Infisight Privacy Policy

Updated: December 20, 2024

Effective: April 26, 2024

[IMPORTANT NOTICE]

Sharetronic Technology Co., Ltd. (hereinafter referred to as "Sharetronic" or "we") attaches great importance to user privacy protection. We are well aware of the importance of personal information to users (hereinafter referred to as "you"), and we will take corresponding security protection measures in accordance with legal and regulatory requirements, and do our best to protect your personal information security and controllability. For this reason, we have specially formulated the "Infisight Privacy Policy" (hereinafter referred to as "this Policy") so that you can understand in detail how we will collect, use, transmit, save, and disclose your personal information and what rights you enjoy. This Policy applies to the Infisight service (hereinafter referred to as "this Service" or "Infisight") provided by Sharetronic, including but not limited to Infisight web terminal ( cloud.infisight.net) , Infisight software (mobile applications), personal center, code and related technical services, and Infisight functions/services integrated into third-party products or software (such as Infisight services under mini-programs and official accounts). If there is any inconsistency between this Policy and similar terms in the Infisight "Infisight Service Agreement", this Policy shall prevail. In addition, this Policy does not apply to services provided by other companies or individuals (hereinafter referred to as "Third-Party Services").

Please be aware that your consent to this Policy only represents that you have understood the functions provided by the application and agreed to our collection of necessary personal information required for the functions to operate, but it does not mean that you have agreed that we can collect non-essential personal information. Non-essential personal information will be separately requested for your consent based on the authorization situation during your use process.

Corresponding permissions will not be enabled by default. When involving important or sensitive device permissions, we will separately pop up a window to obtain your consent again when you use the corresponding business functions; after the permissions are enabled, you can also close the permissions at any time through device settings; if you disagree to enable permissions, it will not affect the normal use of other unrelated business functions. For personal sensitive information, we will separately obtain your consent before processing it.

If you refuse this Policy, you will enter browsing mode, but will not be able to use the basic functions we provide. You can authorize separately during the subsequent use of the service.

After reading this Policy, if you have any questions about this Policy or matters related to this Policy, you can contact us through the feedback channels listed in the "How to Contact Us" section of this Policy, and we will answer you as soon as possible.

This Policy will help you understand the following content:

1. How we collect your personal information

2. How we use your personal information

3. How we use Cookies and similar technologies

4. How we protect and save your personal information

5. How we entrust processing, share, transfer, and publicly disclose your personal information

6. How you access and manage your personal information

7. How we handle children's personal information

8. How this Policy is updated

9. How to contact us

1. How we collect your personal information

According to the "Provisions on the Scope of Necessary Personal Information for Common Types of Mobile Internet Applications", this App does not belong to common types of Apps. The basic business functions of this App are video viewing, store inspection, organizational structure management, device management, and image management. The necessary personal information that needs to be provided is: mobile phone number, account name, password, name.

(1) We will collect the following types of your personal information through the following channels:

When using this Service, you need to actively submit to us or authorize us to collect and use the following two types of personal information:

1. Personal information necessary for the basic business functions of mobile Internet applications to operate. Without this information, mobile Internet applications cannot achieve basic business functions.

2. To provide you with extended business functions of this Service and basic business functions that require non-essential personal information. If you refuse to provide, you will not be able to normally use relevant extended business functions or achieve the functional effects we intend to achieve, but it will not affect your normal use of the basic business functions of this Service.

Please note:

1. Since we provide many products and services with diverse functions, and different users choose to use specific services differently; accordingly, basic/extended business functions and the types and scope of collected and used personal information will differ. Please refer to specific service functions for details;

2. If the information you submit to us or collected through our services contains personal information of others, you must ensure that you have legally obtained authorization from relevant subjects. In particular, if the aforementioned personal information involves children's personal information, you need to obtain the consent of the corresponding child's guardian in advance.

(2) Circumstances where you need to provide personal information:

We will collect your corresponding types of personal information for the purposes stated in this Policy. If we use your personal information for other purposes not stated in this Policy or collect other personal information not mentioned additionally, we will separately obtain your consent through page prompts, interactive processes, website announcements, or other methods. Once you agree, such additional uses will be deemed part of this Policy, and such additional information will also be subject to this Policy. You can refer to Appendix 4 "List of Collected Personal Information" to understand in detail the specific situation of our collection and use of your personal information.

1. Registration, Login

A. Scope of Personal Information Use

(1) Registration: When you use the registration function, you need to provide us with your mobile phone number, email address, password, name for registration. When you use a mobile phone number for registration, for the necessity of identity verification, mobile phone number, account name, password, name are necessary information for the registration function. If you do not provide them, you will not be able to register normally.

(2) Login: We provide three login methods: email + password, mobile phone number + verification code, mobile phone number + password. You can choose any one of them. When you use email/mobile phone number and password to log in, you need to provide us with your email/mobile phone and password to log in to your account. If you do not provide them, you will not be able to log in normally through the email/mobile phone number + password method. When you use mobile phone number and verification code to log in, you need to provide us with your mobile phone number to send you dynamic verification codes. If you do not provide it, you will not be able to log in normally. In addition, if you associate and log in to Infisight services in other ways, we will obtain your third-party account information from third parties based on your authorization. For personal information that we need but third parties cannot provide, we will still require you to provide it. For services that need to be used through Infisight accounts, we will verify your user identity based on the information you provided above, ensuring that we are providing services to you personally.

B. Sensitive Permissions Called

None.

C. Use of Third-party SDK

None.

2. Video viewing, store inspection, device management, image management

A. Scope of Personal Information Use

(1) Please understand and agree that when you use this function, your enterprise/organization is the controller of your personal information, and we only process enterprise/organization-controlled data or your personal information according to the instructions of the enterprise/organization administrator.

(2) When you use video viewing and device management functions, your enterprise/organization will assign you positions, departments, employee IDs, and operation logs, login records, video viewing records that you need to collect for completing daily operational management of the enterprise organization. The specific types of personal information collected and the purpose are determined by your enterprise/organization. Therefore, the personal information ultimately collected by the product is subject to the filling interface of your product.

B. Sensitive Permissions Called

When you use the video intercom function, the App needs to call your microphone permission. If you refuse relevant system permissions, you will not be able to conduct video intercom.

C. Use of Third-party SDK

When you use device addition and video intercom functions, we will implement it through Weiduo SDK. This SDK will collect your device's product serial number and product verification code, submitted audio content. This type of information is necessary to achieve the function of this SDK.

When you use the WeChat sharing function for images, we will implement it through the WeChat Open Platform. This SDK will collect your device model, operating system, unique device identifier (referring to a string of characters programmed into the device by the device manufacturer that can be used to uniquely identify the corresponding device), login IP address, WeChat software version number, network access method, type and status, network quality data, device accelerator (such as gravity sensing device), operation logs, service log information (such as your search and viewing operation records in WeChat, service failure information, referral URL information, etc.) and other log information. This type of information is necessary to achieve the function of this SDK.

3. Other functions

(1) Customer service or other user response functions

A. Scope of Personal Information Use

We provide you with customer services such as product and service consultation, usage support, pre-sales and after-sales services through multiple channels such as telephone, email, and online systems. To better meet your needs, you need to provide your name, phone number, address, project name, company/organization name. To facilitate contact with you, help you solve problems as soon as possible or record solutions and results for related issues, we also need you to provide necessary personal information to match and verify your user identity. We will also collect and save your communication/call records and related content with us in accordance with this Policy as appropriate (account information, your contact information, feedback problems or suggestions).

(2) Security assurance and operation and maintenance services

A. Scope of Personal Information Use

To ensure your normal use of this Service, maintain the normal operation of our services, improve and optimize our service experience, and ensure your account security, we will collect relevant information generated during your use of this Service:

1) When you use this Service, we will receive and record the device you use to install and use Infisight software and its location information, such as your mobile phone or computer hardware model, operating system version number, International Mobile Equipment Identity (IMEI), International Mobile Subscriber Identity (IMSI), software installation list, according to the specific permissions you grant during software installation and use. Please understand that this information is basic information that we must collect to provide services and ensure normal product operation;

(2) When you use Infisight services to manage the smart electronic hardware devices you have bound, we will automatically receive and record relevant device information, such as type, version number, serial number, verification code, channel information. We rely on this information to provide you with services and ensure safe operation of the devices.

(3) To help us better understand the operation of the software corresponding to this Service, to ensure the security of operation and service provision, we will record network log information, as well as the frequency of using software and related services, crash data, error or abnormal service data, system operation status information of abnormal devices.

4. Message notifications

For your contact information (such as your contact email, phone number) provided during your use of this Service, we may send various types of notifications to one or more of them during operations, for purposes such as user message notification, identity verification, security verification, and user experience research. If you are unwilling to receive this information, you can unsubscribe through the unsubscribe methods provided in this information.

5. Permission enabling

You understand and agree that when you use this Service, you may need to enable specific access permissions on your device to achieve the collection and use of personal information involved in these permissions.

When you need to close permissions, you can operate in the settings interface of the mobile device you use or within the App. The specific operation path is Android end: [System Settings - Application Management - Application List - Infisight - Notification Management]; iOS end: [System Settings - Notifications - Application List - Infisight]. Please note that enabling any permission represents your authorization for us to collect and use relevant personal information to provide you with corresponding services. Once you close any permission, it represents cancellation of authorization, and we will no longer continue to collect and use relevant personal information based on the corresponding permission, nor can we provide you with the service corresponding to that permission. However, the decision to close permissions will not affect the collection and use of information previously based on your authorization.

Details of specific permission names, applicable ports, acquisition scenarios and purposes are as follows:

Android Application Permission List:

No. Permission Group Permission Name Function Description Accessible Personal Information Business Function
1 CAMERA Camera Permission CAMERA Allow App to use camera Camera information QR code scanning, avatar setting, online evaluation, on-site evaluation, store self-inspection, on-site rectification, QR code login, binding device
2 LOCATION Precise Location Permission ACCESS_FINE_LOCATION Allow app to use location Precise location information On-site evaluation, store self-inspection, on-site rectification, nearby stores, editing store location, configuring device network
3 AUDIO Microphone Permission RECORD_AUDIO Allow app to use microphone Voice information Device intercom
4 STORAGE Storage Permission WRITE_EXTERNAL_STORAGE Allow App to read/write media files Media file information Personnel management, checklist management, save to album, online evaluation, on-site evaluation, store self-inspection, on-site rectification, avatar setting, binding device
5 SYSTEM_ALERT_WINDOW Floating Window Permission SYSTEM_ALERT_WINDOW Allow floating windows inside and outside the application None Message pop-ups inside and outside the application

iOS Application Permission List:

No. Permission Group Permission Name Function Description Accessible Personal Information Business Function
1 Camera Camera Access device camera Photos and videos taken QR code scanning, avatar setting, online evaluation, on-site evaluation, store self-inspection, on-site rectification, QR code login, binding device
2 Microphone Microphone Access device microphone Voice data On-site evaluation, store self-inspection, on-site rectification, nearby stores, editing store location, configuring device network
3 Photos Photo Library Additions Write-only photo library Write-only access to user photo library Images and videos in photo library Device intercom
4 LOCATION Location Permission LOCATION Location Permission LOCATION Location Permission User location Personnel management, checklist management, save to album, online evaluation, on-site evaluation, store self-inspection, on-site rectification, avatar setting, binding device
5 APNs Notification Permission APNs Notification Permission APNs Notification Permission Message notification Message pop-ups inside and outside the application
6 Network Network Permission Network Network Permission Network Network Permission Network access App network data access

In addition, to push messages to you, we will also apply to call floating window permissions; to facilitate your copy-paste function, we will apply to call clipboard permissions. If you disagree to enable permissions or close permissions, it will not affect the normal use of other unrelated business functions.

7. If we stop operating products or services, we will promptly stop continuing to collect user personal information activities. The notice of cessation of operations will be notified to users in the form of an announcement 30 days in advance, and the personal information of users held will be deleted or anonymized in accordance with applicable laws.

8. Exceptions to obtaining authorized consent

According to relevant laws and regulations, the following circumstances do not require your authorization consent to collect your information: (1) Directly related to national security and defense security; (2) Directly related to public safety, public health, and major public interests; (3) Directly related to criminal investigation, prosecution, trial and judgment enforcement; (4) To protect the life, property and other major legitimate rights and interests of you or other individuals, but it is difficult to obtain the person's consent; (5) The personal information collected is voluntarily made public by you to the public; (6) Necessary for signing and performing contracts with you as required; (7) Collecting personal information from legally public disclosure channels, such as legitimate news reports, government information disclosure, etc.; (8) Necessary for legitimate news reporting; (9) Other circumstances stipulated by laws and regulations.

9. Tips regarding sensitive personal information

Sensitive personal information refers to personal information that, once leaked or illegally used, can easily lead to infringement of personal dignity or harm to personal and property safety. The sensitive personal information involved in this Policy includes: network identity identification information (including username, nickname, email address and passwords related to the above); other information (including personal telephone number, mobile phone number).

10. Functions for implementing enterprise organization-controlled data

(1) You and your enterprise/organization (if any) shall be responsible for all data and materials generated by uploading, entering, publishing, transmitting, storing and other use of the account. Such data and materials are enterprise-controlled data. Please note that the enterprise/organization is the data controller of the above personal information.

(2) If you provide sensitive personal information such as face images, real names, mobile phone numbers, etc. on behalf of your enterprise/organization, both you and the representative enterprise/organization you represent shall ensure that the separate consent of the personal information subject has been obtained in advance, and have fully informed the personal information subject in a prominent manner of the purpose for which the above data will be used, while informing the individual of the necessity of processing the above sensitive personal information and its impact on their personal rights and interests. At the same time, it is also necessary to inform the individual of the name and contact information of the enterprise/organization, the retention period of the above data, and the methods and procedures for the personal information subject to exercise rights such as deletion, viewing, and modification. If your enterprise/organization has other uses for the above sensitive personal information, please obtain the separate consent of the personal information subject and make relevant disclosures in accordance with legal and regulatory requirements. When you provide other personal information other than sensitive personal information on behalf of the enterprise/organization, it represents that your enterprise/organization has obtained the explicit consent of the personal information subject in advance, and has fully informed the personal information subject of the purpose, scope and use method of relevant data collection.

(3) You agree that if we find that you have collected personal information of a third party without their explicit consent, or we receive relevant complaints and reports, we have the right to make independent judgments, extract relevant system records as evidence, and take measures such as immediately deleting relevant information, suspending or terminating part or all of services to you. The evidence we extract may be used as direct evidence of your violations and may be submitted to competent authorities or relevant third parties. If you violate your commitment and illegally collect personal information of third parties, the resulting responsibility shall be borne by you yourself. If this causes losses to us, we have the right to claim compensation from you.

11. Description of third-party links

The products we provide may include links to information/services provided by third parties. Before using these third-party products/services, you need to jump to the corresponding third-party page. Your use of this third-party service (including any personal information you provide to the third party) shall be bound by the third party's service terms and privacy policy (rather than this Policy). You need to carefully read their terms and decide for yourself whether to accept them. Please properly protect your personal information and only provide it to others when necessary. This Policy does not apply to any services provided by third parties or third-party information use rules, third parties are responsible for their own behavior when using your information.

2. How we use your personal information

(1) We will use your personal information according to the following rules

1. We will use it in accordance with the provisions of this Policy and to achieve corresponding product and/or service functions.

2. We may integrate your personal information and/or other information related to your service or product use behavior that we legally obtain (hereinafter referred to as "other information") to prevent, discover, and investigate fraud, infringement, security hazards, illegal activities or violations of agreements with us or our affiliated companies.

3. We may process your personal information or use it in combination with other information for the purpose of maintaining, improving, and optimizing our products and/or services and enhancing user experience.

4. When you access third-party services through this Service, we will share your authorized scope of personal information with third-party service providers based on your authorization.

5. Other uses permitted by you.

(2) Please note that all personal information you provide or authorize us to collect when using this Service will continue to authorize us to use during your use of our products and/or services, unless you delete it or refuse our collection through account settings or system settings. When you cancel your account, we will stop using and delete or anonymize your personal information, except as otherwise provided by laws and regulations.

(3) When we display you and your personal information, we will use methods including content replacement and anonymization to desensitize your information to protect your information security.

(4) Please understand that the functions and services we provide to you are constantly updated and developing. If new functions or services require collecting and using your personal information, we will separately inform you of the type, scope, purpose and use rules of information collection through page prompts, interactive processes, website announcements, etc., and obtain your explicit consent.

(5) We hereby specially remind you that if information cannot identify your personal identity alone or in combination with other information, it does not constitute your personal information in the legal sense; when your information can identify your personal identity alone or in combination with other information, or when data that cannot be associated with any specific personal information is used in combination with your other personal information, these information will be treated as your personal information and processed and protected in accordance with this Policy during the combined use period.

3. How we use Cookies and similar technologies

(1) Cookies

1. Cookies are a mechanism that supports server-side (or scripts) in storing and retrieving information on websites or clients. When you use this Service, we will send one or more small data files named Cookies to your computer or mobile device. The Cookie designated to you is unique and can only be read by the web server in the domain that issued the Cookie to you. Cookies usually contain identifiers, site names, and some numbers and characters. We will use Cookie technology to simplify your repeated login steps and help determine your login status as well as account or data security.

2. We promise that research on Cookie information is only for the purpose of improving service/product quality and optimizing user experience. We will not use Cookies for any purpose other than those described in this Policy. You can manage or delete Cookies according to your preferences. For details, please see AboutCookies.org. You can clear all Cookies saved on your computer. Most web browsers automatically accept cookies, but you can usually modify your browser settings as needed to refuse Cookies. You can also clear all Cookies saved in the software. However, if you do so, you may need to change user settings manually every time you visit this Service, and your previously recorded corresponding information may also be deleted, and it may have a certain impact on the security of the services you use.

(2) Web beacons and pixel tags

In addition to Cookies, we may also use other similar technologies such as web beacons and pixel tags on our website. For example, emails we send to you may contain click URLs that link to our website content. If you click this link, we will track this click to help us understand your product or service preferences and improve customer service. Web beacons are usually transparent images embedded in websites or emails. With the help of pixel tags in emails, we can know whether emails have been opened. If you do not want your activities to be tracked in this way, you can unsubscribe from our mailing list at any time.

4. How we protect and save your personal information

(1) Storage and protection of your personal information

1. We will store user information collected within China in accordance with legal and regulatory provisions. If we involve transmitting your personal information overseas, we will clearly inform you and obtain consent.

2. We will only retain your personal information for the period necessary to achieve the purposes stated in this Policy, unless otherwise provided by laws and regulations. After exceeding the retention period, when you cancel your account or actively delete personal information, we will delete or anonymize your personal information in accordance with applicable legal requirements, except as otherwise provided by laws and regulations.

3. To prevent your personal information from being illegally accessed, copied, modified, transmitted, lost, destroyed, processed, or used in unexpected or unauthorized situations, we have and will continue to take the following measures including but not limited to the following to protect your personal information:

(1) Our network services have adopted encryption technologies such as transmission security protocols to provide transmission services through https and other methods to ensure the security of user data during transmission.

(2) We will use encryption technology to encrypt and save user information when we deem necessary, and isolate it through isolation technology.

(3) When using personal information, such as personal information display, personal information association calculation, we will use multiple data desensitization technologies including content replacement and encryption desensitization to enhance the security of personal information in use.

(4) Establish strict data use and access systems, adopt strict data access permission control and multi-factor authentication technology to protect user information and avoid data misuse. We only allow authorized personnel to access user information, ensure that employees within the company who have access to your personal information can only access the minimum necessary personal information required to perform their duties, and only have the minimum data operation permissions required to complete their duties, and require them to perform corresponding confidentiality obligations.

(5) When there are situations where we share your personal information with third parties, our network services have adopted encryption technologies such as transmission security protocols. We provide transmission services through https and other methods to ensure the security of user data during transmission.

4. Please be sure to properly keep your account and password. When you use our services, we will identify your identity through elements such as your account and password. Once you leak the aforementioned information, you may suffer losses and it may have adverse effects on you. If you find that your account, password and/or other identity elements may or have been leaked, please contact us immediately so that we can take timely measures to avoid or reduce related losses.

(2) Risks faced

1. Despite taking the aforementioned reasonable and effective measures and having complied with the standards required by relevant legal provisions, we still cannot guarantee the security of your personal information when communicated through insecure channels. Therefore, you should also actively take measures to ensure the security of your personal information, such as setting complex passwords, regularly changing account passwords, and not disclosing your account passwords and other personal information to others.

2. Various information leakage risks always exist in the network environment. When unexpected events, force majeure and other situations cause your information to be leaked, we will do our best to control the situation and promptly inform you of the cause of the incident, security measures we have taken, security measures you can actively take, and other relevant situations.

3. After an unfortunate information security incident occurs, we will promptly inform you in accordance with legal requirements: the basic situation and possible impact of the security incident, disposal measures we have taken or will take, suggestions for you to independently prevent and reduce risks, remedial measures for you, etc. We will also inform you of relevant incident situations through methods such as email, letters, telephone, push notifications, etc. When it is difficult to inform personal information subjects one by one, we will adopt reasonable and effective methods to issue announcements. At the same time, we will report to competent authorities in accordance with legal requirements.

5. How we entrust processing, share, transfer, and publicly disclose your personal information

(1) Entrustment and sharing

1. To improve information processing efficiency, reduce information processing costs, or improve information processing accuracy, we may entrust capable affiliated companies or other professional institutions to represent us in processing information. We will require entrusted companies to comply with strict confidentiality obligations and take effective confidentiality measures through written agreements, on-site audits, etc., prohibiting them from using this information for purposes not authorized by you. When the entrustment relationship is terminated, we will require them to immediately delete your personal information.

2. To enable you to use our services, our software will embed SDKs or similar applications from authorized partners. We will conduct strict security monitoring on application programming interfaces (APIs), software development kits (SDKs) that authorized partners use to obtain relevant information, and agree on strict data protection measures with authorized partners, requiring them to process personal information according to our entrustment purposes, service descriptions and this privacy policy.

3. We will not share your personal information with third parties, except in the following circumstances:
(1) We have obtained your clear authorization or consent and share your personal information with third parties according to the scope of your authorization;
(2) We may share your personal information externally in accordance with legal and regulatory provisions, litigation, dispute resolution needs, or requirements proposed by administrative or judicial authorities in accordance with the law;
(3) Infringement complaint handling: when you are complained by others for infringing intellectual property rights or other legitimate rights, it is necessary to disclose your necessary materials to the complainant to handle complaints;
(4) Sharing with authorized partners: we may entrust authorized partners to provide certain services for you or represent us in performing functions, including providing infrastructure technical services, SMS services, data processing services for our services. For example, sharing materials required for real-name authentication with real-name authentication service providers; sharing materials required for electronic signatures with electronic signature providers. We will only share your personal information for the legal, legitimate, necessary, specific, and clear purposes stated in this Policy. Authorized partners can only access information necessary for performing their duties and must not use this information for any other purpose. For companies, organizations, and individuals that we entrust to process personal information, we will sign strict confidentiality agreements with them, requiring them to process personal information in accordance with our requirements, this privacy policy, and any other relevant confidentiality and security measures.

4. In addition, our products/services also incorporate services provided by third parties. When you use these services provided by third parties, third parties may collect and use your personal information for the purpose of providing services, so we remind you to carefully read the relevant terms and policies provided by third parties before using these services.

5. It should be specially noted that third-party service providers can provide products or services to you through terminals. You can choose whether to use third-party services and when to terminate or cancel the use of third-party services. During use, third-party service providers may collect, use, and store your relevant data or information. Before deciding whether to use such services, please fully understand their personal information and privacy protection strategies from third-party service providers, or contact your enterprise/organization users for more information. Specific situations can be found in Appendix 3 "Third-party Shared Personal Information List".

(2) Transfer

We will not transfer your personal information to any company, organization, or individual, except in the following circumstances:

1. When we obtain your clear consent;
2. In cases involving mergers, acquisitions, or bankruptcy liquidation, if personal information transfer is involved, we will require the new company or organization holding your personal information to continue to be bound by this privacy policy, otherwise we will require that company or organization to重新 obtain your authorization consent.

(3) Public disclosure

1. We will only publicly disclose your personal information in the following circumstances:
(1) With your clear consent or based on your active choice, we may publicly disclose your personal information;
(2) Legal disclosure: under circumstances required by law, legal proceedings, litigation or mandatory requirements of government regulatory authorities, we may publicly disclose your personal information;
(3) For purposes reasonably necessary to execute relevant service agreements or this privacy policy, maintain public social interests, handle complaints/disputes, protect the personal and property safety or legitimate rights and interests of our customers, us or our affiliated companies, other users or employees.
2. If we disclose your personal information for the aforementioned reasons, we will promptly inform you on the basis of complying with relevant laws and regulations and this Policy.

(4) Exceptions to obtaining authorized consent in advance when sharing, transferring, and publicly disclosing personal information

According to relevant laws and regulations and national standards, in the following circumstances, we may share, transfer, and publicly disclose personal information without the need to obtain authorization consent from personal information subjects in advance: 1. Related to our performance of obligations stipulated by laws and regulations;
2. Directly related to national security and defense security;
3. Directly related to public safety, public health, and major public interests;
4. Directly related to criminal investigation, prosecution, trial and judgment enforcement;
5. To protect the life, property and other major legitimate rights and interests of personal information subjects or other individuals, but it is difficult to obtain the person's authorized consent;
6. Personal information that personal information subjects voluntarily make public to the public;
7. Collecting personal information from legally public disclosure information, such as legitimate news reports, government information disclosure and other channels.
In addition, according to the aforementioned regulations, providing externally de-identified processed personal information, and ensuring that data recipients cannot restore and re-identify personal information subjects, will not require separate notification to you or obtaining your consent.

6. How you access and manage your personal information

In accordance with China's relevant laws, regulations, standards, as well as common practices in other countries and regions, we guarantee your exercise of the following rights regarding the personal information you provide:

(1) Access or correct your personal information

1. You have the right to access and update some of your personal information. Usually, you can view or update your registration information on the "Personal Center" or similar pages, and view or update your device information on the resource center page. You agree that before you perform relevant operations, we may require you to undergo identity verification to confirm the identity of the visitor and protect your information security.
2. In addition to the personal information listed above, we cannot provide you with access and correction services for some of your personal information. This information is mainly device information collected to improve your user experience and ensure transaction security, and personal information necessary to ensure the normal operation of the business functions you choose. We will use this information within the scope of your authorization. You cannot access and correct it, but you can contact us to delete or anonymize it.

(2) Delete your personal information

1. Some of your personal information can be directly deleted by you. Please refer to the actual display on the service page for details.
2. In the following circumstances, you can make a request to us to delete personal information:
(1) If our processing of personal information violates laws and regulations;
(2) If we collect and use your personal information without obtaining your consent;
(3) If our processing of personal information violates our agreement with you;
(4) If your account is cancelled or recycled;
(5) If we terminate services and operations.
3. If we decide to respond to your deletion request, we will also notify entities that have obtained your personal information from us to require them to delete it promptly, unless otherwise provided by laws and regulations, or these entities have obtained your independent authorization.
4. When you or we assist you in deleting relevant information, we may not be able to immediately delete corresponding personal information from backup systems due to applicable legal and security technologies, but will delete this information when backups are updated or within a reasonable time.

(3) Change the scope of your authorized consent or withdraw your authorization

1. You can change the scope of your authorization for us to continue collecting personal information or withdraw your authorization by deleting personal information, closing device or service functions, making privacy settings on this Service website or software. You can also withdraw all our authorization to continue collecting your personal information by cancelling your account.
2. Please understand that each business function requires some of your personal information to achieve. When you withdraw consent or authorization, we can no longer continue to provide you with the services corresponding to the withdrawn consent or authorization, nor will we process your corresponding personal information. However, your decision to withdraw consent or authorization will not affect the information processing previously conducted based on your authorization. 3. When you use this Service, you may receive system message pushes, etc. You can always enable or disable the permission to push information to you through these two operation paths: Android end: [System Settings - Application Management - Application List - Infisight - Notification Management] or [Infisight - My - Settings - Message Settings]; iOS end: [System Settings - Notifications - Application List - Infisight]. Please note that our current services do not have targeted push functionality for individual users after forming user portraits through analysis.

(4) Cancel account

Infisight provides you with an account cancellation channel. The path is WEB end: [My] - [Account Security] - [Cancel]; APP end: [My] - [Account Security] - [Cancel]. The specific process for account cancellation is subject to the announcement on the relevant page or additional requirements from Infisight. Once your account is cancelled, it cannot be recovered. Please operate with caution. After you actively cancel the relevant account, we will stop providing you with the product or service, and delete or anonymize the personal information you provided in accordance with applicable legal requirements, except as otherwise provided by laws and regulations.

(5) Obtaining copies of personal information

If you need copies of your personal information, you can contact us through the feedback channels listed in the "How to Contact Us" section of this Policy. After verifying your identity, we will provide you with copies of your personal information in our services (including basic information, identity information), except as otherwise provided by laws and regulations or otherwise agreed in this Policy.

(6) Responding to your aforementioned requests

1. If you cannot access, correct, or delete your personal information through the above methods, or you need to access, correct, or delete other information generated when you use our products and/or services, or you believe we have any violations of laws and regulations or agreements with you regarding the collection or use of information, you can contact us through the channels listed in the "How to Contact Us" section of this Policy. For security reasons, we may require you to provide a written request or prove your identity in other ways.
2. For your reasonable requests, we will not charge fees in principle, but for multiple repeated requests exceeding reasonable limits, we may charge certain costs depending on the situation. For those requests that are unreasonably repeated, require excessive technical means (for example, requiring development of new systems or fundamentally changing current practices), bring risks to the legitimate rights and interests of others, or are very impractical (for example, involving information stored on backup tapes), we may refuse them.

3. In the following circumstances, in accordance with legal requirements, we will be unable to respond to your requests:
(1) Related to national security and defense security;
(2) Related to public safety, public health, and major public interests;
(3) Related to criminal investigation, prosecution, trial and judgment enforcement;
(4) There is sufficient evidence that you have subjective malice or abuse of rights;
(5) Responding to your request will cause serious harm to the legitimate rights and interests of you or other individuals, organizations;
(6) Involving trade secrets.

7. How we handle children's personal information

1. This product does not provide services to children. Children should not create their own personal information subject accounts.
2. If we find that this product has collected children's personal information, we will try our best to delete relevant information as soon as possible.

8. How this Policy is updated

1. When the following major changes occur, we will update this Policy in a timely manner:
(1) Our basic situation changes, such as: ownership changes caused by mergers, acquisitions, restructuring;
(2) The scope, purpose, and rules of collecting, storing, and using personal information change;
(3) The object, scope, and purpose of externally providing personal information change;
(4) The way you access and manage personal information changes;
(5) Data security capabilities and information security risks change;
(6) The channels and mechanisms for user inquiries and complaints, as well as external dispute resolution institutions and contact information change;
(7) Other changes that may have a major impact on your personal information rights and interests.
2. If this Policy is updated, we will notify you through methods such as push notifications, pop-up prompts, sending emails/SMS messages, or posting announcements on the official website. To ensure you can receive notifications in a timely manner, we recommend that you inform us promptly when your contact information is updated. If you continue to use this Service after this Policy update takes effect, it means you have fully read, understood, and accepted the updated Policy and are willing to be bound by the updated Policy

9. How to contact us

If you have any questions, comments, or suggestions about this privacy policy, you can contact us through the following contact methods:
[Sharetronic Technology Co., Ltd.]
Email: [infisight@sharetronic.com]
Phone: [+86 19265596216]
Business Cooperation Phone: [+86 19857149103]
Generally, we will reply within fifteen working days after receiving your relevant information and verifying your identity.

If you are not satisfied with our response, especially if our personal information processing behavior has infringed on your legitimate rights and interests, you can also seek solutions by filing a lawsuit with a court with jurisdiction in Yuhang District, Hangzhou.

[Appendix 1]

The concepts and terms cited in this Policy shall be interpreted as follows:

1. Personal information: Personal information is various information recorded electronically or otherwise related to identified or identifiable natural persons, excluding information after anonymization processing.
2. Sensitive personal information: Sensitive personal information is personal information that, once leaked or illegally used, can easily lead to infringement of personal dignity or harm to personal and property safety, including biometric recognition, religious beliefs, specific identity, medical health, financial accounts, location trajectories, etc., as well as personal information of minors under fourteen years of age.
3. Basic business functions: Business functions that mobile Internet applications achieve users' main use purposes.
4. Extended business functions: Other business functions provided by mobile Internet applications beyond basic business functions.
5. Necessary personal information: Personal information necessary for the normal operation of basic business functions of mobile Internet applications. Without this information, mobile Internet applications cannot achieve basic business functions.
6. Children: Refers to minors under fourteen years of age.
7. De-identification: Refers to the process of technically processing personal information so that it cannot be identified to personal information subjects without additional information.
8. Anonymization: Refers to the process where personal information cannot identify specific natural persons and cannot be restored after processing.
9. Deletion: Refers to the act of removing personal information from systems involved in daily business functions, keeping it in an unretrievable and inaccessible state.
10. SDK: Also known as Software Development Kit, is a collection of development tools for establishing application software on specific software packages, software frameworks, hardware platforms, operating systems, etc.

[Appendix 2]

Description of frequency of personal information collection by Infisight
No. Personal Information Subject Purpose of Use Read Frequency
1 Device manufacturer Infisight Crash log collection, used to improve user interaction experience 1 time/minute
2 Device model Infisight Crash log collection, used to improve user interaction experience 1 time/minute
3 Clipboard Infisight User actively pastes in input box 1 time/minute
4 IP address Infisight Network request 1 time/minute
5 Device application installation list Infisight Crash log collection, used to improve user interaction experience 1 time/minute
6 Task list Infisight Crash log collection, used to improve user interaction experience 1 time/minute
7 Magnetic field sensor Infisight Horizontal/vertical screen switching video 1 time/minute
8 Acceleration sensor Infisight Horizontal/vertical screen switching video 1 time/minute
9 Photo album Infisight Network request 1 time/minute
8 Wifi information Infisight Network request 1 time/minute

Description of frequency of personal information collection by third-party SDKs

Android end:
No. Personal Information Subject Purpose of Use Read Frequency
1 Device application installation list OPPO Push Message push 1 time/minute
2 IP address Zxing QR code scanning QR code scanning 1 time/minute
3 ssid chromium Load web page 3 times/minute
4 Wifi information chromium Load web page 3 times/minute
5 Uncalibrated rotation vector sensor chromium Load web page 1 time/minute
6 Device application installation list chromium Load web page 1 time/minute
7 IP address okhttp Network request 1 time/minute
8 IP address Aurora Push SDK Message push 1 time/minute
9 Device application installation list Aurora Push SDK Message push 1 time/minute
8 IP address Tencent TBS browsing service Load web page 1 time/minute
9 Location information AutoNavi Maps Location and map store location display 1 time/minute
10 IP address AutoNavi Maps Location and map store location display 1 time/minute
11 Wifi information AutoNavi Maps Location and map store location display 1 time/minute
12 ssid AutoNavi Maps Location and map store location display 1 time/minute
13 bssid AutoNavi Maps Location and map store location display 1 time/minute
14 Location information AutoNavi Maps Location and map store location display 1 time/minute
15 Device application installation list AutoNavi Maps Location and map store location display 1 time/minute
16 Rotation vector sensor AutoNavi Maps Location and map store location display 1 time/minute
17 Pressure sensor AutoNavi Maps Location and map store location display 1 time/minute
18 Acceleration sensor AutoNavi Maps Location and map store location display 1 time/minute
19 android_id AutoNavi Maps Location and map store location display 1 time/minute
iOS end:
No. Personal Information Subject Purpose of Use Read Frequency
1 Location information, Wifi information, ssid, bssid, sensors, MAC address, android_id, IMEI, sensors, sensors AutoNavi Maps Locate current position and display nearby stores 1 time/minute
2 Location information, device model, ssid, bssid, Wifi information Aurora Push SDK Push evaluation rectification messages, review messages, system messages, alarm messages to users 1 time/minute
3 Wifi information, ssid, chromium Web controls, used to display privacy policy web pages to users 1 time/minute

Description of repeated collection of personal information by Infisight

Android end
No. Personal Information Subject Purpose of Use Read Frequency
1 Acceleration sensor Infisight Horizontal/vertical screen switching video Collected once per use
2 IP address Infisight Network request Collected once per use
3 Device application installation list Infisight Crash log collection, used to improve user interaction experience Collected once per use
4 Magnetic field sensor Infisight Horizontal/vertical screen switching video Collected once per use
5 Photo album Infisight Evaluation, avatar Collected once per use
6 Device manufacturer Infisight Crash log collection, used to improve user interaction experience Collected once per use
Task list Infisight Infisight Crash log collection, used to improve user interaction experience Collected once per use

Description of repeated collection of personal information by third-party SDKs

No. Personal Information Subject Purpose of Use Read Frequency
2 Wifi information chromium Load web page Collected once per use
3 IP address Aurora Push SDK Message push Collected once per use
4 Location information AutoNavi Maps Location and map store location display Collected once per use
5 Wifi information AutoNavi Maps Location and map store location display Collected once per use
6 IP address AutoNavi Maps Location and map store location display Collected once per use
7 bssid AutoNavi Maps Location and map store location display Collected once per use
8 ssid AutoNavi Maps Location and map store location display Collected once per use
9 Device application installation list AutoNavi Maps Location and map store location display Collected once per use
10 IP address okhttp Network request Collected once per use
11 Device application installation list chromium Load web page Collected once per use
12 android_id AutoNavi Maps Location and map store location display Collected once per use
13 Device application installation list Aurora Push SDK Message push Collected once per use

[Appendix 3]

Infisight APP third-party SDK information page

Android end:

Name Purpose of Use Function Type Personal Information Involved Third-party Link
Aurora Push SDK Set up message push in mobile terminal Message notification Device identifier (including Android ID, GAID, OAID, UAID, IDFA), device hardware information (including device model, device screen resolution, device hardware manufacturer, device product name), operating system information (including operating system version, system name, system language), network information (including network type, operator name, IP address, WIFI status information), push information log: necessary personal information, used to generate desensitized terminal user device unique identifiers in basic business function scenarios of push services, ensuring service compatibility and accurate identification on different devices, while understanding the delivery situation of push information. Device identifier (including IMEI, MAC, IMSI): optional personal information, used as a supplement to generate terminal user device unique identifiers in basic business function scenarios of push services, improving the accuracy of unique device identifiers, thereby improving push precision and reach rate; network information (including SSID, BSSID, WIFI list information, base station information): optional personal information, used to determine fuzzy location information in basic business function scenarios of push services, select nearby push service nodes to provide push services, improving push reach rate. Location-related information: necessary personal information for geofencing push extended functions, used to provide refined push for offline scenarios, recommending push content more suitable for your needs based on location information; software list information (including software list and software operation list information): necessary personal information for user grouping, application self-start, link conditioner extended functions: helps you understand the interests and preferences of your terminal users, helping you provide more suitable push content to users, minimizing interference from useless push content to users; while optimizing SDK long connection stability, improving push delivery rate and application activity; merging links to achieve the purpose of saving electricity and traffic for users. Privacy policy link
Tencent Cloud Set up message push in mobile terminal Message notification Device information (mobile phone model, system type, system version, etc.) used for tagged push and whether it is a real device, network information (network type) supports different types of push based on different network types, account binding information (WeChat Union ID, mobile phone number, email address, etc. depending on the push channel you choose) used for push based on account information Official website link:https://cloud.tencent.com/
Privacy policy link
AutoNavi Maps SDK Obtain user's map location to complete check-in; obtain device information to track, investigate, diagnose, and statistics various problems in services, ensuring normal operation of products and services Send geographic location information Location information, device information Official website link:https://lbs.amap.com
Privacy policy link:https://lbs.amap.com/pages/privacy
Tencent Bugly Collect error information in mobile terminal Collect error information Device information (mobile phone model, system type, system version, etc.) Official website link:https://bugly.qq.com/docs/user-guide/instruction
Privacy policy link:https://privacy.qq.com/document/preview
Xiaomi Push SDK Set up message push in mobile terminal Push message Device identifier (OAID, encrypted Android ID), push message content, device information (device manufacturer, model, location, operator name, etc.), notification bar settings Official website link:https://dev.mi.com/console/appservice/push.html
Privacy policy link:https://dev.mi.com/console/doc/detail?pId=1822
Huawei HMS SDK Set up message push in mobile terminal Push message Application information, device information (device hardware information, system basic information and system settings) Official website link:https://developer.huawei.com/consumer/cn/
Privacy policy link:https://developer.huawei.com/consumer/cn/doc/development/HMSCore-Guides/sdk-data-security-0000001050042177
Honor Push SDK Set up message push in mobile terminal Push message Application anonymous identifier (AAID), application Token Official website link:https://developer.hihonor.com/cn/
Privacy policy link:https://developer.hihonor.com/cn/kitdoc/?category=%E5%9F%BA%E7%A1%80%E6%9C%8D%E5%8A%A1&kitId=11002&navigation=guides&docId=sdk-data-security.md
OPPO Push SDK Set up message push in mobile terminal Push message Application basic information (MCS application package name, application version number, OPUSH SDK version number), in-application device identifier (RegistraterID, appKey, appSecret) Official website link:https://open.oppomobile.com/
Privacy policy link:https://open.oppomobile.com/new/developmentDoc/info?id=11228
vivo Push SDK Set up message push in mobile terminal Push message Application basic information, in-application device identifier, device hardware information, system basic information Official website link:https://dev.vivo.com.cn/promote/pushNews
Privacy policy link:https://dev.vivo.com.cn/documentCenter/doc/652#w1-12075822
Aria Download PDF reports in mobile terminal Basic function - Downloader Device information https://gitee.com/AriaLyy/Aria
Alibaba ARouter Page navigation Basic function - UI None Official website link:https://github.com/alibaba/ARouter
AgentWeb Web browsing Push message Device information Official website link:https://github.com/Justson/AgentWeb
Tencent Bugly Collect error information in mobile terminal Collect error stack information Device information (mobile phone model, system type, system version, etc.) Official website link:https://bugly.qq.com/docs/user-guide/instruction Privacy policy link:https://privacy.qq.com/document/preview
Aurora Push SDK Set up message push in mobile terminal Message notification Notification Device identifier (including Android ID, GAID, OAID, UAID, IDFA), device hardware information (including device model, device screen resolution, device hardware manufacturer, device product name), operating system information (including operating system version, system name, system language), network information (including network type, operator name, WIFI status information), push information log: necessary personal information, used to generate desensitized terminal user device unique identifiers in basic business function scenarios of push services, ensuring service compatibility and accurate identification on different devices, while understanding the delivery situation of push information. Device identifier (including IMEI, MAC, IMSI): optional personal information, used as a supplement to generate terminal user device unique identifiers in basic business function scenarios of push services, improving the accuracy of unique device identifiers, thereby improving push precision and reach rate; network information (including SSID, BSSID, WIFI list information, base station information): optional personal information, used to determine fuzzy location information in basic business function scenarios of push services, select nearby push service nodes to provide push services, improving push reach rate. Location-related information: necessary personal information for geofencing push extended functions, used to provide "push reports" and refined push for offline scenarios, recommending push content more suitable for your needs based on location information; software list information (including software list and software operation list information): necessary personal information for user grouping, application self-start extended functions: helps you understand the interests and preferences of your terminal users, helping you provide more suitable push content to users, minimizing interference from useless push content to users; while optimizing SDK long connection stability, improving push delivery rate and application activity. Privacy policy link
Aurora Statistics Log statistics Statistical analysis Device information Official website link:https://www.jiguang.cn/analytics
okhttp Network request Basic function - Network service Device information Official website link:https://square.github.io/okhttp
JSON-java Data parsing Basic function - Data parsing None Official website link:https://github.com/stleary/JSON-java
Material-components-android Basic function - UI None Official website link:https://github.com/material-components/material-components-android
Umeng Statistical Analysis SDK Conduct APP operation statistics and analysis Statistical analysis Device information (IMEI/MAC/Android ID/IDFA/OAID/OpenUDID/GUID/SIM card IMSI/ICCID), location information, network information Official website link:https://www.umeng.com/
Privacy link:https://www.umeng.com/page/policy

iOS end:

Name Usage Scenario Purpose of Use System Permissions Involved User Personal Information Scope or Permissions Involved Privacy Link Address
Aurora Push SDK Set up message push in mobile terminal Message notification Notification Device identifier (including Android ID, GAID, OAID, UAID, IDFA), device hardware information (including device model, device screen resolution, device hardware manufacturer, device product name), operating system information (including operating system version, system name, system language), network information (including network type, operator name, WIFI status information), push information log: necessary personal information, used to generate desensitized terminal user device unique identifiers in basic business function scenarios of push services, ensuring service compatibility and accurate identification on different devices, while understanding the delivery situation of push information. Device identifier (including IMEI, MAC, IMSI): optional personal information, used as a supplement to generate terminal user device unique identifiers in basic business function scenarios of push services, improving the accuracy of unique device identifiers, thereby improving push precision and reach rate; network information (including SSID, BSSID, WIFI list information, base station information): optional personal information, used to determine fuzzy location information in basic business function scenarios of push services, select nearby push service nodes to provide push services, improving push reach rate. Location-related information: necessary personal information for geofencing push extended functions, used to provide "push reports" and refined push for offline scenarios, recommending push content more suitable for your needs based on location information; software list information (including software list and software operation list information): necessary personal information for user grouping, application self-start extended functions: helps you understand the interests and preferences of your terminal users, helping you provide more suitable push content to users, minimizing interference from useless push content to users; while optimizing SDK long connection stability, improving push delivery rate and application activity. Privacy policy link
Tencent Cloud Set up message push in mobile terminal Message notification Notification Device information (mobile phone model, system type, system version, etc.) used for tagged push and whether it is a real device, network information (network type) supports different types of push based on different network types, account binding information (WeChat Union ID, mobile phone number, email address, etc. depending on the push channel you choose) used for push based on account information Official website link: https://cloud.tencent.com/
Privacy policy link
AutoNavi Maps SDK, AutoNavi Location SDK Store location Location and map display Location permission GNSS information, IP address, WLAN hotspots, base station information, Bluetooth devices and other sensors that can be used for positioning; "device information" obtained by various products/services below, including terminal device unique identifiers (containing IDFV, OAID, IMEI, MEID, IMSI, etc.), mac address, SSID, BSSID, operating system version, device brand and model, device configuration, operator type, application information (application name, application version number), sensors, sensors, ssid, Wifi information, ssid https://lbs.amap.com/pages/privac
Tencent Bugly Collect error information in mobile terminal Collect error stack information Device information (mobile phone model, system type, system version, etc.) Official website link:https://bugly.qq.com/docs/user-guide/instruction Privacy policy link:https://privacy.qq.com/document/preview
Umeng Statistical Analysis SDK Conduct APP operation statistics and analysis Statistical analysis Device information (IMEI/MAC/Android ID/IDFA/OAID/OpenUDID/GUID/SIM card IMSI/ICCID), location information, network information Official website link:https://www.umeng.com/
Privacy link:https://www.umeng.com/page/policy

Appendix 4 Personal Information Collection List

Android Personal Information Collection List

Personal Information Category Personal Information Subject Personal Information Collection Purpose Collector
Personal basic information Enterprise/organization user Mobile phone number Register Infisight account, member management function use Infisight
Personal basic information Enterprise/organization user Verification code Register Infisight account function use Infisight
Personal basic information Enterprise/organization user Account name Register Infisight account function use Infisight
Personal basic information Enterprise/organization user Password Register Infisight account function use Infisight
Personal basic information Enterprise/organization user Name Register Infisight account function use Infisight
Personal basic information Enterprise/organization user Avatar Personalized settings Infisight
Personal basic information Enterprise/organization user Email address Personalized settings, personnel management function use Infisight
Personal basic information Enterprise/organization user Gender Personalized settings Infisight
Personal basic information Enterprise/organization user Face photo On-site inspection, on-site rectification Infisight
Personal basic information Enterprise/organization user Clipboard content Search function Infisight
Personal basic information Enterprise/organization user Sensors Rotate video according to phone direction Infisight
Personal common device information Enterprise/organization user Location information, network positioning, access GPS positioning, wifi network information, obtain operator information, network status changes, write offline positioning data, access network, destination, sensors Locate and display nearby store maps AutoNavi Maps
Personal common device information Enterprise/organization user Device model, operating system version, device settings, unique device identifier (such as IMEI/android ID/IDFA/OPENUDID/GUID, SIM card IMSI information) and other software and hardware characteristic information, IP address, GPS location and sensor information such as Wi-Fi access points, Bluetooth and base stations that can provide relevant information, search query content, IP address, browser type, telecommunications operator, language used, access date and time and your web page access records Safe and effective storage of files Tencent Cloud COS
Personal common device information Enterprise/organization user Infisight device product serial number and product verification code, video screenshots generated by alarm event capture are immediately deleted the next day, when using remote intercom and other functions, collect submitted audio content (including recordings), collect face/human shape recognition, need to pre-enter baseline information such as face pictures; View device video Weiduo Open Platform SDK
Personal common device information Enterprise/organization user Collect unique device identification code (such as IMEI/android ID/IDFA/OPENUDID/GUID, SIM card IMSI information) device Mac address, device platform, device manufacturer, device brand, application list information; network information and location-related information: device network status and changes, location-related information, device application installation list Users receive push information Aurora Push SDK
Personal common device information Enterprise/organization user Collect unique device identification code (such as IMEI/android ID/IDFA/OPENUDID/GUID, SIM card IMSI information) device Mac address, device platform, device manufacturer, device brand, application list information; network information and location-related information: device network status and changes, location-related information, device application installation list OPPO mobile phone message push OPPO message push SDK
Personal common device information Enterprise/organization user Collect unique device identification code (such as IMEI/android ID/IDFA/OPENUDID/GUID, SIM card IMSI information) device Mac address, device platform, device manufacturer, device brand, application list information; network information and location-related information: device network status and changes, location-related information, device application installation list Vivo mobile phone message push Vivo message push SDK
Personal common device information Enterprise/organization user Collect unique device identification code (such as IMEI/android ID/IDFA/OPENUDID/GUID, SIM card IMSI information) device Mac address, device platform, device manufacturer, device brand, application list information; network information and location-related information: device network status and changes, location-related information Huawei mobile phone message push Huawei message push SDK
Personal common device information Enterprise/organization user Collect unique device identification code (such as IMEI/android ID/IDFA/OPENUDID/GUID, SIM card IMSI information) device Mac address, device platform, device manufacturer, device brand, application list information; network information and location-related information: device network status and changes, location-related information Huawei mobile phone message push Huawei message push SDK
Personal common device information Enterprise/organization user Collect unique device identification code (such as IMEI/android ID/IDFA/OPENUDID/GUID, SIM card IMSI information) device Mac address, device platform, device manufacturer, device brand, application list information; network information and location-related information: device network status and changes, location-related information Xiaomi mobile phone message push Xiaomi message push SDK
Personal common device information Enterprise/organization user Device model, operating system, unique device identifier (referring to a string of characters programmed into the device by the device manufacturer that can be used to uniquely identify the corresponding device), login IP address, WeChat software version number, network access method, type and status, network quality data, device accelerator (such as gravity sensing device), operation logs, service log information (such as your search and viewing operation records in WeChat, service failure information, referral URL information, etc.) and other log information. User video preview screenshot images within the APP User WeChat sharing of video screenshot images WeChat sharing
Personal common device information Enterprise/organization user Telephone permission: read user's IMEI and IMSI information, used to control X5 kernel version grayscale distribution and data statistics; if this permission is not provided, kernel version cannot be grayscale distributed to your App; Task list: task list; Memory card permission: used to find available X5 kernel versions on user memory cards to improve user X5 proportion; if this permission is not provided, it may affect your use of X5 kernel proportion. Load web page Tencent browsing service SDK

iOS Personal Information Collection List

Personal Information Category Personal Information Subject Personal Information Collection Purpose Collector
Personal basic information Enterprise/organization user Mobile phone number Register Infisight account, member management function use Infisight
Personal basic information Enterprise/organization user Verification code Register Infisight account function use Infisight
Personal basic information Enterprise/organization user Account name Register Infisight account function use Infisight
Personal basic information Enterprise/organization user Password Register Infisight account function use Infisight
Personal basic information Enterprise/organization user Name Register Infisight account function use Infisight
Personal basic information Enterprise/organization user Avatar Personalized settings Infisight
Personal basic information Enterprise/organization user Email address Personalized settings, personnel management function use Infisight
Personal basic information Enterprise/organization user Gender Personalized settings Infisight
Personal basic information Enterprise/organization user Face photo On-site inspection, on-site rectification Infisight
Personal location information Enterprise/organization user Precise location information Attendance check-in function Infisight
Personal common device information Enterprise/organization user Network positioning, access GPS positioning, wifi network information, obtain operator information, network status changes, write offline positioning data, access network Locate and display nearby store maps AutoNavi Maps
Personal common device information Enterprise/organization user Device model, operating system version, device settings, MAC address and IMEI, IDFA, OAID and other device identifiers and other software and hardware characteristic information, location-related information of the device (such as IP address, GPS location and sensor information such as Wi-Fi access points, Bluetooth and base stations that can provide relevant information); log information (such as your search query content, IP address, browser type, telecommunications operator, language used, access date and time and your web page access records, etc.); support information for user accounts Safe and effective storage of files Tencent Cloud COS
Personal location information Enterprise/organization user Voice content, text information, image information, search query content, accessed page addresses, browser type, network status, operator, language used, access date and time, system activities and your web page access records Quick input keywords through voice iFlytek SDK
Personal location information Enterprise/organization user Unique individual identifier, online identifier, Internet Protocol (IP) address, email address, account name or other similar identifiers; commercial information, including records of products or services purchased, obtained or considered Data persistence Realm database
Personal common device information Enterprise/organization user Infisight device product serial number and product verification code, video screenshots generated by alarm event capture are immediately deleted the next day, when using remote intercom and other functions, collect submitted audio content, collect face/human shape recognition, need to pre-enter baseline information such as face pictures View device video Weiduo SDK
Personal common device information Enterprise/organization user Collect unique device identification code (such as IMEI/android ID/IDFA/OPENUDID/GUID/ UDID, SIM card IMSI information) device Mac address, user location information and IP address, SDK/API/JS code version, browser, Internet service provider, platform, timestamp, application identifier, application version, application distribution channel, independent device identifier, device model, sensor parameters, terminal manufacturer, terminal device operating system version, session start/stop time, language location, time zone and network status (WiFi, etc.), hard disk, CPU and battery usage
Personal common device information Enterprise/organization user Collect unique device identification code, device Mac address, device platform, device manufacturer, device brand, application list information; network information and location-related information: device network status and changes, location-related information