality and performance of the software and services. if the software proves defective, you, and not the software or the authorized reseller, assume the complete cost of repair or correction, assuming the necessary service. some states or jurisdictions do not allow the exclusion of implied warranties, so the above exclusion may not apply to you.

 

9. limited liability statement

your sole remedy and the entire liability of the software and its licensors is as set forth in the above terms. in no event shall the software and its licensors be liable to you or any other person for any damages whatsoever, including any incidental or consequential damages, costs, lost profits, lost savings or other damages arising out of the use of, or inability to use, this software, or even if the software or its licensors have been advised of the possibility of such damages. because some jurisdictions do not allow the exclusion or limitation of consequential or incidental damages, the above limitation may not apply to you.

 

10. Export Notices

You may not export or re-export products incorporating the Software without the appropriate license.

 

11. High Risk Activities Statement

isHome Software is not fault-tolerant and is not intended for use in hazardous environments requiring fail-safe performance, or any other application in which a failure of the Software could directly result in death, personal injury, or serious physical or property damage (collectively, "High Risk Activities"). the software expressly disclaims any express or implied warranty of fitness for purpose with respect to high risk activities.

 

12. Indemnification

You agree to hold harmless, indemnify and defend the Software, its officers, directors and employees from and against any losses, damages, fines and costs (including attorneys' fees and costs) arising out of or in connection with any claim that you have.

(i) use, view, copy, download, encode, compress, reproduce or transmit any material (other than material provided by the Software) in connection with the Software in violation of another party's rights or in violation of any law;

(ii) violate any of the terms of this License Agreement.

13. Revisions and Updates to this Policy

We may make changes to this Policy from time to time. We will not reduce your rights under this Policy without your express consent.

We will notify you of changes to this Policy (including, but not limited to, material changes) by means of push notifications, pop-ups, emails, and so on.

Material changes referred to in this Policy include, but are not limited to:

1. Significant changes in our service model. For example, the purpose of processing personal information, the type of personal information processed, and how personal information is used;

2. Significant changes in our ownership structure, organizational structure, etc.. Such as changes in ownership caused by business adjustments, bankruptcy and mergers and acquisitions;

3. Changes in the main targets of sharing, transferring or publicly disclosing personal information;

4. Significant changes in your right to participate in the handling of personal information and its form and manner;

(5) Changes in the department responsible for handling personal information security, contact information and complaint channels;

6. When the security impact assessment report of personal information indicates that there is a high risk.

14Termination

This agreement will remain in full force and effect when you use the services. You can terminate the use of the services at any time. We may deny or suspend your access to and/or use of the Services and/or account at any time, for any reason, without warning. This may result in the forfeiture and destruction of all information associated with your membership. We may also immediately terminate or suspend any and all Services and access to the Site without prior notice or liability if you violate any term or condition of this Agreement. Upon termination of your account, your right to use the Services, access the Site and any Content will immediately cease. All provisions of this Agreement other than "1. License Authorization" shall, by their nature, survive termination, including, but not limited to, the disclaimer of warranties, disclaimers and indemnities.

 

15. Developer Information

The app name is: isHome, developed by Shenzhen Zhongan Times Technology Co.

 

16How to contact us

Developer Contact: zasd@ishome-iot.com

 

If you have any questions, comments or suggestions about this policy or matters related to your personal information, please contact us through the "Comments and Feedback" function built into the software. We will normally respond within 10 business days.

 

Updated: December 25, 2023

Effective Date: December 25, 2023