Last updated date: [February 2023]

 

 

If you have any questions, comments or suggestions, please contact us through the following contact methods:

 

 

E-mail: 1470935908@qq.com

This policy will help you understand the following:

1. How do we collect and use your personal information

2. How do we entrust, share, transfer and publicly disclose your personal information

3. How do we protect your personal information

4. Your rights

5. How to update this policy

6. How to contact us

CamHipro (hereinafter referred to as "we") knows the importance of user information to you and will do its best to protect your user information safe and reliable. We are committed to maintaining your trust in us and abide by the following principles to protect your user information: the principle of consistent rights and responsibilities, the principle of clear purpose, the principle of choice and consent, the principle of minimum adequacy, the principle of ensuring security, the principle of subject participation, the principle of openness and transparency, etc. At the same time, we promise to take corresponding security measures to protect your user information according to the mature security standards in the industry.

Please read and understand this privacy policy carefully before using our products (or services).

In addition, you need to promise that you are an adult when you start using this product. If you are a minor, you need your guardian to agree to use this product and agree to the relevant service terms and privacy policy.

One. How do we collect and use your personal information

 

1. What personal information do we collect about you

To provide basic services, the application needs to call your following permissions or functions to ensure the operation of application functions:

1) Read, write, or delete storage space

 

 

Used to read, write or delete video or screenshots saved by the device

2) Get the location information of the device

 

 

It is used for fast connection to devices, discovery of nearby devices and Wi-Fi list. Optimize the network connection request between the SDK and the push server to ensure the stability and continuity of the service; Realize the function of regional push.

3) Get mobile device information and network information

 

 

It is used for FCM push to identify the unique user and ensure the accurate delivery of message push

4) Get running process information

 

 

Used to determine whether the application can start the initialization of SDK and push service functions when the application is started

 

In addition, we require you to register an account. When you register an account, we will ask you to provide personal information, such as your email address and phone number, which will be stored in your account name.

 

 

If you do not agree to call the above necessary permissions or functions, or do not agree to our collection and use of the above information, the application will not work properly.

You can provide or allow us to collect the following information at your own option:

 

 

log information

 

 

When you use our service, we will automatically collect some information and write it to the external storage device of your phone. Such information includes:

 

 

An error or exception occurs when the application uses the service

 

 

When the application crashes during operation, we will write the error log to the external storage, and users can choose whether to send it to us

This information is not necessary for the operation of the business function, but it is of great significance to improve the service quality and develop new products or services. We will not force you to provide such information, and your refusal will not have an adverse impact on the use of this business function.

2. When you use this business function, our App will apply to you for the following system permissions related to personal information:

 

 

(1) Take photos, videos and recordings

 

 

(2) View network connections, Change network connections and full network access

 

 

(3) Allow to receive WLAN multicast

 

 

(4) Storage permissions

 

 

(5) Location permissions

 

 

(6) Get mobile device information, network information, and modify system settings

There are 6 system permissions in total. If you do not authorize, we will not be able to provide this business function. In addition to the above permissions, you can freely choose whether to grant other system permissions to the App.

3. How do we use your personal information

(1) Take photos, videos and recordings

When the application is requested to make a video call by another device, it needs to send the data collected by the camera and microphone to the device.

The application supports scanning QR code to add new networked devices, and calling the camera to collect data

 

.

2) View network connections, Change network connections and full network access

When configuring the network for the camera, the application needs to read the network information and provide users with limited account system functions.

 

 

(3) Allow to receive WLAN multicast

The application can find other cameras under the same LAN, and needs to exchange data with the camera not added through WLAN multicast.

(4) Storage permissions

Video recording, screenshot, playback and download of the monitoring interface.

 

 

(5) Location permissions

Get the list of WiFi networks at your location, and realize the connection of smart hardware devices to the WiFi network you choose; Realize push function.

 

 

(6) Get mobile device information, network information, and modify system settings

For third-party SDKs (see "How we entrust, share, transfer, and publicly disclose your personal information"); The screen is always on during the application views the camera video, the screen must retain the wake up permission.

Two. How do we entrust, share, transfer and publicly disclose your personal information

(1) Entrust Some specific modules or functions in this business function are provided by external suppliers. For example, we will hire service providers to assist us in providing customer support. For companies, organizations and individuals entrusted by us to process personal information, we will sign strict confidentiality agreements with them, requiring them to process personal information in accordance with our requirements, this privacy policy and any other relevant confidentiality and security measures.

(2) Share We will not share your personal information with any company, organization or individual other than our company, unless we obtain your explicit consent. At present, we will ask you for your express consent to share personal information under the following circumstances:

We will integrate the FCM push SDK to implement the message push function.
Types of personal information collected by push SDK:
Generally speaking, the personal information we collect from you is necessary to help you complete the travel arrangement and reservation, and to help us provide you with travel products and services. For example, we may collect your name, mailing address, telephone number, e-mail address, credit card number and expiry date, passport information, catering needs (if any), health information and other details closely related to your travel arrangements. We will also collect the information that FCM Travel must use in its business activities, such as the financial information necessary to process several travel transactions, and any other information you may choose to provide us. According to legal requirements, we must obtain your consent for the collection of sensitive information. Unless otherwise stated by you, according to the "Policy", we will consider that you have agreed to collect all the information you provide for our use.

The link of Third party privacy policy: https://www.fcmtravel.com/zh-cn/privacy-policy

(3) Transfer

We will not transfer your personal information to any company, organization or individual, except for the following circumstances:

 

 

a) Transfer with explicit consent: After obtaining your explicit consent, we will transfer your personal information to other parties;

 

 

b) When it involves mergers, acquisitions or bankruptcy liquidation, if it involves the transfer of personal information, we will require the new company or organization that holds your personal information to continue to be bound by this privacy policy, otherwise we will require the company or organization to ask you for authorization again.

(4) Publicly disclose

We will only publicly disclose your personal information under the following circumstances:

 

 

a) After obtaining your explicit consent;

 

 

b) Disclosure based on law: We may publicly disclose your personal information under the circumstances of laws, legal proceedings, litigation or mandatory requirements of the competent government departments.

Three. How do we protect your personal information

 

(A) We have used industry-standard security protection measures to protect the personal information you provide, to prevent the datas suffering unauthorized access, public disclosure, use, modification, damage or loss. We will take all reasonable and feasible measures to protect your personal information. For example

1. Information retention period

 

 

(1) During the user's use of our platform services, we will continue to save the user's personal information.

 

 

(2) When you delete your personal information or cancel your account independently, we will retain your existing personal information according to the minimum period specified by laws and regulations. Within the minimum period required by laws and regulations, we will no longer use your personal information commercially. When your personal information exceeds the above storage period, we will anonymize it.

a) In order to cooperate with the People's Procuratorate, the public security organ and the national security organ to investigate the criminal behavior of users in the process of using our platform services, and better protect the safety of other users' lives and property, when users delete personal information or cancel their accounts independently, we will encrypt and isolate the user's personal information within the criminal prosecution period specified in the Criminal Law.

 

 

b) If you have serious violations of laws and regulations, platform agreements, platform rules and other circumstances in the process of using our platform services, your illegal and default records and corresponding platform credit records will be permanently saved.

2. Information storage area

 

 

(1) Your personal information collected by us will be stored and used in mainland China.

 

 

(2) At present, our platform does not provide personal information overseas. If it is necessary to transmit personal information abroad in the future, we will clearly inform you of the purpose, recipient, security measures, etc. of personal information leaving the country, and obtain your consent separately.

3. Safety protection measures

 

 

(1) This application will adopt strict security system and industry-wide security technology and procedures to ensure that your personal information is not lost, disclosure, damage or unauthorized access/use.

 

 

(2) Our platform takes the following security technical measures to protect your personal information:

 

 

a) The user's personal information is encrypted and stored in the server and stored through data isolation technology.

 

 

b) Encrypted transmission protocol is used during data transmission.

 

 

c) Strictly control data access rights, and establish a complete application and approval system for sensitive data access rights.

 

 

d) Establish a data security monitoring and audit system to conduct comprehensive data security control.

4. Disposal of safety incidents

 

 

(1) In order to deal with the possible security risks of personal information disclosure, damage, loss, etc., the company has issued a number of systems to clarify the classification and grading standards of security accidents and security vulnerabilities, as well as the internal handling process (including emergency response process) and remedial measures for the above security accidents and vulnerabilities.

 

 

(2) In the event of a security incident, we will promptly inform you of the basic situation and risks of the incident, the measures we have taken or will take, and your suggestions on how to reduce the risks on your own.

 

 

(3) We will promptly notify the affected users of the security incidents by push notification, letter or telephone. When it is difficult to inform users one by one, we will release warning information by issuing platform announcements.

5. Stop operation

 

 

(1) If our platform stops operation, we will publish an announcement on our platform at least 30 days in advance and stop collecting personal information in time.

 

 

(2) After the operation is stopped, we will stop the commercial use of personal information and anonymize the collected personal information after meeting the minimum storage period specified by laws and regulations.

(B) We will take all reasonable and feasible measures to ensure that irrelevant personal information is not collected. We will only retain your personal information for the period required to achieve the purpose stated in this policy, unless the retention period needs to be extended or permitted by law.

 

 

(C) We will regularly update and disclose the relevant contents of the security risk, personal information security impact assessment and other reports.

 

 

(D) The Internet environment is not 100% secure. We will try our best to ensure or guarantee the security of any information you send us.

 

 

(E) In the event of an unfortunate personal information security incident, we will promptly inform you of the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, the suggestions you can take to prevent and reduce risks independently, and the remedial measures for you in accordance with the requirements of laws and regulations. We will promptly inform you of the relevant information of the event by mail, letter, telephone, push notification, etc. When it is difficult to inform the personal information subject one by one, we will take reasonable and effective ways to release the announcement.

 

 

At the same time, we will also actively report the disposal of personal information security incidents according to the requirements of regulatory authorities.

Four. Your rights

In accordance with the relevant laws, regulations and standards of China and the general practices of other countries and regions, we guarantee that you exercise the following rights with respect to your personal information:

(1) Access your personal information

 

 

You have the right to access your personal information, except for the exceptions specified by laws and regulations. You can access your personal information in the following ways: Please send the inquiry email to 1470935908@qq.com

 

 

We will reply to your visit request within 15 days.

 

 

For other personal information generated by you in the process of using our products or services, as long as we do not need too much investment, we will provide you. If you want to exercise the data access right, you can access your personal information in the following ways: please send the inquiry email

 

to 1470935908@qq.com

(2) Correct your personal information

 

 

When you find that there is an error in the personal information we process about you, you have the right to ask us to make corrections. You can apply for correction through the methods listed in "(1) Access your personal information", and we will reply to your correction request within 15 days.

(3) Delete your personal information

 

 

In the following cases, you can request us to delete personal information:

 

 

1. If we handle personal information in violation of laws and regulations;

 

 

2. If we collect and use your personal information without your consent;

 

 

3. If our behavior of handling personal information violates the agreement with you;

 

 

4. If you no longer use our products or services;

 

 

5. If we no longer provide you with products or services.

If we decide to respond to your request for deletion, we will also notify the entities that have obtained your personal information from us and require them to delete it in a timely manner, unless otherwise specified by laws and regulations, or these entities have obtained your independent authorization.

 

When you delete information from our service, we may not delete the corresponding information in the backup system immediately, but we will delete the information when the backup is updated.

(4) Change the scope of your authorization

 

 

Each business function needs some basic personal information to be completed. For the collection and use of additional collected personal information, you can give or withdraw your authorization or consent at any time.

 

 

You can change your authorization or consent in the following ways: Please send an inquiry email to 1470935908@qq.com . After you withdraw your consent, we will not process the corresponding personal information. However, your decision to withdraw your consent will not affect the previous personal information processing based on your authorization.

(5) Automatic decision of constraint information system

 

 

In some business functions, we may only make decisions based on the non-manual automatic decision-making mechanism including information systems and algorithms. If these decisions significantly affect your legitimate rights and interests, you have the right to ask us for an explanation, and we will also provide appropriate remedies.

(6) Individual information subject cancels account

 

 

You can cancel the previously registered account at any time, and you can operate by yourself in the following ways:

In the status of account login, click "My Account - Logoff User" on the sidebar interface to log off the account. If you have any questions, please send an email to 1470935908@qq.com

After canceling the account, we will stop providing you with products or services and delete your personal information according to your requirements, unless otherwise specified by laws and regulations.

(7) The personal information subject obtains a copy of personal information

 

You have the right to obtain a copy of your personal information. You can operate it by yourself in the following ways: Please send an inquiry email to 1470935908@qq.com

 

 

On the premise that the technology is feasible, if the data interface has been matched, we can also directly transmit a copy of your personal information to the third party designated by you according to your requirements.

(8) Respond to your above request

 

 

To ensure security, you may need to provide a written request, or prove your identity in other ways. We may ask you to verify your identity before processing your request. We will reply within 15 days. If you are not satisfied, you can also complain through the following channels: Please send a complaint email to 1470935908@qq.com

 

 

In principle, we will not charge for your reasonable request, but for repeated requests that exceed the reasonable limit, we will charge a certain cost as appropriate. We may refuse requests that are repeated without reason, require too many technical means (for example, need to develop new systems or fundamentally change existing practices), pose risks to the legitimate rights and interests of others, or are very impractical (for example, involve information stored on backup tapes).

We will not be able to respond to your request under the following circumstances:

 

 

1. Related to the personal information controller performing the obligations stipulated by laws and regulations;

 

 

2. Directly related to national security and national defense security;

 

 

3. Directly related to public safety, public health and major public interests;

 

 

4. Directly related to criminal investigation, prosecution, trial and execution of judgments;

 

 

5. The personal information controller has sufficient evidence to show that the personal information subject has subjective malice or abuse of rights;

 

 

6. For the purpose of safeguarding the life, property and other important legitimate rights and interests of the personal information subject or other individuals, but it is difficult to obtain my consent;

 

 

7. Responding to the request of the personal information subject will cause serious damage to the legitimate rights and interests of the personal information subject or other individuals/organizations; Involving trade secrets.

Five. How to update this policy

 

 

Our privacy policy may change.

 

 

Without your explicit consent, we will not reduce your rights under this privacy policy. We will publish any changes to this policy on this page.

 

 

For major changes, we will also provide more significant notifications (including for some services, we will send notifications via email to explain the specific changes in the privacy policy).

The major changes referred to in this policy include but are not limited to:

 

 

1. Significant changes have taken place in our service model. For example, the purpose of processing personal information, the type of personal information processed, and the usage mode of personal information;

 

 

2. Significant changes have taken place in our ownership structure and organizational structure. Such as changes in owners caused by business adjustment, bankruptcy and merger, etc;

 

 

3. The main objects of personal information sharing, transfer or public disclosure have changed;

 

 

4. Your right to participate in personal information processing and the way you exercise it have changed significantly;

 

5. Our responsible department, contact information and complaints for handling personal information security

 

 

6. When the personal information security impact assessment report indicates that there is a high risk.

Six. How to contact us

 

If you have any questions, comments or suggestions about this privacy policy, or have any questions about our collection, use or disclosure of your personal information, please contact us. Customer service email: 1470935908@qq.com

 

 

Generally, we will reply within 15 days.

This policy shall be interpreted and governed by the laws of the People's Republic of China. Any dispute between you and us in any form shall be settled through friendly negotiation. If the negotiation fails, either party has the right to submit the dispute to the people's court with jurisdiction at the location of Shenzhen Hichip Vision Technology Co., Ltd. for litigation.