Sharetronic Technology Co., Ltd. (hereinafter referred to as "Sharetronic" or "we") attaches great importance to user privacy protection. We are well aware of the importance of personal information to users (hereinafter referred to as "you"), and we will take corresponding security protection measures in accordance with legal and regulatory requirements, and do our best to protect your personal information security and controllability. For this reason, we have specially formulated the "Infisight Privacy Policy" (hereinafter referred to as "this Policy") so that you can understand in detail how we will collect, use, transmit, save, and disclose your personal information and what rights you enjoy. This Policy applies to the Infisight service (hereinafter referred to as "this Service" or "Infisight") provided by Sharetronic, including but not limited to Infisight web terminal ( cloud.infisight.net) , Infisight software (mobile applications), personal center, code and related technical services, and Infisight functions/services integrated into third-party products or software (such as Infisight services under mini-programs and official accounts). If there is any inconsistency between this Policy and similar terms in the Infisight "Infisight Service Agreement", this Policy shall prevail. In addition, this Policy does not apply to services provided by other companies or individuals (hereinafter referred to as "Third-Party Services").
Please be aware that your consent to this Policy only represents that you have understood the functions provided by the application and agreed to our collection of necessary personal information required for the functions to operate, but it does not mean that you have agreed that we can collect non-essential personal information. Non-essential personal information will be separately requested for your consent based on the authorization situation during your use process.
Corresponding permissions will not be enabled by default. When involving important or sensitive device permissions, we will separately pop up a window to obtain your consent again when you use the corresponding business functions; after the permissions are enabled, you can also close the permissions at any time through device settings; if you disagree to enable permissions, it will not affect the normal use of other unrelated business functions. For personal sensitive information, we will separately obtain your consent before processing it.
If you refuse this Policy, you will enter browsing mode, but will not be able to use the basic functions we provide. You can authorize separately during the subsequent use of the service.
After reading this Policy, if you have any questions about this Policy or matters related to this Policy, you can contact us through the feedback channels listed in the "How to Contact Us" section of this Policy, and we will answer you as soon as possible.
This Policy will help you understand the following content:
1. How we collect your personal information
2. How we use your personal information
3. How we use Cookies and similar technologies
4. How we protect and save your personal information
5. How we entrust processing, share, transfer, and publicly disclose your personal information
6. How you access and manage your personal information
7. How we handle children's personal information
According to the "Provisions on the Scope of Necessary Personal Information for Common Types of Mobile Internet Applications", this App does not belong to common types of Apps. The basic business functions of this App are video viewing, store inspection, organizational structure management, device management, and image management. The necessary personal information that needs to be provided is: mobile phone number, account name, password, name.
When using this Service, you need to actively submit to us or authorize us to collect and use the following two types of personal information:
1. Personal information necessary for the basic business functions of mobile Internet applications to operate. Without this information, mobile Internet applications cannot achieve basic business functions.
2. To provide you with extended business functions of this Service and basic business functions that require non-essential personal information. If you refuse to provide, you will not be able to normally use relevant extended business functions or achieve the functional effects we intend to achieve, but it will not affect your normal use of the basic business functions of this Service.
Please note:
1. Since we provide many products and services with diverse functions, and different users choose to use specific services differently; accordingly, basic/extended business functions and the types and scope of collected and used personal information will differ. Please refer to specific service functions for details;
2. If the information you submit to us or collected through our services contains personal information of others, you must ensure that you have legally obtained authorization from relevant subjects. In particular, if the aforementioned personal information involves children's personal information, you need to obtain the consent of the corresponding child's guardian in advance.
We will collect your corresponding types of personal information for the purposes stated in this Policy. If we use your personal information for other purposes not stated in this Policy or collect other personal information not mentioned additionally, we will separately obtain your consent through page prompts, interactive processes, website announcements, or other methods. Once you agree, such additional uses will be deemed part of this Policy, and such additional information will also be subject to this Policy. You can refer to Appendix 4 "List of Collected Personal Information" to understand in detail the specific situation of our collection and use of your personal information.
(1) Registration: When you use the registration function, you need to provide us with your mobile phone number, email address, password, name for registration. When you use a mobile phone number for registration, for the necessity of identity verification, mobile phone number, account name, password, name are necessary information for the registration function. If you do not provide them, you will not be able to register normally.
(2) Login: We provide three login methods: email + password, mobile phone number + verification code, mobile phone number + password. You can choose any one of them. When you use email/mobile phone number and password to log in, you need to provide us with your email/mobile phone and password to log in to your account. If you do not provide them, you will not be able to log in normally through the email/mobile phone number + password method. When you use mobile phone number and verification code to log in, you need to provide us with your mobile phone number to send you dynamic verification codes. If you do not provide it, you will not be able to log in normally. In addition, if you associate and log in to Infisight services in other ways, we will obtain your third-party account information from third parties based on your authorization. For personal information that we need but third parties cannot provide, we will still require you to provide it. For services that need to be used through Infisight accounts, we will verify your user identity based on the information you provided above, ensuring that we are providing services to you personally.
None.
None.
(1) Please understand and agree that when you use this function, your enterprise/organization is the controller of your personal information, and we only process enterprise/organization-controlled data or your personal information according to the instructions of the enterprise/organization administrator.
(2) When you use video viewing and device management functions, your enterprise/organization will assign you positions, departments, employee IDs, and operation logs, login records, video viewing records that you need to collect for completing daily operational management of the enterprise organization. The specific types of personal information collected and the purpose are determined by your enterprise/organization. Therefore, the personal information ultimately collected by the product is subject to the filling interface of your product.
When you use the video intercom function, the App needs to call your microphone permission. If you refuse relevant system permissions, you will not be able to conduct video intercom.
When you use device addition and video intercom functions, we will implement it through Weiduo SDK. This SDK will collect your device's product serial number and product verification code, submitted audio content. This type of information is necessary to achieve the function of this SDK.
When you use the WeChat sharing function for images, we will implement it through the WeChat Open Platform. This SDK will collect your device model, operating system, unique device identifier (referring to a string of characters programmed into the device by the device manufacturer that can be used to uniquely identify the corresponding device), login IP address, WeChat software version number, network access method, type and status, network quality data, device accelerator (such as gravity sensing device), operation logs, service log information (such as your search and viewing operation records in WeChat, service failure information, referral URL information, etc.) and other log information. This type of information is necessary to achieve the function of this SDK.
We provide you with customer services such as product and service consultation, usage support, pre-sales and after-sales services through multiple channels such as telephone, email, and online systems. To better meet your needs, you need to provide your name, phone number, address, project name, company/organization name. To facilitate contact with you, help you solve problems as soon as possible or record solutions and results for related issues, we also need you to provide necessary personal information to match and verify your user identity. We will also collect and save your communication/call records and related content with us in accordance with this Policy as appropriate (account information, your contact information, feedback problems or suggestions).
To ensure your normal use of this Service, maintain the normal operation of our services, improve and optimize our service experience, and ensure your account security, we will collect relevant information generated during your use of this Service:
1) When you use this Service, we will receive and record the device you use to install and use Infisight software and its location information, such as your mobile phone or computer hardware model, operating system version number, International Mobile Equipment Identity (IMEI), International Mobile Subscriber Identity (IMSI), software installation list, according to the specific permissions you grant during software installation and use. Please understand that this information is basic information that we must collect to provide services and ensure normal product operation;
(2) When you use Infisight services to manage the smart electronic hardware devices you have bound, we will automatically receive and record relevant device information, such as type, version number, serial number, verification code, channel information. We rely on this information to provide you with services and ensure safe operation of the devices.
(3) To help us better understand the operation of the software corresponding to this Service, to ensure the security of operation and service provision, we will record network log information, as well as the frequency of using software and related services, crash data, error or abnormal service data, system operation status information of abnormal devices.
For your contact information (such as your contact email, phone number) provided during your use of this Service, we may send various types of notifications to one or more of them during operations, for purposes such as user message notification, identity verification, security verification, and user experience research. If you are unwilling to receive this information, you can unsubscribe through the unsubscribe methods provided in this information.
You understand and agree that when you use this Service, you may need to enable specific access permissions on your device to achieve the collection and use of personal information involved in these permissions.
When you need to close permissions, you can operate in the settings interface of the mobile device you use or within the App. The specific operation path is Android end: [System Settings - Application Management - Application List - Infisight - Notification Management]; iOS end: [System Settings - Notifications - Application List - Infisight]. Please note that enabling any permission represents your authorization for us to collect and use relevant personal information to provide you with corresponding services. Once you close any permission, it represents cancellation of authorization, and we will no longer continue to collect and use relevant personal information based on the corresponding permission, nor can we provide you with the service corresponding to that permission. However, the decision to close permissions will not affect the collection and use of information previously based on your authorization.
Details of specific permission names, applicable ports, acquisition scenarios and purposes are as follows:
| No. | Permission Group | Permission Name | Function Description | Accessible Personal Information | Business Function |
|---|---|---|---|---|---|
| 1 | CAMERA Camera Permission | CAMERA | Allow App to use camera | Camera information | QR code scanning, avatar setting, online evaluation, on-site evaluation, store self-inspection, on-site rectification, QR code login, binding device |
| 2 | LOCATION Precise Location Permission | ACCESS_FINE_LOCATION | Allow app to use location | Precise location information | On-site evaluation, store self-inspection, on-site rectification, nearby stores, editing store location, configuring device network |
| 3 | AUDIO Microphone Permission | RECORD_AUDIO | Allow app to use microphone | Voice information | Device intercom |
| 4 | STORAGE Storage Permission | WRITE_EXTERNAL_STORAGE | Allow App to read/write media files | Media file information | Personnel management, checklist management, save to album, online evaluation, on-site evaluation, store self-inspection, on-site rectification, avatar setting, binding device |
| 5 | SYSTEM_ALERT_WINDOW Floating Window Permission | SYSTEM_ALERT_WINDOW | Allow floating windows inside and outside the application | None | Message pop-ups inside and outside the application |
| No. | Permission Group | Permission Name | Function Description | Accessible Personal Information | Business Function |
|---|---|---|---|---|---|
| 1 | Camera | Camera | Access device camera | Photos and videos taken | QR code scanning, avatar setting, online evaluation, on-site evaluation, store self-inspection, on-site rectification, QR code login, binding device |
| 2 | Microphone | Microphone | Access device microphone | Voice data | On-site evaluation, store self-inspection, on-site rectification, nearby stores, editing store location, configuring device network |
| 3 | Photos | Photo Library Additions Write-only photo library | Write-only access to user photo library | Images and videos in photo library | Device intercom |
| 4 | LOCATION Location Permission | LOCATION Location Permission | LOCATION Location Permission | User location | Personnel management, checklist management, save to album, online evaluation, on-site evaluation, store self-inspection, on-site rectification, avatar setting, binding device |
| 5 | APNs Notification Permission | APNs Notification Permission | APNs Notification Permission | Message notification | Message pop-ups inside and outside the application |
| 6 | Network Network Permission | Network Network Permission | Network Network Permission | Network access | App network data access |
In addition, to push messages to you, we will also apply to call floating window permissions; to facilitate your copy-paste function, we will apply to call clipboard permissions. If you disagree to enable permissions or close permissions, it will not affect the normal use of other unrelated business functions.
7. If we stop operating products or services, we will promptly stop continuing to collect user personal information activities. The notice of cessation of operations will be notified to users in the form of an announcement 30 days in advance, and the personal information of users held will be deleted or anonymized in accordance with applicable laws.
8. Exceptions to obtaining authorized consent
According to relevant laws and regulations, the following circumstances do not require your authorization consent to collect your information: (1) Directly related to national security and defense security; (2) Directly related to public safety, public health, and major public interests; (3) Directly related to criminal investigation, prosecution, trial and judgment enforcement; (4) To protect the life, property and other major legitimate rights and interests of you or other individuals, but it is difficult to obtain the person's consent; (5) The personal information collected is voluntarily made public by you to the public; (6) Necessary for signing and performing contracts with you as required; (7) Collecting personal information from legally public disclosure channels, such as legitimate news reports, government information disclosure, etc.; (8) Necessary for legitimate news reporting; (9) Other circumstances stipulated by laws and regulations.
9. Tips regarding sensitive personal information
Sensitive personal information refers to personal information that, once leaked or illegally used, can easily lead to infringement of personal dignity or harm to personal and property safety. The sensitive personal information involved in this Policy includes: network identity identification information (including username, nickname, email address and passwords related to the above); other information (including personal telephone number, mobile phone number).
10. Functions for implementing enterprise organization-controlled data
(1) You and your enterprise/organization (if any) shall be responsible for all data and materials generated by uploading, entering, publishing, transmitting, storing and other use of the account. Such data and materials are enterprise-controlled data. Please note that the enterprise/organization is the data controller of the above personal information.
(2) If you provide sensitive personal information such as face images, real names, mobile phone numbers, etc. on behalf of your enterprise/organization, both you and the representative enterprise/organization you represent shall ensure that the separate consent of the personal information subject has been obtained in advance, and have fully informed the personal information subject in a prominent manner of the purpose for which the above data will be used, while informing the individual of the necessity of processing the above sensitive personal information and its impact on their personal rights and interests. At the same time, it is also necessary to inform the individual of the name and contact information of the enterprise/organization, the retention period of the above data, and the methods and procedures for the personal information subject to exercise rights such as deletion, viewing, and modification. If your enterprise/organization has other uses for the above sensitive personal information, please obtain the separate consent of the personal information subject and make relevant disclosures in accordance with legal and regulatory requirements. When you provide other personal information other than sensitive personal information on behalf of the enterprise/organization, it represents that your enterprise/organization has obtained the explicit consent of the personal information subject in advance, and has fully informed the personal information subject of the purpose, scope and use method of relevant data collection.
(3) You agree that if we find that you have collected personal information of a third party without their explicit consent, or we receive relevant complaints and reports, we have the right to make independent judgments, extract relevant system records as evidence, and take measures such as immediately deleting relevant information, suspending or terminating part or all of services to you. The evidence we extract may be used as direct evidence of your violations and may be submitted to competent authorities or relevant third parties. If you violate your commitment and illegally collect personal information of third parties, the resulting responsibility shall be borne by you yourself. If this causes losses to us, we have the right to claim compensation from you.
11. Description of third-party links
The products we provide may include links to information/services provided by third parties. Before using these third-party products/services, you need to jump to the corresponding third-party page. Your use of this third-party service (including any personal information you provide to the third party) shall be bound by the third party's service terms and privacy policy (rather than this Policy). You need to carefully read their terms and decide for yourself whether to accept them. Please properly protect your personal information and only provide it to others when necessary. This Policy does not apply to any services provided by third parties or third-party information use rules, third parties are responsible for their own behavior when using your information.
(1) We will use your personal information according to the following rules
1. We will use it in accordance with the provisions of this Policy and to achieve corresponding product and/or service functions.
2. We may integrate your personal information and/or other information related to your service or product use behavior that we legally obtain (hereinafter referred to as "other information") to prevent, discover, and investigate fraud, infringement, security hazards, illegal activities or violations of agreements with us or our affiliated companies.
3. We may process your personal information or use it in combination with other information for the purpose of maintaining, improving, and optimizing our products and/or services and enhancing user experience.
4. When you access third-party services through this Service, we will share your authorized scope of personal information with third-party service providers based on your authorization.
5. Other uses permitted by you.
(2) Please note that all personal information you provide or authorize us to collect when using this Service will continue to authorize us to use during your use of our products and/or services, unless you delete it or refuse our collection through account settings or system settings. When you cancel your account, we will stop using and delete or anonymize your personal information, except as otherwise provided by laws and regulations.
(3) When we display you and your personal information, we will use methods including content replacement and anonymization to desensitize your information to protect your information security.
(4) Please understand that the functions and services we provide to you are constantly updated and developing. If new functions or services require collecting and using your personal information, we will separately inform you of the type, scope, purpose and use rules of information collection through page prompts, interactive processes, website announcements, etc., and obtain your explicit consent.
(5) We hereby specially remind you that if information cannot identify your personal identity alone or in combination with other information, it does not constitute your personal information in the legal sense; when your information can identify your personal identity alone or in combination with other information, or when data that cannot be associated with any specific personal information is used in combination with your other personal information, these information will be treated as your personal information and processed and protected in accordance with this Policy during the combined use period.
1. Cookies are a mechanism that supports server-side (or scripts) in storing and retrieving information on websites or clients. When you use this Service, we will send one or more small data files named Cookies to your computer or mobile device. The Cookie designated to you is unique and can only be read by the web server in the domain that issued the Cookie to you. Cookies usually contain identifiers, site names, and some numbers and characters. We will use Cookie technology to simplify your repeated login steps and help determine your login status as well as account or data security.
2. We promise that research on Cookie information is only for the purpose of improving service/product quality and optimizing user experience. We will not use Cookies for any purpose other than those described in this Policy. You can manage or delete Cookies according to your preferences. For details, please see AboutCookies.org. You can clear all Cookies saved on your computer. Most web browsers automatically accept cookies, but you can usually modify your browser settings as needed to refuse Cookies. You can also clear all Cookies saved in the software. However, if you do so, you may need to change user settings manually every time you visit this Service, and your previously recorded corresponding information may also be deleted, and it may have a certain impact on the security of the services you use.
In addition to Cookies, we may also use other similar technologies such as web beacons and pixel tags on our website. For example, emails we send to you may contain click URLs that link to our website content. If you click this link, we will track this click to help us understand your product or service preferences and improve customer service. Web beacons are usually transparent images embedded in websites or emails. With the help of pixel tags in emails, we can know whether emails have been opened. If you do not want your activities to be tracked in this way, you can unsubscribe from our mailing list at any time.
1. We will store user information collected within China in accordance with legal and regulatory provisions. If we involve transmitting your personal information overseas, we will clearly inform you and obtain consent.
2. We will only retain your personal information for the period necessary to achieve the purposes stated in this Policy, unless otherwise provided by laws and regulations. After exceeding the retention period, when you cancel your account or actively delete personal information, we will delete or anonymize your personal information in accordance with applicable legal requirements, except as otherwise provided by laws and regulations.
3. To prevent your personal information from being illegally accessed, copied, modified, transmitted, lost, destroyed, processed, or used in unexpected or unauthorized situations, we have and will continue to take the following measures including but not limited to the following to protect your personal information:
(1) Our network services have adopted encryption technologies such as transmission security protocols to provide transmission services through https and other methods to ensure the security of user data during transmission.
(2) We will use encryption technology to encrypt and save user information when we deem necessary, and isolate it through isolation technology.
(3) When using personal information, such as personal information display, personal information association calculation, we will use multiple data desensitization technologies including content replacement and encryption desensitization to enhance the security of personal information in use.
(4) Establish strict data use and access systems, adopt strict data access permission control and multi-factor authentication technology to protect user information and avoid data misuse. We only allow authorized personnel to access user information, ensure that employees within the company who have access to your personal information can only access the minimum necessary personal information required to perform their duties, and only have the minimum data operation permissions required to complete their duties, and require them to perform corresponding confidentiality obligations.
(5) When there are situations where we share your personal information with third parties, our network services have adopted encryption technologies such as transmission security protocols. We provide transmission services through https and other methods to ensure the security of user data during transmission.
4. Please be sure to properly keep your account and password. When you use our services, we will identify your identity through elements such as your account and password. Once you leak the aforementioned information, you may suffer losses and it may have adverse effects on you. If you find that your account, password and/or other identity elements may or have been leaked, please contact us immediately so that we can take timely measures to avoid or reduce related losses.
1. Despite taking the aforementioned reasonable and effective measures and having complied with the standards required by relevant legal provisions, we still cannot guarantee the security of your personal information when communicated through insecure channels. Therefore, you should also actively take measures to ensure the security of your personal information, such as setting complex passwords, regularly changing account passwords, and not disclosing your account passwords and other personal information to others.
2. Various information leakage risks always exist in the network environment. When unexpected events, force majeure and other situations cause your information to be leaked, we will do our best to control the situation and promptly inform you of the cause of the incident, security measures we have taken, security measures you can actively take, and other relevant situations.
3. After an unfortunate information security incident occurs, we will promptly inform you in accordance with legal requirements: the basic situation and possible impact of the security incident, disposal measures we have taken or will take, suggestions for you to independently prevent and reduce risks, remedial measures for you, etc. We will also inform you of relevant incident situations through methods such as email, letters, telephone, push notifications, etc. When it is difficult to inform personal information subjects one by one, we will adopt reasonable and effective methods to issue announcements. At the same time, we will report to competent authorities in accordance with legal requirements.
1. To improve information processing efficiency, reduce information processing costs, or improve information processing accuracy, we may entrust capable affiliated companies or other professional institutions to represent us in processing information. We will require entrusted companies to comply with strict confidentiality obligations and take effective confidentiality measures through written agreements, on-site audits, etc., prohibiting them from using this information for purposes not authorized by you. When the entrustment relationship is terminated, we will require them to immediately delete your personal information.
2. To enable you to use our services, our software will embed SDKs or similar applications from authorized partners. We will conduct strict security monitoring on application programming interfaces (APIs), software development kits (SDKs) that authorized partners use to obtain relevant information, and agree on strict data protection measures with authorized partners, requiring them to process personal information according to our entrustment purposes, service descriptions and this privacy policy.
3. We will not share your personal information with third parties, except in the following circumstances:
(1) We have obtained your clear authorization or consent and share your personal information with third parties according to the scope of your authorization;
(2) We may share your personal information externally in accordance with legal and regulatory provisions, litigation, dispute resolution needs, or requirements proposed by administrative or judicial authorities in accordance with the law;
(3) Infringement complaint handling: when you are complained by others for infringing intellectual property rights or other legitimate rights, it is necessary to disclose your necessary materials to the complainant to handle complaints;
(4) Sharing with authorized partners: we may entrust authorized partners to provide certain services for you or represent us in performing functions, including providing infrastructure technical services, SMS services, data processing services for our services. For example, sharing materials required for real-name authentication with real-name authentication service providers; sharing materials required for electronic signatures with electronic signature providers. We will only share your personal information for the legal, legitimate, necessary, specific, and clear purposes stated in this Policy. Authorized partners can only access information necessary for performing their duties and must not use this information for any other purpose. For companies, organizations, and individuals that we entrust to process personal information, we will sign strict confidentiality agreements with them, requiring them to process personal information in accordance with our requirements, this privacy policy, and any other relevant confidentiality and security measures.
4. In addition, our products/services also incorporate services provided by third parties. When you use these services provided by third parties, third parties may collect and use your personal information for the purpose of providing services, so we remind you to carefully read the relevant terms and policies provided by third parties before using these services.
5. It should be specially noted that third-party service providers can provide products or services to you through terminals. You can choose whether to use third-party services and when to terminate or cancel the use of third-party services. During use, third-party service providers may collect, use, and store your relevant data or information. Before deciding whether to use such services, please fully understand their personal information and privacy protection strategies from third-party service providers, or contact your enterprise/organization users for more information. Specific situations can be found in Appendix 3 "Third-party Shared Personal Information List".
We will not transfer your personal information to any company, organization, or individual, except in the following circumstances:
1. When we obtain your clear consent;
2. In cases involving mergers, acquisitions, or bankruptcy liquidation, if personal information transfer is involved, we will require the new company or organization holding your personal information to continue to be bound by this privacy policy, otherwise we will require that company or organization to重新 obtain your authorization consent.
1. We will only publicly disclose your personal information in the following circumstances:
(1) With your clear consent or based on your active choice, we may publicly disclose your personal information;
(2) Legal disclosure: under circumstances required by law, legal proceedings, litigation or mandatory requirements of government regulatory authorities, we may publicly disclose your personal information;
(3) For purposes reasonably necessary to execute relevant service agreements or this privacy policy, maintain public social interests, handle complaints/disputes, protect the personal and property safety or legitimate rights and interests of our customers, us or our affiliated companies, other users or employees.
2. If we disclose your personal information for the aforementioned reasons, we will promptly inform you on the basis of complying with relevant laws and regulations and this Policy.
According to relevant laws and regulations and national standards,
in the following circumstances, we may share, transfer, and publicly disclose personal information without the need to obtain authorization consent from personal information subjects in advance:
1. Related to our performance of obligations stipulated by laws and regulations;
2. Directly related to national security and defense security;
3. Directly related to public safety, public health, and major public interests;
4. Directly related to criminal investigation, prosecution, trial and judgment enforcement;
5. To protect the life, property and other major legitimate rights and interests of personal information subjects or other individuals, but it is difficult to obtain the person's authorized consent;
6. Personal information that personal information subjects voluntarily make public to the public;
7. Collecting personal information from legally public disclosure information, such as legitimate news reports, government information disclosure and other channels.
In addition, according to the aforementioned regulations, providing externally de-identified processed personal information, and ensuring that data recipients cannot restore and re-identify personal information subjects, will not require separate notification to you or obtaining your consent.
In accordance with China's relevant laws, regulations, standards, as well as common practices in other countries and regions, we guarantee your exercise of the following rights regarding the personal information you provide:
1. You have the right to access and update some of your personal information. Usually, you can view or update your registration information on the "Personal Center" or similar pages, and view or update your device information on the resource center page. You agree that before you perform relevant operations, we may require you to undergo identity verification to confirm the identity of the visitor and protect your information security.
2. In addition to the personal information listed above, we cannot provide you with access and correction services for some of your personal information. This information is mainly device information collected to improve your user experience and ensure transaction security, and personal information necessary to ensure the normal operation of the business functions you choose. We will use this information within the scope of your authorization. You cannot access and correct it, but you can contact us to delete or anonymize it.
1. Some of your personal information can be directly deleted by you. Please refer to the actual display on the service page for details.
2. In the following circumstances, you can make a request to us to delete personal information:
(1) If our processing of personal information violates laws and regulations;
(2) If we collect and use your personal information without obtaining your consent;
(3) If our processing of personal information violates our agreement with you;
(4) If your account is cancelled or recycled;
(5) If we terminate services and operations.
3. If we decide to respond to your deletion request, we will also notify entities that have obtained your personal information from us to require them to delete it promptly, unless otherwise provided by laws and regulations, or these entities have obtained your independent authorization.
4. When you or we assist you in deleting relevant information, we may not be able to immediately delete corresponding personal information from backup systems due to applicable legal and security technologies, but will delete this information when backups are updated or within a reasonable time.
1. You can change the scope of your authorization for us to continue collecting personal information or withdraw your authorization by deleting personal information, closing device or service functions, making privacy settings on this Service website or software. You can also withdraw all our authorization to continue collecting your personal information by cancelling your account.
2. Please understand that each business function requires some of your personal information to achieve. When you withdraw consent or authorization, we can no longer continue to provide you with the services corresponding to the withdrawn consent or authorization, nor will we process your corresponding personal information. However, your decision to withdraw consent or authorization will not affect the information processing previously conducted based on your authorization.
3. When you use this Service, you may receive system message pushes, etc. You can always enable or disable the permission to push information to you through these two operation paths: Android end: [System Settings - Application Management - Application List - Infisight - Notification Management] or [Infisight - My - Settings - Message Settings]; iOS end: [System Settings - Notifications - Application List - Infisight]. Please note that our current services do not have targeted push functionality for individual users after forming user portraits through analysis.
Infisight provides you with an account cancellation channel. The path is WEB end: [My] - [Account Security] - [Cancel]; APP end: [My] - [Account Security] - [Cancel]. The specific process for account cancellation is subject to the announcement on the relevant page or additional requirements from Infisight. Once your account is cancelled, it cannot be recovered. Please operate with caution. After you actively cancel the relevant account, we will stop providing you with the product or service, and delete or anonymize the personal information you provided in accordance with applicable legal requirements, except as otherwise provided by laws and regulations.
If you need copies of your personal information, you can contact us through the feedback channels listed in the "How to Contact Us" section of this Policy. After verifying your identity, we will provide you with copies of your personal information in our services (including basic information, identity information), except as otherwise provided by laws and regulations or otherwise agreed in this Policy.
1. If you cannot access, correct, or delete your personal information through the above methods, or you need to access, correct, or delete other information generated when you use our products and/or services, or you believe we have any violations of laws and regulations or agreements with you regarding the collection or use of information, you can contact us through the channels listed in the "How to Contact Us" section of this Policy. For security reasons, we may require you to provide a written request or prove your identity in other ways.
2. For your reasonable requests, we will not charge fees in principle, but for multiple repeated requests exceeding reasonable limits, we may charge certain costs depending on the situation. For those requests that are unreasonably repeated, require excessive technical means (for example, requiring development of new systems or fundamentally changing current practices), bring risks to the legitimate rights and interests of others, or are very impractical (for example, involving information stored on backup tapes), we may refuse them.
3. In the following circumstances, in accordance with legal requirements, we will be unable to respond to your requests:
(1) Related to national security and defense security;
(2) Related to public safety, public health, and major public interests;
(3) Related to criminal investigation, prosecution, trial and judgment enforcement;
(4) There is sufficient evidence that you have subjective malice or abuse of rights;
(5) Responding to your request will cause serious harm to the legitimate rights and interests of you or other individuals, organizations;
(6) Involving trade secrets.
1. This product does not provide services to children. Children should not create their own personal information subject accounts.
2. If we find that this product has collected children's personal information, we will try our best to delete relevant information as soon as possible.
1. When the following major changes occur, we will update this Policy in a timely manner:
(1) Our basic situation changes, such as: ownership changes caused by mergers, acquisitions, restructuring;
(2) The scope, purpose, and rules of collecting, storing, and using personal information change;
(3) The object, scope, and purpose of externally providing personal information change;
(4) The way you access and manage personal information changes;
(5) Data security capabilities and information security risks change;
(6) The channels and mechanisms for user inquiries and complaints, as well as external dispute resolution institutions and contact information change;
(7) Other changes that may have a major impact on your personal information rights and interests.
2. If this Policy is updated, we will notify you through methods such as push notifications, pop-up prompts, sending emails/SMS messages, or posting announcements on the official website. To ensure you can receive notifications in a timely manner, we recommend that you inform us promptly when your contact information is updated. If you continue to use this Service after this Policy update takes effect, it means you have fully read, understood, and accepted the updated Policy and are willing to be bound by the updated Policy
If you have any questions, comments, or suggestions about this privacy policy, you can contact us through the following contact methods:
[Sharetronic Technology Co., Ltd.]
Email: [infisight@sharetronic.com]
Phone: [+86 19265596216]
Business Cooperation Phone: [+86 19857149103]
Generally, we will reply within fifteen working days after receiving your relevant information and verifying your identity.
If you are not satisfied with our response, especially if our personal information processing behavior has infringed on your legitimate rights and interests, you can also seek solutions by filing a lawsuit with a court with jurisdiction in Yuhang District, Hangzhou.
1. Personal information: Personal information is various information recorded electronically or otherwise related to identified or identifiable natural persons, excluding information after anonymization processing.
2. Sensitive personal information: Sensitive personal information is personal information that, once leaked or illegally used, can easily lead to infringement of personal dignity or harm to personal and property safety, including biometric recognition, religious beliefs, specific identity, medical health, financial accounts, location trajectories, etc., as well as personal information of minors under fourteen years of age.
3. Basic business functions: Business functions that mobile Internet applications achieve users' main use purposes.
4. Extended business functions: Other business functions provided by mobile Internet applications beyond basic business functions.
5. Necessary personal information: Personal information necessary for the normal operation of basic business functions of mobile Internet applications. Without this information, mobile Internet applications cannot achieve basic business functions.
6. Children: Refers to minors under fourteen years of age.
7. De-identification: Refers to the process of technically processing personal information so that it cannot be identified to personal information subjects without additional information.
8. Anonymization: Refers to the process where personal information cannot identify specific natural persons and cannot be restored after processing.
9. Deletion: Refers to the act of removing personal information from systems involved in daily business functions, keeping it in an unretrievable and inaccessible state.
10. SDK: Also known as Software Development Kit, is a collection of development tools for establishing application software on specific software packages, software frameworks, hardware platforms, operating systems, etc.
| No. | Personal Information | Subject | Purpose of Use | Read Frequency |
|---|---|---|---|---|
| 1 | Device manufacturer | Infisight | Crash log collection, used to improve user interaction experience | 1 time/minute |
| 2 | Device model | Infisight | Crash log collection, used to improve user interaction experience | 1 time/minute |
| 3 | Clipboard | Infisight | User actively pastes in input box | 1 time/minute |
| 4 | IP address | Infisight | Network request | 1 time/minute |
| 5 | Device application installation list | Infisight | Crash log collection, used to improve user interaction experience | 1 time/minute |
| 6 | Task list | Infisight | Crash log collection, used to improve user interaction experience | 1 time/minute |
| 7 | Magnetic field sensor | Infisight | Horizontal/vertical screen switching video | 1 time/minute |
| 8 | Acceleration sensor | Infisight | Horizontal/vertical screen switching video | 1 time/minute |
| 9 | Photo album | Infisight | Network request | 1 time/minute |
| 8 | Wifi information | Infisight | Network request | 1 time/minute |
| No. | Personal Information | Subject | Purpose of Use | Read Frequency |
|---|---|---|---|---|
| 1 | Device application installation list | OPPO Push | Message push | 1 time/minute |
| 2 | IP address | Zxing QR code scanning | QR code scanning | 1 time/minute |
| 3 | ssid | chromium | Load web page | 3 times/minute |
| 4 | Wifi information | chromium | Load web page | 3 times/minute |
| 5 | Uncalibrated rotation vector sensor | chromium | Load web page | 1 time/minute |
| 6 | Device application installation list | chromium | Load web page | 1 time/minute |
| 7 | IP address | okhttp | Network request | 1 time/minute |
| 8 | IP address | Aurora Push SDK | Message push | 1 time/minute |
| 9 | Device application installation list | Aurora Push SDK | Message push | 1 time/minute |
| 8 | IP address | Tencent TBS browsing service | Load web page | 1 time/minute |
| 9 | Location information | AutoNavi Maps | Location and map store location display | 1 time/minute |
| 10 | IP address | AutoNavi Maps | Location and map store location display | 1 time/minute |
| 11 | Wifi information | AutoNavi Maps | Location and map store location display | 1 time/minute |
| 12 | ssid | AutoNavi Maps | Location and map store location display | 1 time/minute |
| 13 | bssid | AutoNavi Maps | Location and map store location display | 1 time/minute |
| 14 | Location information | AutoNavi Maps | Location and map store location display | 1 time/minute |
| 15 | Device application installation list | AutoNavi Maps | Location and map store location display | 1 time/minute |
| 16 | Rotation vector sensor | AutoNavi Maps | Location and map store location display | 1 time/minute |
| 17 | Pressure sensor | AutoNavi Maps | Location and map store location display | 1 time/minute |
| 18 | Acceleration sensor | AutoNavi Maps | Location and map store location display | 1 time/minute |
| 19 | android_id | AutoNavi Maps | Location and map store location display | 1 time/minute |
| No. | Personal Information | Subject | Purpose of Use | Read Frequency |
|---|---|---|---|---|
| 1 | Location information, Wifi information, ssid, bssid, sensors, MAC address, android_id, IMEI, sensors, sensors | AutoNavi Maps | Locate current position and display nearby stores | 1 time/minute |
| 2 | Location information, device model, ssid, bssid, Wifi information | Aurora Push SDK | Push evaluation rectification messages, review messages, system messages, alarm messages to users | 1 time/minute |
| 3 | Wifi information, ssid, | chromium | Web controls, used to display privacy policy web pages to users | 1 time/minute |
| No. | Personal Information | Subject | Purpose of Use | Read Frequency |
|---|---|---|---|---|
| 1 | Acceleration sensor | Infisight | Horizontal/vertical screen switching video | Collected once per use |
| 2 | IP address | Infisight | Network request | Collected once per use |
| 3 | Device application installation list | Infisight | Crash log collection, used to improve user interaction experience | Collected once per use |
| 4 | Magnetic field sensor | Infisight | Horizontal/vertical screen switching video | Collected once per use |
| 5 | Photo album | Infisight | Evaluation, avatar | Collected once per use |
| 6 | Device manufacturer | Infisight | Crash log collection, used to improve user interaction experience | Collected once per use |
| Task list | Infisight | Infisight | Crash log collection, used to improve user interaction experience | Collected once per use |
| No. | Personal Information | Subject | Purpose of Use | Read Frequency |
|---|---|---|---|---|
| 2 | Wifi information | chromium | Load web page | Collected once per use |
| 3 | IP address | Aurora Push SDK | Message push | Collected once per use |
| 4 | Location information | AutoNavi Maps | Location and map store location display | Collected once per use |
| 5 | Wifi information | AutoNavi Maps | Location and map store location display | Collected once per use |
| 6 | IP address | AutoNavi Maps | Location and map store location display | Collected once per use |
| 7 | bssid | AutoNavi Maps | Location and map store location display | Collected once per use |
| 8 | ssid | AutoNavi Maps | Location and map store location display | Collected once per use |
| 9 | Device application installation list | AutoNavi Maps | Location and map store location display | Collected once per use |
| 10 | IP address | okhttp | Network request | Collected once per use |
| 11 | Device application installation list | chromium | Load web page | Collected once per use |
| 12 | android_id | AutoNavi Maps | Location and map store location display | Collected once per use |
| 13 | Device application installation list | Aurora Push SDK | Message push | Collected once per use |
Android end:
| Name | Purpose of Use | Function Type | Personal Information Involved | Third-party Link | |
|---|---|---|---|---|---|
| Aurora Push SDK | Set up message push in mobile terminal | Message notification | Device identifier (including Android ID, GAID, OAID, UAID, IDFA), device hardware information (including device model, device screen resolution, device hardware manufacturer, device product name), operating system information (including operating system version, system name, system language), network information (including network type, operator name, IP address, WIFI status information), push information log: necessary personal information, used to generate desensitized terminal user device unique identifiers in basic business function scenarios of push services, ensuring service compatibility and accurate identification on different devices, while understanding the delivery situation of push information. Device identifier (including IMEI, MAC, IMSI): optional personal information, used as a supplement to generate terminal user device unique identifiers in basic business function scenarios of push services, improving the accuracy of unique device identifiers, thereby improving push precision and reach rate; network information (including SSID, BSSID, WIFI list information, base station information): optional personal information, used to determine fuzzy location information in basic business function scenarios of push services, select nearby push service nodes to provide push services, improving push reach rate. Location-related information: necessary personal information for geofencing push extended functions, used to provide refined push for offline scenarios, recommending push content more suitable for your needs based on location information; software list information (including software list and software operation list information): necessary personal information for user grouping, application self-start, link conditioner extended functions: helps you understand the interests and preferences of your terminal users, helping you provide more suitable push content to users, minimizing interference from useless push content to users; while optimizing SDK long connection stability, improving push delivery rate and application activity; merging links to achieve the purpose of saving electricity and traffic for users. | Privacy policy link | |
| Tencent Cloud | Set up message push in mobile terminal | Message notification | Device information (mobile phone model, system type, system version, etc.) used for tagged push and whether it is a real device, network information (network type) supports different types of push based on different network types, account binding information (WeChat Union ID, mobile phone number, email address, etc. depending on the push channel you choose) used for push based on account information | Official website link:https://cloud.tencent.com/
Privacy policy link |
|
| AutoNavi Maps SDK | Obtain user's map location to complete check-in; obtain device information to track, investigate, diagnose, and statistics various problems in services, ensuring normal operation of products and services | Send geographic location information | Location information, device information | Official website link:https://lbs.amap.com Privacy policy link:https://lbs.amap.com/pages/privacy |
|
| Tencent Bugly | Collect error information in mobile terminal | Collect error information | Device information (mobile phone model, system type, system version, etc.) | Official website link:https://bugly.qq.com/docs/user-guide/instruction Privacy policy link:https://privacy.qq.com/document/preview |
|
| Xiaomi Push SDK | Set up message push in mobile terminal | Push message | Device identifier (OAID, encrypted Android ID), push message content, device information (device manufacturer, model, location, operator name, etc.), notification bar settings | Official website link:https://dev.mi.com/console/appservice/push.html Privacy policy link:https://dev.mi.com/console/doc/detail?pId=1822 |
|
| Huawei HMS SDK | Set up message push in mobile terminal | Push message | Application information, device information (device hardware information, system basic information and system settings) | Official website link:https://developer.huawei.com/consumer/cn/ Privacy policy link:https://developer.huawei.com/consumer/cn/doc/development/HMSCore-Guides/sdk-data-security-0000001050042177 |
|
| Honor Push SDK | Set up message push in mobile terminal | Push message | Application anonymous identifier (AAID), application Token | Official website link:https://developer.hihonor.com/cn/ Privacy policy link:https://developer.hihonor.com/cn/kitdoc/?category=%E5%9F%BA%E7%A1%80%E6%9C%8D%E5%8A%A1&kitId=11002&navigation=guides&docId=sdk-data-security.md |
|
| OPPO Push SDK | Set up message push in mobile terminal | Push message | Application basic information (MCS application package name, application version number, OPUSH SDK version number), in-application device identifier (RegistraterID, appKey, appSecret) | Official website link:https://open.oppomobile.com/ Privacy policy link:https://open.oppomobile.com/new/developmentDoc/info?id=11228 |
|
| vivo Push SDK | Set up message push in mobile terminal | Push message | Application basic information, in-application device identifier, device hardware information, system basic information | Official website link:https://dev.vivo.com.cn/promote/pushNews Privacy policy link:https://dev.vivo.com.cn/documentCenter/doc/652#w1-12075822 |
|
| Aria | Download PDF reports in mobile terminal | Basic function - Downloader | Device information | https://gitee.com/AriaLyy/Aria | |
| Alibaba ARouter | Page navigation | Basic function - UI | None | Official website link:https://github.com/alibaba/ARouter | |
| AgentWeb | Web browsing | Push message | Device information | Official website link:https://github.com/Justson/AgentWeb | |
| Tencent Bugly | Collect error information in mobile terminal | Collect error stack information | Device information (mobile phone model, system type, system version, etc.) | Official website link:https://bugly.qq.com/docs/user-guide/instruction Privacy policy link:https://privacy.qq.com/document/preview | |
| Aurora Push SDK | Set up message push in mobile terminal | Message notification | Notification | Device identifier (including Android ID, GAID, OAID, UAID, IDFA), device hardware information (including device model, device screen resolution, device hardware manufacturer, device product name), operating system information (including operating system version, system name, system language), network information (including network type, operator name, WIFI status information), push information log: necessary personal information, used to generate desensitized terminal user device unique identifiers in basic business function scenarios of push services, ensuring service compatibility and accurate identification on different devices, while understanding the delivery situation of push information. Device identifier (including IMEI, MAC, IMSI): optional personal information, used as a supplement to generate terminal user device unique identifiers in basic business function scenarios of push services, improving the accuracy of unique device identifiers, thereby improving push precision and reach rate; network information (including SSID, BSSID, WIFI list information, base station information): optional personal information, used to determine fuzzy location information in basic business function scenarios of push services, select nearby push service nodes to provide push services, improving push reach rate. Location-related information: necessary personal information for geofencing push extended functions, used to provide "push reports" and refined push for offline scenarios, recommending push content more suitable for your needs based on location information; software list information (including software list and software operation list information): necessary personal information for user grouping, application self-start extended functions: helps you understand the interests and preferences of your terminal users, helping you provide more suitable push content to users, minimizing interference from useless push content to users; while optimizing SDK long connection stability, improving push delivery rate and application activity. | Privacy policy link |
| Aurora Statistics | Log statistics | Statistical analysis | Device information | Official website link:https://www.jiguang.cn/analytics | |
| okhttp | Network request | Basic function - Network service | Device information | Official website link:https://square.github.io/okhttp | |
| JSON-java | Data parsing | Basic function - Data parsing | None | Official website link:https://github.com/stleary/JSON-java | |
| Material-components-android | Basic function - UI | None | Official website link:https://github.com/material-components/material-components-android | ||
| Umeng Statistical Analysis SDK | Conduct APP operation statistics and analysis | Statistical analysis | Device information (IMEI/MAC/Android ID/IDFA/OAID/OpenUDID/GUID/SIM card IMSI/ICCID), location information, network information | Official website link:https://www.umeng.com/
Privacy link:https://www.umeng.com/page/policy |
iOS end:
| Name | Usage Scenario | Purpose of Use | System Permissions Involved | User Personal Information Scope or Permissions Involved | Privacy Link Address |
|---|---|---|---|---|---|
| Aurora Push SDK | Set up message push in mobile terminal | Message notification | Notification | Device identifier (including Android ID, GAID, OAID, UAID, IDFA), device hardware information (including device model, device screen resolution, device hardware manufacturer, device product name), operating system information (including operating system version, system name, system language), network information (including network type, operator name, WIFI status information), push information log: necessary personal information, used to generate desensitized terminal user device unique identifiers in basic business function scenarios of push services, ensuring service compatibility and accurate identification on different devices, while understanding the delivery situation of push information. Device identifier (including IMEI, MAC, IMSI): optional personal information, used as a supplement to generate terminal user device unique identifiers in basic business function scenarios of push services, improving the accuracy of unique device identifiers, thereby improving push precision and reach rate; network information (including SSID, BSSID, WIFI list information, base station information): optional personal information, used to determine fuzzy location information in basic business function scenarios of push services, select nearby push service nodes to provide push services, improving push reach rate. Location-related information: necessary personal information for geofencing push extended functions, used to provide "push reports" and refined push for offline scenarios, recommending push content more suitable for your needs based on location information; software list information (including software list and software operation list information): necessary personal information for user grouping, application self-start extended functions: helps you understand the interests and preferences of your terminal users, helping you provide more suitable push content to users, minimizing interference from useless push content to users; while optimizing SDK long connection stability, improving push delivery rate and application activity. | Privacy policy link |
| Tencent Cloud | Set up message push in mobile terminal | Message notification | Notification | Device information (mobile phone model, system type, system version, etc.) used for tagged push and whether it is a real device, network information (network type) supports different types of push based on different network types, account binding information (WeChat Union ID, mobile phone number, email address, etc. depending on the push channel you choose) used for push based on account information | Official website link:
https://cloud.tencent.com/
Privacy policy link |
| AutoNavi Maps SDK, AutoNavi Location SDK | Store location | Location and map display | Location permission | GNSS information, IP address, WLAN hotspots, base station information, Bluetooth devices and other sensors that can be used for positioning; "device information" obtained by various products/services below, including terminal device unique identifiers (containing IDFV, OAID, IMEI, MEID, IMSI, etc.), mac address, SSID, BSSID, operating system version, device brand and model, device configuration, operator type, application information (application name, application version number), sensors, sensors, ssid, Wifi information, ssid | https://lbs.amap.com/pages/privac |
| Tencent Bugly | Collect error information in mobile terminal | Collect error stack information | Device information (mobile phone model, system type, system version, etc.) | Official website link:https://bugly.qq.com/docs/user-guide/instruction Privacy policy link:https://privacy.qq.com/document/preview | |
| Umeng Statistical Analysis SDK | Conduct APP operation statistics and analysis | Statistical analysis | Device information (IMEI/MAC/Android ID/IDFA/OAID/OpenUDID/GUID/SIM card IMSI/ICCID), location information, network information | Official website link:https://www.umeng.com/
Privacy link:https://www.umeng.com/page/policy |
| Personal Information Category | Personal Information Subject | Personal Information | Collection Purpose | Collector |
|---|---|---|---|---|
| Personal basic information | Enterprise/organization user | Mobile phone number | Register Infisight account, member management function use | Infisight |
| Personal basic information | Enterprise/organization user | Verification code | Register Infisight account function use | Infisight |
| Personal basic information | Enterprise/organization user | Account name | Register Infisight account function use | Infisight |
| Personal basic information | Enterprise/organization user | Password | Register Infisight account function use | Infisight |
| Personal basic information | Enterprise/organization user | Name | Register Infisight account function use | Infisight |
| Personal basic information | Enterprise/organization user | Avatar | Personalized settings | Infisight |
| Personal basic information | Enterprise/organization user | Email address | Personalized settings, personnel management function use | Infisight |
| Personal basic information | Enterprise/organization user | Gender | Personalized settings | Infisight |
| Personal basic information | Enterprise/organization user | Face photo | On-site inspection, on-site rectification | Infisight |
| Personal basic information | Enterprise/organization user | Clipboard content | Search function | Infisight |
| Personal basic information | Enterprise/organization user | Sensors | Rotate video according to phone direction | Infisight |
| Personal common device information | Enterprise/organization user | Location information, network positioning, access GPS positioning, wifi network information, obtain operator information, network status changes, write offline positioning data, access network, destination, sensors | Locate and display nearby store maps | AutoNavi Maps |
| Personal common device information | Enterprise/organization user | Device model, operating system version, device settings, unique device identifier (such as IMEI/android ID/IDFA/OPENUDID/GUID, SIM card IMSI information) and other software and hardware characteristic information, IP address, GPS location and sensor information such as Wi-Fi access points, Bluetooth and base stations that can provide relevant information, search query content, IP address, browser type, telecommunications operator, language used, access date and time and your web page access records | Safe and effective storage of files | Tencent Cloud COS |
| Personal common device information | Enterprise/organization user | Infisight device product serial number and product verification code, video screenshots generated by alarm event capture are immediately deleted the next day, when using remote intercom and other functions, collect submitted audio content (including recordings), collect face/human shape recognition, need to pre-enter baseline information such as face pictures; | View device video | Weiduo Open Platform SDK |
| Personal common device information | Enterprise/organization user | Collect unique device identification code (such as IMEI/android ID/IDFA/OPENUDID/GUID, SIM card IMSI information) device Mac address, device platform, device manufacturer, device brand, application list information; network information and location-related information: device network status and changes, location-related information, device application installation list | Users receive push information | Aurora Push SDK |
| Personal common device information | Enterprise/organization user | Collect unique device identification code (such as IMEI/android ID/IDFA/OPENUDID/GUID, SIM card IMSI information) device Mac address, device platform, device manufacturer, device brand, application list information; network information and location-related information: device network status and changes, location-related information, device application installation list | OPPO mobile phone message push | OPPO message push SDK |
| Personal common device information | Enterprise/organization user | Collect unique device identification code (such as IMEI/android ID/IDFA/OPENUDID/GUID, SIM card IMSI information) device Mac address, device platform, device manufacturer, device brand, application list information; network information and location-related information: device network status and changes, location-related information, device application installation list | Vivo mobile phone message push | Vivo message push SDK |
| Personal common device information | Enterprise/organization user | Collect unique device identification code (such as IMEI/android ID/IDFA/OPENUDID/GUID, SIM card IMSI information) device Mac address, device platform, device manufacturer, device brand, application list information; network information and location-related information: device network status and changes, location-related information | Huawei mobile phone message push | Huawei message push SDK |
| Personal common device information | Enterprise/organization user | Collect unique device identification code (such as IMEI/android ID/IDFA/OPENUDID/GUID, SIM card IMSI information) device Mac address, device platform, device manufacturer, device brand, application list information; network information and location-related information: device network status and changes, location-related information | Huawei mobile phone message push | Huawei message push SDK |
| Personal common device information | Enterprise/organization user | Collect unique device identification code (such as IMEI/android ID/IDFA/OPENUDID/GUID, SIM card IMSI information) device Mac address, device platform, device manufacturer, device brand, application list information; network information and location-related information: device network status and changes, location-related information | Xiaomi mobile phone message push | Xiaomi message push SDK |
| Personal common device information | Enterprise/organization user | Device model, operating system, unique device identifier (referring to a string of characters programmed into the device by the device manufacturer that can be used to uniquely identify the corresponding device), login IP address, WeChat software version number, network access method, type and status, network quality data, device accelerator (such as gravity sensing device), operation logs, service log information (such as your search and viewing operation records in WeChat, service failure information, referral URL information, etc.) and other log information. User video preview screenshot images within the APP | User WeChat sharing of video screenshot images | WeChat sharing |
| Personal common device information | Enterprise/organization user | Telephone permission: read user's IMEI and IMSI information, used to control X5 kernel version grayscale distribution and data statistics; if this permission is not provided, kernel version cannot be grayscale distributed to your App; Task list: task list; Memory card permission: used to find available X5 kernel versions on user memory cards to improve user X5 proportion; if this permission is not provided, it may affect your use of X5 kernel proportion. | Load web page | Tencent browsing service SDK |
| Personal Information Category | Personal Information Subject | Personal Information | Collection Purpose | Collector |
|---|---|---|---|---|
| Personal basic information | Enterprise/organization user | Mobile phone number | Register Infisight account, member management function use | Infisight |
| Personal basic information | Enterprise/organization user | Verification code | Register Infisight account function use | Infisight |
| Personal basic information | Enterprise/organization user | Account name | Register Infisight account function use | Infisight |
| Personal basic information | Enterprise/organization user | Password | Register Infisight account function use | Infisight |
| Personal basic information | Enterprise/organization user | Name | Register Infisight account function use | Infisight |
| Personal basic information | Enterprise/organization user | Avatar | Personalized settings | Infisight |
| Personal basic information | Enterprise/organization user | Email address | Personalized settings, personnel management function use | Infisight |
| Personal basic information | Enterprise/organization user | Gender | Personalized settings | Infisight |
| Personal basic information | Enterprise/organization user | Face photo | On-site inspection, on-site rectification | Infisight |
| Personal location information | Enterprise/organization user | Precise location information | Attendance check-in function | Infisight |
| Personal common device information | Enterprise/organization user | Network positioning, access GPS positioning, wifi network information, obtain operator information, network status changes, write offline positioning data, access network | Locate and display nearby store maps | AutoNavi Maps |
| Personal common device information | Enterprise/organization user | Device model, operating system version, device settings, MAC address and IMEI, IDFA, OAID and other device identifiers and other software and hardware characteristic information, location-related information of the device (such as IP address, GPS location and sensor information such as Wi-Fi access points, Bluetooth and base stations that can provide relevant information); log information (such as your search query content, IP address, browser type, telecommunications operator, language used, access date and time and your web page access records, etc.); support information for user accounts | Safe and effective storage of files | Tencent Cloud COS |
| Personal location information | Enterprise/organization user | Voice content, text information, image information, search query content, accessed page addresses, browser type, network status, operator, language used, access date and time, system activities and your web page access records | Quick input keywords through voice | iFlytek SDK |
| Personal location information | Enterprise/organization user | Unique individual identifier, online identifier, Internet Protocol (IP) address, email address, account name or other similar identifiers; commercial information, including records of products or services purchased, obtained or considered | Data persistence | Realm database |
| Personal common device information | Enterprise/organization user | Infisight device product serial number and product verification code, video screenshots generated by alarm event capture are immediately deleted the next day, when using remote intercom and other functions, collect submitted audio content, collect face/human shape recognition, need to pre-enter baseline information such as face pictures | View device video | Weiduo SDK |
| Personal common device information | Enterprise/organization user | Collect unique device identification code (such as IMEI/android ID/IDFA/OPENUDID/GUID/ UDID, SIM card IMSI information) device Mac address, user location information and IP address, SDK/API/JS code version, browser, Internet service provider, platform, timestamp, application identifier, application version, application distribution channel, independent device identifier, device model, sensor parameters, terminal manufacturer, terminal device operating system version, session start/stop time, language location, time zone and network status (WiFi, etc.), hard disk, CPU and battery usage | ||
| Personal common device information | Enterprise/organization user | Collect unique device identification code, device Mac address, device platform, device manufacturer, device brand, application list information; network information and location-related information: device network status and changes, location-related information |