Privacy policy

If you have any questions, comments or suggestions, please contact us at the following contact information:

This policy was updated on August 01, 2023 and becomes effective upon reading and agreeing to this policy.
Email: 1759502988@qq.com
This policy will help you understand the following:
I. How we collect and use your personal information
II. How we entrust the processing, sharing, transfer and public disclosure of your personal information
Third, how we protect your personal information
IV. Your rights
V. How to update this policy
VI. How to contact us
ATIPCAM (hereinafter also referred to as "we") understands the importance of user information to you and will do our best to keep your user information secure and reliable. We are committed to maintaining your trust in us and protecting your user information by adhering to the following principles: uniformity of rights and responsibilities, clarity of purpose, choice of consent, minimum sufficiency, security, subject participation, and transparency. At the same time, we promise to take appropriate security measures to protect your user information according to the mature security standards of the industry.
Please read and understand this privacy policy carefully before using our products (or services).
In addition, you need to promise that you are an adult when you start to use this product, and if you are a minor, you need your guardian to agree to your use of this product and agree to the relevant terms of service and privacy policy.
I. How we collect and use your personal information
1、What personal information we collect about you
In order to provide basic services, the application needs to call your permissions or functions as follows to ensure the operation of the application functions:
1> Read, write or delete storage space
To read, write or delete video or screenshots saved by the device, to achieve caching of advertising material
2>Get the location information of the device
Used to implement quick connection to the device, discover nearby devices and Wi-Fi list, etc. Optimize the network connection request between SDK and push server to ensure the stability and continuity of the service; realize the function of regional push and accurate ad delivery.
3>Get mobile device information and network information
Used for third-party SDK (push, advertisement, payment) to identify unique users, ensure accurate delivery of message push, accurate advertisement placement and realize WeChat & Alipay payment function.
4>Get running process information
Used to determine whether the application is ready to start initialization of SDK, push service and ad delivery function when the application is launched
In addition, we require you to register an account, and when you register an account, we will ask you to provide personal information, such as your email address, phone number, which will be stored under your account name.
If you do not agree to invoke the above necessary permissions or functions, or do not agree to our collection and use of the above information, the Application will not function properly.
You may choose to provide us with or allow us to collect the following information at your own discretion:
Log information
When you use our services, we automatically collect certain information to write to your phone's external storage device. This information includes.
When the application generates an error or exception while using the service
When the application crashes during operation, we write error logs to external storage, which you can choose to send to us or not
This information is not necessary for the operation of the business function, but it is important for improving the quality of the service, developing new products or services, etc. We will not force you to provide such information, and your refusal will not adversely affect the use of the business function.
2、When you use the business function, our app will ask you for the following system permissions related to personal information:
(1) Take photos, videos and recordings
(2) View network connection to change network connection and full network access rights
(3) Allow to receive WLAN multicast
(4)Storage access
(5)Location access
(6)Get mobile device information, network information, modify system settings
Total 6 system permissions. If you do not authorize, we will not be able to provide the service function. In addition to the above permissions, you can choose whether to grant other system permissions to the app.

3、How we use your personal information
(1) Taking photos, videos and recordings
When the app is requested by other devices to make a video call, the data collected by the camera and microphone needs to be sent to the device
The app supports scanning QR code to add new devices that have been connected to the network and call the camera to collect data
(2) View network connections Change network connections and full network access rights
The application needs to read network information when configuring the network for the camera and provides limited account system functionality to the user
(3) Allow receiving WLAN multicast
The application can discover other cameras under the same LAN and needs to exchange data with unadded cameras through WLAN multicast implementation
(4)Storage permission
Monitoring interface for video recording, screenshots, playback and download functions
(5)Location permission
Get the list of WiFi networks in your location to achieve smart hardware devices to connect to WiFi networks of your choice; achieve push and advertising services
(6) Get mobile device information, network information, modify system settings
For third-party SDK (see "How we entrust the processing, sharing, transfer and public disclosure of your personal information"); the screen always lights up when the application watches the camera video and requires the screen to stay awake permission
Second, how we entrust the processing, sharing, transfer, public disclosure of your personal information
(1) Entrusted processing Some specific modules or functions in this business function are provided by external suppliers. For example, we may engage service providers to assist us in providing customer support. Companies, organizations and individuals to whom we entrust the processing of personal information will be subject to strict confidentiality agreements requiring them to handle personal information in accordance with our requirements, this Privacy Policy and any other relevant confidentiality and security measures.
(2) Sharing We will not share your personal information with any company, organization or individual outside of our company unless we have your express consent. Currently, we may ask you for your express consent to share personal information in the following situations:
a) We will integrate the push SDKs of major manufacturers (Huawei, Xiaomi, Meizu, OPPO, VIVO) for the implementation of message pushing.
Self-launch and associated launch instructions:
(1) In order to ensure that this application is closed or background running state right normally receive the information pushed by the client, this application must use (self-start) ability, there will be a certain frequency to send broadcast through the system to wake up the application self-start or associated start behavior, is necessary for the realization of the function and service.
(2) When you open a content-based push message, it will jump to open the relevant content after obtaining your explicit consent. In the absence of your consent, there will be no self-activation or associated activation.
(3) When you open the file downloaded from the app, it will launch the third party app.
Types of personal information collected by Push SDK:
(1) Device information: device identifier (IMEI, IDFA, Android ID, MAC, OAID and other related information), application information (application crash information, notification switch status, software list and other related information), device parameters and system information (device type, device model, operating system and hardware related information)
used to identify unique users and ensure accurate delivery of message push; optimize push channel resources, we will integrate the channel resources of message push according to the activity of different APPs on the device to improve the message delivery rate for developers; provide developers with smart tags and services to display business statistics information;
(2) Network information: IP address, WiFi information, base station information and other related information
(3) Location information
Network information and location information: optimize the network connection request between SDK and push server to ensure the stability and continuity of the service; realize the function of regional push.
Links to third-party privacy policies:
Huawei:
https://developer.huawei.com/consumer/cn/doc/development/HMSCore-Guides/sdk-data-security-0000001050042177

Xiaomi: https://dev.mi.com/console/doc/detail?pId=1822
ViVo: https://dev.vivo.com.cn/documentCenter/doc/652
OPPO: https://open.oppomobile.com/new/developmentDoc/info?id=10288
Meizu: http://open.flyme.cn/docs?id=202

b) Wearing the GromoreSDK
Purpose of use: To provide you with services to help adjust your advertising real estate strategy
Collect data type: device information: device brand, model, OS version information, system time zone, system language, device identifier (such as IMEI, AndroidID, OAID, IMSI, GAID, MEID, IDFV, IDFA, specific fields differ depending on hardware and software versions), device serial number build_serial, WiFi status, list and other basic information application information: developer application name, application package name, version number, application list and other information other information: operator information, device time zone, location information, network device hardware address (MAC address), IP address, WLAN access point (such as SSID, BSSID), base station, software version number, network access method, type, status, network quality data, operation, usage, service log, screen resolution.
Links to third-party privacy policies and GromoreSDK developer usage compliance guidelines: https://www.csjplatform.com/terms/gromoresdk-privacy and https://www.csjplatform.com/terms/GromoreSDK- compliance-guide
"In order to determine the uniqueness of the device, risk control and security, Gromore needs to obtain the hardware serial number, MAC address, unique device identifier (IMEI, OAID, AndroidID, IDFA, IDFV, UUID, Open UDID, UDID, AAID, AID, CAID, GUID) of the phone being used, AID, CAID, GUID, sim card IMSI information).
c) Penetrator SDK
Use purpose: push advertising information to users, anti-cheat
Collect data type: hardware serial number, device mac address, software list, unique device identifier (IMEI, OAID, AndroidID, IDFA, IDFV, UUID, OpenUDID, UDID, AAID, AID, CAID, GUID, IMSI, MEID, sim card IMSI information), latitude and longitude, precise location information (GPS), rough location information (wifi location), network signal strength, device power, device tilt angle and direction, device screen size, network type, carrier type, device UA, device type, OS type, OS version, device brand, device model, IP address, device crash information;

Third party privacy policy link: https://www.csjplatform.com/privacy
In order to determine the uniqueness of the device, risk control and security, "Wearing the Mountain Armor" needs to obtain the hardware serial number, MAC address of the device, unique device identification code (IMEI, OAID, AndroidID, IDFA, IDFV, UUID, Open UDID, UDID, AAID, AID, CAID, GUID, sim card IMSI information) of the phone being used, AID, CAID, GUID, sim card IMSI information).
d) Baidu Advertising SDK
Purpose of use: pushing advertising information to users, anti-cheating
Collect data type: device information: device brand, model, software system version, resolution, network signal strength, sensor information, total disk space, total system memory space, phone reboot information, phone system update time and other basic information, OAID, AndroidID (only Andriod side collection) IMEI, IMSI, MEID (only Andriod side collection); IDFA (only Andriod side collection) (collected only on iOS side) Screen width and height, screen pixel density, system version number, device manufacturer, device model, cell phone operator, cell phone network status, remaining storage space of the device, phone reboot time and update time
Link to third party privacy policy: https://union.baidu.com/bqt/#/legal/policies
e) Ubiquity SDK
Purpose of use: pushing advertising information to users, anti-cheating
Device manufacturer, brand, device model, OS version, screen resolution, screen orientation, screen DPI, IP address, time zone, network type, carrier, magnetic force, acceleration, gravity, gyroscope sensor, precise location information, OAID, IMEI, Android_ID
Third party privacy policy links: https://e.qq.com/dev/help_detail.html?cid=2005&pid=5983, https://e.qq.com/dev/help_detail.html?cid=2004&pid=5795
In order to achieve the necessary functions of this SDK product, we will embed the third party SDK in this SDK product, the information of the third party SDK is as follows:

1)MMA China Advertising Monitoring Common SDK
Type of data collected: device identification information (OAID, IMEI, Android ID, etc.), network information (connected WIFI, MAC address, etc.)
Link to third-party privacy policy: https://mmachina.cn/sdk-privacy/
2) Turing Shield Risk Identification SDK
Type of data collected: hardware serial number, network status, system settings, system attributes, device model, operating system, IP address, carrier information, identifiers such as OAID, IDFA, IDFV, etc.
The third-party developer will decide whether to collect and transmit to SDK according to the actual situation, and SDK will take the way of de-identification and encryption for processing
Link to third party privacy policy: https://privacy.qq.com/document/preview/5331f064a91a47eb93993fdacb91c8f7
f) Racer Alliance SDK
Purpose of use: pushing advertising information to users, anti-cheating
Collect data type: device information: device brand, model, software system version, resolution, network signal strength, sensor information, total disk space, total system memory space, IP address, time zone, network type, operator, OAID, AndroidID (only collected on Andriod side) IMEI, IMSI, MEID, magnetic force, acceleration, gravity, gyroscope Sensor, precise location information
Third party privacy policy links: https://u.kuaishou.com/home/help/detail/1337/1425 , https://u.kuaishou.com/home/help/detail/1337/1425
g) Huge engine data reporting SDK
Purpose of use: statistical information, pushing advertising information to users
Types of data collected: device identifiers (IMEI, IMSI, Android ID, MAC and other related information), application information (application crash information, notification switch status, software list and other related information), device parameters and system information (device type, device model, operating system and hardware related information, running process information, device external storage information, etc.), user personal information (address book, SMS, call history, camera, location and other information), which can be used to identify cell phone information for accurate targeting of people to achieve accurate advertising;
Third party privacy policy link: https://lf6-cdn-tos.bytescm.com/obj/ies-hotsoon-draft/account_center/e912e0b7-40d8-44f6-acfb-312f327d7685.html

h) WeChat Payment SDK
Purpose of use: Help users to use WeChat Pay within the application
Type of data collected: device identification information (IMEI/Mac/android ID/IDFA/OPENUDID/GUID, SIM card IMSI information), WiFi information, IP address, application list, network information, storage information
Third party privacy policy links: https://privacy.qq.com/policy/tencent-privacypolicy & https://posts.tenpay.com/posts/18ed0968618e3db204d4931651708953.html
I) Alipay Payment SDK
Purpose of use: users use Alipay within the app
Type of data collected: device identification information (IMEI/Mac/android ID/IDFA/OPENUDID/GUID, SIM card IMSI information), WiFi information, IP address, application list, network information, storage information
Third party privacy policy link: https://opendocs.alipay.com/open/54/01g6qm
(3) Transfer
We will not transfer your personal information to any company, organization or individual, except for the following:
a) Transfer with express consent: we will transfer your personal information to other parties after obtaining your express consent;
b) In the event of a merger, acquisition or bankruptcy and liquidation involving the transfer of personal information, we will require the new company or organization holding your personal information to continue to be bound by this privacy policy before we require that company or organization to seek your authorized consent again.
(4) Public Disclosure
We will only disclose your personal information publicly if
a) With your express consent;

b) Disclosure based on law: We may disclose your personal information publicly if compelled to do so by law, legal process, litigation or governmental authority.

C. How we protect your personal information
(a) We have used security measures that meet industry standards to protect the personal information you provide against unauthorized access, public disclosure, use, modification, damage or loss of data. We will take all reasonably practicable measures to protect your personal information. For example
1. Information retention period
(1) We will keep your personal information for the duration of your use of our platform services.
(2) When you voluntarily delete your personal information or cancel your account, we will retain your existing personal information for the minimum period required by law or regulation, and we will not use your personal information commercially within the minimum retention period required by law or regulation. When your personal information exceeds the above retention period, we will anonymize it.
a) In order to cooperate with the people's procuratorate, public security organs, and state security organs to investigate criminal acts arising from the use of our platform services, and to better protect the lives and property of other users, when users delete personal information or cancel their accounts on their own, we will encrypt and isolate the personal information of users within the period of the statute of limitations for crimes under criminal law.

b) If you use our platform services, there are serious violations of laws and regulations, platform agreements, platform rules and other circumstances, your illegal, non-compliance records and the corresponding platform credit records, will be permanently stored.
2. Information storage area
(1)The personal information we collect from you will be stored and used in Mainland China.
(2) There is currently no scenario where our platform provides personal information to outside of China. In case of future transfer of personal information outside of China, we will clearly inform you of the purpose, recipient, security measures, etc. of the departure of personal information and obtain your consent separately.
3. Safety protection measures
(1) This application will adopt a strict security system and industry-standard security technologies and procedures to ensure that your personal information is not lost, leaked, destroyed, or accessed or used without authorization.
(2)Our platform takes the following security technical measures to protect your personal information:
a) Users' personal information is stored encrypted in servers and stored through data isolation technology.
b) Encrypted transmission protocol is used during data transmission.
c) Strictly control data access rights and set up a perfect application and approval system for sensitive data access rights.
d) Establish a data security monitoring and auditing system and conduct comprehensive data security control.

4. Security incident disposal
(1) In order to deal with possible security risks such as leakage, destruction and loss of personal information, the company has promulgated a number of systems to clarify the classification and grading standards for security incidents and security vulnerabilities, as well as internal handling processes (including emergency response processes) and remedial measures for the above security incidents and vulnerabilities.
(2) In the event of a security incident, we will promptly inform you of the basic situation and risks of the incident, the measures we have taken or will take, and suggestions on how you can reduce the risks yourself.
(3) We will promptly notify affected users of the security incident by push notification, letter or phone call. When it is difficult to inform users one by one, we will issue warning information by way of publishing platform announcements.
5. Discontinuation of operation
(1) If our platform ceases operation, we will post an announcement on our platform at least 30 days in advance and stop collecting personal information in a timely manner.
(2) After the cessation of operation, we will stop the commercial use of personal information and anonymize the collected personal information after meeting the minimum retention period stipulated by laws and regulations.
(2) We will take all reasonable and feasible measures to ensure that no unrelated personal information is collected. We will only retain your personal information for as long as necessary to achieve the purposes described in this policy, unless an extended retention period is required or permitted by law.
(c) We will regularly update and disclose the relevant contents of reports on security risks, personal information security impact assessment, etc.

(d) The Internet environment is not 100% secure and we will endeavor to ensure or warrant the security of any information you send to us.
(e) In the unfortunate event of a personal information security incident, we will, in accordance with the requirements of laws and regulations, promptly inform you of: the basic situation of the security incident and its possible impact, the disposal measures we have taken or will take, the recommendations you can independently prevent and reduce the risk, and the remedial measures for you. We will promptly inform you of the event-related situation by email, letter, telephone, push notification, etc. When it is difficult to inform the subject of personal information one by one, we will take a reasonable and effective way to issue an announcement.
At the same time, we will also take the initiative to report the disposition of personal information security incidents in accordance with the requirements of regulatory authorities.

IV. Your rights
In accordance with the relevant Chinese laws, regulations and standards, as well as the prevailing practices in other countries and regions, we protect your right to exercise the following rights in relation to your personal information:
(i) Access to your personal information
You have the right to access your personal information, except for the exceptions provided by law and regulations. You can access your personal information through the following means: 1759502988@qq.com
We will respond to your request for access within 15 days.
For other personal information generated in the course of your use of our products or services, we will provide it to you as long as we do not require excessive input. If you wish to exercise your right of data access, you may access your personal information by: 1759502988@qq.com
(ii) Correction of your personal information
When you discover an error in the personal information we have processed about you, you have the right to request that we make a correction. You can request a correction by using the methods listed under "(a) Access to your personal information" and we will respond to your request for correction within 15 days.
(iii) Deletion of your personal information
You may make a request to us to delete your personal information in the following circumstances:
1、If our handling of personal information violates laws and regulations;
2、If we collect or use your personal information without your consent;
3, if our handling of personal information is in breach of our agreement with you;
4. if you no longer use our products or services
5. if we no longer provide products or services to you.
If we decide to respond to your request for deletion, we will also simultaneously notify the entities from which we obtained your personal information to request its prompt deletion, unless otherwise required by law or regulation, or if these entities have your independent authorization.
When you delete information from our services, we may not immediately delete the corresponding information from our backup systems, but will delete it when the backup is updated.
(iv) Changing the scope of your authorised consent
Each business function requires some basic personal information in order to be completed. You may give or withdraw your authorisation or consent at any time for the collection and use of additional personal information collected.
You can change your authorisation or consent at 1759502988@qq.com.但您收回同意的决定 in a way that does not affect the processing of personal information previously carried out on the basis of your authorisation.
(v) Binding information systems to automated decision-making

In some business functions, we may make decisions based solely on non-manual automated decision-making mechanisms, including information systems, algorithms and the like. If these decisions significantly affect your legitimate interests, you have the right to seek an explanation from us and we will provide appropriate remedies.

(vi) Cancellation of accounts by personal information subjects
You can cancel your previously registered account at any time by yourself in the following ways:
When you are logged in, click on "My Account - Cancel User" in the sidebar to cancel your account, if you have any questions, please contact us at 1759502988@qq.com
After canceling your account, we will stop providing you with products or services and delete your personal information upon your request, unless otherwise provided by law or regulation.
(vii) Personal information subject to obtain a copy of personal information
You have the right to obtain a copy of your personal information, which you can do yourself by contacting us at 1759502988@qq.com
Subject to technical feasibility, we may also transfer a copy of your personal information directly to a third party designated by you at your request, if the data interface has been matched.

(viii) Responding to your request above
For security purposes, you may be required to provide a written request or otherwise prove your identity. We may ask you to verify your identity before processing your request. We will respond within 15 days. If you are not satisfied, you can also complain by contacting us at 1759502988@qq.com

In principle, we do not charge a fee for reasonable requests, but we will charge a cost fee for repeated requests that exceed reasonable limits, as appropriate. We may refuse requests that are unnecessarily repetitive, require excessive technical means (e.g. requiring the development of new systems or fundamental changes to current practice), pose a risk to the legal rights of others or are highly impractical (e.g. involving the backing up of information stored on tapes).
We will not be able to respond to your request in the following cases:
1. in connection with the performance of obligations imposed by law or regulation on the controller of personal information
2. directly related to national security or defence security
3. directly related to public safety, public health, or vital public interests
4, directly related to criminal investigation, prosecution, trial and execution of judgments, etc;
5. where the controller of personal information has sufficient evidence of subjective malice or abuse of rights by the subject of personal information
6. where it is necessary to defend the life, property and other significant legitimate rights and interests of the subject of personal information or other individuals but where it is difficult to obtain the consent of the person
7. where responding to the request of the subject of personal information would result in serious damage to the legitimate rights and interests of the subject of personal information or other individuals or organizations; where commercial secrets are involved.
V. How this policy is updated
Our privacy policy is subject to change.
We will not reduce your rights under this privacy policy without your express consent. We will post any changes to this policy on this page.
For material changes, we will also provide more prominent notice (including, for certain services, email notice of specific changes to our privacy policy).
Material changes within the meaning of this policy include, but are not limited to:
1. a material change in our service model. such as the purposes for which personal information is processed, the types of personal information processed, how personal information is used, etc;
2. Significant changes in our ownership structure, organizational structure, etc. such as change of ownership caused by business restructuring, bankruptcy and merger, etc;
3、Change in the main recipients of personal information sharing, transfer or public disclosure;
4、Significant changes in your rights to participate in the handling of personal information and the manner in which they are exercised;
5、Our department responsible for handling personal information security, contact information and complaints
6、When the personal information security impact assessment report indicates that there is a high risk.
VI. How to contact us
If you have any questions, comments or suggestions about this privacy policy, or if you have any questions about our collection, use or disclosure of your personal information, please contact us. Customer service email: 1759502988@qq.com
We will normally respond within 15 days.
This policy shall be interpreted and governed in accordance with the laws of the People's Republic of China, and any dispute of any kind between you and us shall be settled by amicable negotiation. If consultation fails, either party shall have the right to submit the dispute to the people's court with jurisdiction where Shenzhen Yudun Security Technology Co.