Privacy Policy
Important Note
This application (hereinafter referred to as "we") understands the importance of personal information to you and will do our best to protect the security and reliability of your personal information. We are committed to maintaining your trust in us, adhering to the following principles, and protecting your personal information: the principle of consistency of rights and responsibilities, the principle of clear purpose, the principle of selective consent, the principle of minimum sufficiency, the principle of ensuring security, the principle of subject participation, and the principle of openness and transparency. At the same time, we promise to take corresponding security measures in accordance with mature industry security standards to protect your personal information.
Please carefully read and understand this Privacy Policy before using our products (or services)
1 Introduction to permissions and explanation of usage scenarios
To protect your right to know, we will display the relevant operating system permissions that the product may apply for and use through the following content. You can manage the relevant permissions according to your actual needs.
1.1 Permission Name: CAMERA Camera Permission
Permission Function Description: Allow the program to use the camera function.
Usage scenario and purpose: Scan device codes to obtain device information, capture device malfunctions, and other scenarios
1.2 Permission Name: READ_deTERNAL_Storage Permission
Permission Function Description: Allow programs to read stored data outside of the program.
Usage scenario and purpose: Browse the system album for uploading images.
1.3 Permission Name: BULETOOTH Bluetooth Permission
Permission Function Description: Allow programs to use Bluetooth functionality.
Usage scenario and purpose: Display device status on the homepage and device panel; Control devices on the homepage and device panel; On the homepage, add device page for discovering devices and device distribution network.
1.4 Permission Name: Message Notification Permission
Permission Function Description: Allow programs to use additional functions based on message notification permissions.
Usage scenario and purpose: To push notifications about products or services to you, especially to send alerts so that you can capture real-time status.
1.5 Permission Name: Location Information Permission
Permission Function Description: Allow programs to use location-based services.
Usage scenario and purpose: In "Add Device", you need to turn on Bluetooth and apply for location to add the device, otherwise your "Device Add" function will not be able to be implemented.
When you use our specific products or services (weather services/home management), based on your consent, we will collect real-time accurate or non accurate geolocation information about you.
When you use the geofencing feature to generate location changes by creating a scene, we will apply for permission to collect backend location information in order to obtain the location and achieve the automation capability you wish to achieve.
You can turn off location services in the system of your mobile device to stop our collection of your location information.
2 How do we collect and use your personal information
Personal information refers to various types of information recorded electronically or in other ways that can be used alone or in combination with other information to identify the identity of a specific natural person or reflect the activities of a specific natural person. We will only collect and use your personal information for the following purposes as described in this policy:
·Mobile device information: When you interact with our products, in order to ensure your normal use of our services, maintain the normal operation of our services, improve and optimize our service experience, and ensure the security of your account, we will automatically collect mobile device information, including mobile device model, login IP address, wireless connection information, operating system type and version, application version number, push notification identifier, log files, and mobile network information. At the same time, we will collect your software version number. To ensure the security of the operating environment or provide necessary services, we will collect a list of application installations for the application.
·Usage Information: During your interaction with our website and services, we will automatically collect and access, click, download, send/receive messages, and other usage information related to the use of our website and services.
·Log information: When you use our application, in order to improve your user experience, system and exception logs will be uploaded for analysis, including your IP address, language habits, operating system version, access date or time, device ID, APP version, etc., in order for us to accurately identify problems and help you solve problems during service use.
Please note that individual mobile device information and service log information cannot identify specific natural person identities. If we combine this type of non personal information with other information to identify a specific natural person's identity, or use it in conjunction with personal information, during the combined use period, this non personal information will be considered personal information. Unless authorized by you or otherwise provided by laws and regulations, we will anonymize and de identify this type of information.
3 How do we use cookies and similar technologies
3.1  Cookie
To ensure the normal operation of the website, we will store small data files called cookies on your computer or mobile device. Cookies typically contain identifiers, site names, as well as some numbers and characters. With the help of cookies, websites can store data such as your preferences or items in your shopping basket.
We will not use cookies for any purposes other than those stated in this policy. You can manage or delete cookies according to your preferences. You can clear all cookies saved on your computer, and most web browsers have a feature to block cookies. But if you do so, you will need to personally change the user settings every time you visit our website. To learn more about how to change browser settings.
3.2  Website beacons and pixel tags
In addition to cookies, we also use other similar technologies such as website beacons and pixel tags on our website. For example, the email we send you may contain a click URL that links to the content of our website. If you click on the link, we will track this click to help us understand your product or service preferences and improve customer service. A website beacon is typically a transparent image embedded in a website or email. By using pixel tags in emails, we can determine whether the email has been opened. If you do not want your activities to be tracked in this way, you can unsubscribe from our mailing list at any time.
3.3  Do Not Track
Many web browsers have a Do Not Track function, which can issue Do Not Track requests to websites. At present, the major Internet standards organizations have not established relevant policies to specify how websites should respond to such requests. But if your browser has enabled Do Not Track, then all of our websites will respect your choice.
4 How do we share, transfer, and publicly disclose your personal information
4.1 Sharing
We will not share your personal information with any other company, organization, or individual, except in the following circumstances:
4.1.1. Sharing with explicit consent: With your explicit consent, we will share your personal information with other parties.
4.1.2. We may share your personal information with external parties in accordance with laws and regulations or mandatory requirements of government authorities.
4.1.3. Shared with authorized partners: Some of our services will be provided by authorized partners solely for the purposes stated in this privacy policy. We may share some of your personal information with our partners to provide better customer service and user experience. For example, the company we hire to provide third-party data statistics and analysis services may need to collect and access personal data for data statistics and analysis. In this case, these companies must comply with our data privacy and security requirements. We will only share your personal information for legal, legitimate, necessary, specific, and clear purposes, and will only share personal information necessary for providing services.
We will sign strict confidentiality agreements with companies, organizations, and individuals with whom we share personal information, requiring them to handle personal information in accordance with our instructions, this privacy policy, and any other relevant confidentiality and security measures.
4.2 Transfer
We will not transfer your personal information to any company, organization, or individual, except in the following circumstances:
4.2.1. Transfer with explicit consent: After obtaining your explicit consent, we will transfer your personal information to other parties;
4.2.2. When it comes to mergers, acquisitions, or bankruptcy liquidation, if there is a transfer of personal information, we will require the new company or organization holding your personal information to continue to be bound by this privacy policy. Otherwise, we will require the company or organization to seek your authorization and consent again.
4.3 Public disclosure
We will only publicly disclose your personal information in the following situations:
4.3.1.  After obtaining your explicit consent;
4.3.2.  Legal Disclosure: We may publicly disclose your personal information in the event of legal, procedural, litigation, or mandatory requirements from government authorities.
5 How do we protect your personal information
5.1 We have implemented industry standard security measures to protect the personal information you provide, preventing unauthorized access, public disclosure, use, modification, damage, or loss of data. We will take all reasonable and feasible measures to protect your personal information. For example, when exchanging data (such as credit card information) between your browser and the "service", it is protected by SSL encryption; We also provide HTTPS secure browsing for our website; We will use encryption technology to ensure the confidentiality of data; We will use trusted protection mechanisms to prevent data from being maliciously attacked; We will deploy access control mechanisms to ensure that only authorized personnel can access personal information; And we will hold security and privacy protection training courses to enhance employees' awareness of the importance of protecting personal information.
5.2 We will take all reasonable and feasible measures to ensure that no relevant personal information is collected. We will only retain your personal information for the period necessary to achieve the purposes stated in this policy, unless an extension of the retention period is required or permitted by law.
5.3 The Internet is not an absolutely secure environment, and email, instant messaging, and other parties communicating with our users are not encrypted. We strongly recommend that you do not send personal information in this way. Please use a complex password to help us ensure the security of your account.
5.4 The Internet environment is not 100% secure. We will try our best to ensure or guarantee the security of any information you send us. If our physical, technological, or management protective facilities are damaged, resulting in unauthorized access, public disclosure, tampering, or destruction of information, which damages your legitimate rights and interests, we will bear corresponding legal responsibilities.
5.5 After the unfortunate occurrence of a personal information security incident, we will promptly inform you of the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, suggestions for you to independently prevent and reduce risks, and remedial measures for you in accordance with the requirements of laws and regulations. We will promptly inform you of the relevant situation of the event through email, letter, phone, push notifications, etc. When it is difficult to inform individual information subjects one by one, we will adopt reasonable and effective methods to publish announcements.
At the same time, we will proactively report the handling of personal information security incidents in accordance with regulatory requirements.
5.6. When you log in, we will store your user information locally for your future use in the application. There is no other malicious use
6 Your rights
According to relevant laws, regulations, standards in China, as well as common practices in other countries and regions, we guarantee that you exercise the following rights to your personal credit:
6.1 Accessing your personal information
You have the right to access your personal information, except for exceptions provided by laws and regulations. If you want to exercise your data access rights, you can access them yourself through the following methods:
Account Information - If you wish to access or edit personal and payment information in your account, change your password, add security information, or close your account, you can do so by contacting customer service.
Search for information - You can contact customer service to clear your search history, view and modify interests, and manage other data.
6.2 Correct your personal information
When you discover errors in the personal information we process about you, you have the right to request us to make corrections. You can submit a correction request through the methods listed in "(1) Accessing Your Personal Information".
If you are unable to correct these personal information through the above link, you can contact us at any time using our web form. We will reply to your correction request within 30 days.
6.3 Delete your personal information
In the following situations, you can request us to delete your personal information:
6.3.1. If our handling of personal information violates laws and regulations;
6.3.2. If we collect and use your personal information without your consent;
6.3.3. If our handling of personal information violates our agreement with you;
6.3.4. If you no longer use our products or services, or if you cancel your account;
6.3.5. If we no longer provide you with products or services.
If we decide to respond to your deletion request, we will also notify the entities that have obtained your personal information from us to delete it in a timely manner, unless otherwise provided by laws and regulations, or if these entities have obtained your independent authorization.
When you delete information from our service, we may not immediately delete the corresponding information from the backup system, but will delete this information when the backup is updated.
6.4 Change the scope of your authorized consent
Each business function requires some basic personal information to be completed (see "Part One" of this strategy). For the collection and use of additional personal information, you may give or revoke your authorization and consent at any time.
6.5 Personal Information Subject Account Cancellation
After canceling the account, we will cease to provide you with products or services and delete your personal information as per your request, except as otherwise provided by laws and regulations.
6.6 Personal information subject obtains a copy of personal information
On the premise of technical feasibility, such as data interface matching, we can also directly transfer a copy of your personal information to a third party designated by you according to your requirements.
6.7 Constrained information system automatic decision-making
In certain business functions, we may make decisions solely based on non manual automated decision-making mechanisms such as information systems and algorithms. If these decisions significantly affect your legitimate rights and interests, you have the right to demand an explanation from us, and we will also provide appropriate remedies.
6.8 In response to your above request
To ensure safety, you may need to provide a written request or prove your identity in other ways. We may first require you to verify your identity before processing your request.
For your reasonable requests, we generally do not charge any fees, but for requests that are repeated multiple times or exceed reasonable limits, we will charge a certain cost fee depending on the situation. We may refuse requests that are unnecessarily repetitive, require excessive technical means (such as developing new systems or fundamentally changing current practices), pose risks to the legitimate rights and interests of others, or are highly impractical (such as involving information stored on backup tapes).
In the following situations, as required by laws and regulations, we will not be able to respond to your request:
6.8.1. Related to national security and defense security;
6.8.2. Related to public safety, public health, and major public interests;
6.8.3. Related to criminal investigation, prosecution, and trial;
6.8.4. There is sufficient evidence to suggest that you have subjective malice or abuse of power;
6.8.5. Responding to your request will result in serious harm to your or other individuals' or organizations' legitimate rights and interests.
7 How do we handle children's personal information
Our products, website, and services are primarily aimed at adults. Children are not allowed to create their own user accounts without the consent of their parents or guardians.
For cases where personal information of children is collected with the consent of parents, we will only use or publicly disclose this information when permitted by law, with the explicit consent of parents or guardians, or when necessary to protect the child.
Although local laws and customs define children differently, we consider anyone under the age of 14 as a child.
If we find that we have collected personal information of children without obtaining verifiable parental consent in advance, we will try to delete the relevant data as soon as possible.
8 How can your personal information be transferred globally
In principle, the personal information we collect and generate within the territory of the People's Republic of China will be stored within the territory of the People's Republic of China.
Due to our global resources and servers providing products or services, this means that with your authorized consent, your personal information may be transferred to or accessed from overseas jurisdictions in the country/region where you use the products or services.
Such jurisdictions may have different data protection laws, or even no relevant laws in place. In such cases, we will ensure that your personal information receives sufficient and equal protection within the territory of the People's Republic of China. For example, we may request your consent for cross-border transfer of personal information, or implement security measures such as data de identification before cross-border data transfer.
9 How to update this privacy policy
We may make adjustments or changes to this Privacy Policy from time to time. Any updates to this Privacy Policy will be posted on our website with a marked update time. Unless otherwise required by laws, regulations or regulatory provisions, the adjusted or changed content will take effect 7 days after notification or publication. If you continue to use any of our services or access our related websites after the adjustment or change of the privacy policy, we believe that this represents that you have fully read, understood, and accepted the revised privacy policy and are bound by it.
10 Developer name and application name
Developer Name:
Zhejiang Yiyuan Holdings Group Co., Ltd
Application Name:
Android: YIYenergy
IOS: YIYenergy