Privacy Policy

 

Publisher:Pylon Technologies Co., Ltd

Update date:2022-08-17

Effective Date:2022-08-17

Prompt terms

Pylontech Home(Hereinafter referred to as "App")Knowing the importance of personal information to you and your trust is very important to us, we will protect your personal information and privacy security in accordance with laws and regulations and with reference to industry best practices. We have formulated the "Privacy Policy" of this App and specially reminded: We hope that you will read and understand this Privacy Policy carefully before using the relevant services in order to make appropriate choices.

This Privacy Policy will help you understand that we will collect and use your information in accordance with the Privacy Policy, but will not collect personal information in a mandatory bundle just because you agree to this Privacy Policy. When you use or enable relevant functions or use services, we will collect and use relevant information necessary to achieve functions and services. Unless it is necessary information to achieve business functions or according to laws and regulations, you can refuse to provide it without affecting other functions or services. We will itemize the information we collect in our Privacy Policy.

When you use our products or services, we need to comply with the relevant requirements of laws and regulations Collect, store, use, share With your information, as well as providing you with services and improving the quality of services, we hope to explain to you through this policy: what data we collect when you use our products or services, why we collect this data, what we use this data for, and how we protect this data. This policy is closely related to our products or services you use, and is essential for you to exercise your user rights and protect your user information.Please Read carefully and fully understand the content of this policy before using our products or services.

Important content of the terms and conditions related to your personal information rights and interests has been highlighted in bold, please pay special attention.

1.How We Collect and Use Personal Information

2.How We Use Cookies and Similar Technologies

3.Third parties involved in the use of data, as well as the transfer or disclosure of personal information

4.How We Store Personal Information

5.How we keep personal information secure

6.How We Manage Personal Information

7.Protection of information on minors

8.Updates and Notices to the Privacy Policy

9.Contact

1、How We Collect and Use Personal Information

We will collect information that you voluntarily provide when you use the Services and collect information generated during your use of functions or receipt of Services through automated means:

1.1 Register, Login
1.2 Password recovery
1.3 Information display
1.3.1 Log information for information display includes:
1.3.2 Data analysis

We will de-identify the information collected and used above, and the data analysis will only correspond to a specific code that cannot be directly associated with your identity, and will not be associated with your real identity.

1.4 User Feedback and Services
1.5 Operational and security assurance
1.6 Change of the purpose of collecting and using personal information

Please understand that with the development of our business, the functions of the App and the services provided may be adjusted and changed. In principle, when a new function or service is related to the function or service we currently provide, the personal information collected and used will be directly or reasonably related to the original processing purpose. In scenarios that are not directly or reasonably related to the original processing purpose, we will collect and use your personal information, and will inform you again in accordance with the requirements of laws, regulations and national standards through page prompts, interactive processes, and agreement confirmation, and obtain your consent.

1.7 Device permission call

To ensure the normal implementation of relevant business functions, we need to call the necessary permissions according to the specific usage scenario, and ask you in a pop-up window before calling.

You can choose to disable some or all of the permissions in the settings of the device, which may cause the corresponding business functions to be unable to be implemented or achieve the expected results.

1.8 Third-party SDK catalog

2.How We Use Cookies and Similar Technologies

Similar technologies such as cookies and device information identification are commonly used on the Internet. When you use the App and related services, we may use relevant technologies to send one or more cookies or anonymous identifiers to your device to collect, identify and store information when you access and use this product. We promise not to use cookies for any purpose other than those described in this Privacy Policy. We use cookies and similar technologies primarily to enable the following functions or services:

2.1 Ensure the safe and efficient operation of products and services

We might Set up authentication and security cookies or anonymous identifiers to confirm that you are securely logged into the Services or have experienced theft, fraud, and other illegal activities.These technologies also help us improve service efficiency, login and responsiveness.

2.2 Helps you have an easier access experience
2.3 Clearance of cookies

Most browsers provide users with the ability to clear browser cache data,You can perform the corresponding data cleaning operation in the browser settings function. If you do so, because of these modifications, you may not be able to use the services or corresponding functions provided by the Company relying on cookies.

3.Third parties involved in the use of data, as well as the transfer or disclosure of personal information

3.1 Partners involved in the use of data
3.1.1 principle
3.1.2 Delegated processing

Some specific modules or functions in this business function are provided by external vendors. For example, we engage service providers to assist us in providing customer support.

For companies, organizations and individuals entrusted to process personal information, we will sign strict confidentiality agreements with them, requiring them to process personal information in accordance with our requirements, this Privacy Policy and any other relevant confidentiality and security measures.

3.1.3 share

We will not share your personal information with any company, organization or individual other than the company unless we obtain your explicit consent.

Unless otherwise required by laws, regulations and regulatory authorities, we only share your information with third parties in security and analytical statistics. If it is necessary to share your information with a third party in order to provide you with services, we will evaluate the legality, legitimacy and necessity of the third party's collection of information. We will require third parties to take protective measures for your information and strictly comply with relevant laws, regulations and regulatory requirements.

We may share your personal information externally in accordance with laws and regulations, or in accordance with the mandatory requirements of government authorities.

3.1.4 Scope of Partners If the specific functions and scenarios involve services provided by our affiliates and third parties, the scope of partners includes our affiliates and third parties.
3.1.5 Implement security and analytics statistics to provide information
3.2 Transfer

We will not transfer your personal information to any company, organization or individual, except in the following circumstances:

3.3 Openly

We will not disclose your personal information unless we comply with national laws and regulations or obtain your consent. We will disclose your personal information Adopt industry-compliant security safeguards.

4.How We Store Personal Information

4.1 Storage location

In accordance with laws and regulations, we store your personal information collected and generated in the course of domestic operations in the People's Republic of China. If we transfer overseas, we will strictly abide by the relevant laws and regulatory policies of China, and will comply with relevant national regulations or seek your consent.

4.2 Storage period

We are only in Retain your personal information for the period necessary for the purpose of providing the App and Services,For example:

If you cancel your account, actively delete personal information or exceed the necessary period, we will treat your personal information for deletion or anonymization,However, the following exceptions apply:

5.How we keep personal information secure

5.1 We take the security of your personal information very seriously

We will endeavor to take reasonable security measures (including technical and administrative) to protect your personal information from improper use or unauthorized access, public disclosure, use, modification, damage, loss or leakage.

5.2 We will use no less than industry-friendly security technology

As Encryption technology, anonymization and related reasonable and feasible means Protect your personal information and use security mechanisms to prevent malicious attacks on your personal information.

5.3 We will establish a special security department, security management system, and data security process to ensure the security of your personal information

We Adopt strict data use and access regimes,Ensure that only authorized personnel have access to your personal information, and conduct security audits of data and technology in a timely manner.

However, please understand that due to technical limitations and various malicious means that may exist, in the Internet industry, even if we do our best to strengthen security measures, it is impossible to always guarantee 100% security of information, and we will try our best to ensure the security of the personal information you provide to us.

5.5 You acknowledge and understand that the system and communication network you use to access our services may have problems due to factors beyond our control

Therefore, we highly recommend you Take active measures to protect the security of personal information, including but not limited to using complex passwords, changing passwords regularly, and not disclosing your account password and related personal information to others.

5.6 We will formulate an emergency response plan and immediately activate the emergency plan in the event of a user information security incident

Work to prevent the impact and consequences of these security incidents from spreading. Once a user information security incident (leakage or loss) occurs, we will promptly inform you of the basic situation and possible impact of the security incident in accordance with the requirements of laws and regulations, the disposal measures we have taken or will take, suggestions that you can independently prevent and reduce risks, and remedial measures for you. We will promptly inform you of the relevant circumstances of the incident in push notifications, emails, letters, SMS and related forms, and when it is difficult to inform you one by one, we will issue an announcement in a reasonable and effective manner. At the same time, we will also report the handling of user information security incidents in accordance with the requirements of relevant regulatory authorities.

6.How We Manage Personal Information

We attach great importance to your management of personal information and do our best Fully protect your personal information access, copy, correct, supplement, delete, withdraw consent authorization, cancel account, complaints and reports,To enable you to have the ability to protect your privacy and information security. In order to optimize your experience, we may also adjust the operation settings, so the following guidelines are for reference only.

6.1 You can inquire and correct your personal information through the App, under "My → Account"
6.2 Manage your entitlement scope

If you want to change the authorization scope, you can modify the authorization scope through the mobile phone permission settings. For example, you can turn off identification permissions such as geolocation services, cameras (cameras), storage, etc., change the scope of consent or withdraw your authorization in the operating system of the device itself. When authorization is turned off, we will no longer collect information related to these permissions.

Specific business functions and services will require your information to be completed, and after you withdraw your consent or authorization, we cannot continue to provide you with the functions and services corresponding to the withdrawal of consent or authorization, and will no longer process your corresponding personal information. However, your decision to withdraw your consent or authorization will not affect the company's previous processing of personal information based on your authorization.

6.3 In the following cases, you can request us to delete your personal information

Deletion of personal information: refers to the act of removing personal information from systems involved in the realization of daily business functions, so that it remains unrecoverable or accessible. After you or we assist you in deleting the relevant information,Due to applicable laws and security technology limitations, we may not be able to immediately delete the corresponding information from the backup system, and we will securely store your personal information and restrict any further processing of it until the backup can be erased or anonymized.

6.4 Notwithstanding the above agreements, in accordance with relevant laws, regulations and national standards, we may not be able to respond to your request under the following circumstances:

7. Protection of information on minors

7.1 Principles for the Protection of Personal Information of Minors

We attach great importance to the protection of minors' personal information. App Mainly for adults.if You are a minor under the age of 18, and you should read and agree to this Privacy Policy under the supervision and guidance of your parents or other guardians before using this product. If you are the guardian of a minor under the age of 16, you should read and agree to this Privacy Policy for your ward before using the App and related services.

7.2 We protect the personal information of minors in accordance with relevant national laws and regulations

Collect, use or disclose the personal information of minors only as permitted by law, with the explicit consent of parents or other guardians, or as necessary to protect minors; If we discover that the personal information of a minor has been collected without the prior consent of a verifiable guardian, we will try to delete the relevant information as soon as possible.

7.3 If you are the guardian of a minor

When you have other questions about the personal information of the minors under your guardianship, please contact us through the contact information published in the company's privacy policy.

8. Updates and Notices to the Privacy Policy

We will make changes to this Privacy Policy from time to time that form part of this Privacy Policy and have the same effect as this Privacy Policy, and we will not reduce your rights under this Privacy Policy in effect without your express consent.

8.2 When this Privacy Policy is updated, we will send an updated version in the App

Before the updated Terms take effect Remind you of the updated content through official website announcements or other appropriate means so that you can keep abreast of the latest version of this Privacy Policy.

9. Contact

9.1 App Provided by Pylon Technologies Co., Ltd

If you have complaints, suggestions, or questions about personal information protection issues, you can send them to (sys.account@pylontech.com.cn),We verify and verify your user identity and respond to your complaints and reports within 15 days.

9.2 If you have any questions, comments or suggestions about the content of this Privacy Policy

You can contact us through the "Feedback" page of the My Menu item in the App client.