Privacy Policy
       Our app recognizes the importance of personal information and is committed to ensuring its security and reliability. We strive to maintain your trust and adhere to the following principles to protect your personal information: principle of responsibility, purpose limitation principle, choice and consent principle, data minimization principle, security assurance principle, user participation principle, and transparency principle. Additionally, we promise to follow industry-standard security measures to protect your personal information. Please read and understand this Privacy Policy before using our products (or services).
       The product is developed based on DCloud uni-app (5+ App/Wap2App). During application runtime, we need to collect your device's unique identifier (IMEI/Android ID/DEVICE_ID/IDFA, SIM card IMSI information, OAID) to provide statistical analysis services and improve performance and user experience through application launch data and error logs analysis. For detailed information, please visit the DCloud User Service Terms.
1. Information We Collect and How We Use It
       Personal information refers to various data recorded electronically or otherwise that can identify a specific individual or reflect their activities. The personal information involved in this policy includes: basic information (such as phone number, email address); personal location information; network identity information (including system accounts, IP addresses, phone numbers, email addresses, and related passwords and security codes); and common device information (including hardware model, device MAC address, operating system type, software list, and unique device identifiers such as IMEI/Android ID/IDFA/OPENUDID/GUID, SIM card IMSI information).
       Sensitive personal information is data that, if leaked or altered, could have a negative impact on the individual's reputation, physical or mental health, or lead to discriminatory treatment. The sensitive personal information involved in this policy includes: network identity information (such as username, nickname, phone number, email address, and related passwords); and other information (such as personal phone numbers, mobile numbers, and precise location information).
2. Situations Where You Must Authorize Us to Collect and Use Your Personal Information
       Our products or services include core functions that may require us to collect, store, and use information related to you to realize these functions. If you do not provide the relevant information, you will not be able to enjoy our products and services. These functions include:
       Customer Service Functions: If you contact our customer service, we may need you to provide necessary personal information for identity verification to ensure the security of your account. To address your requests, with your authorization, customer service personnel may need to query or verify your relevant information within the scope of your authorization. We will take technical and management measures to ensure the security of your information and use it only as necessary. We may retain your contact information (phone number or other contact details you use or provide), your communication records and content with us, and other necessary information to provide and record customer service.
       Security Assurance Functions: To enhance the security of your use of our products and services, protect your or other users' personal and property safety from harm, better prevent phishing websites, fraud, network vulnerabilities, computer viruses, and other security risks, and accurately identify violations of laws and regulations, we may collect, use, or integrate your account information, transaction information, and device information to comprehensively assess your account and transaction risks, perform identity verification, detect and prevent security incidents, and take necessary recording, auditing, analyzing, and handling measures in accordance with the law.
3. Situations in which we collect and use personal information without obtaining your consent:
1.Related to national security and defense security;
2.Related to public safety, public health, and major public interests;
3.Related to criminal investigation, prosecution, trial, and execution of judgments;
4.Necessary for protecting the life, property, or other major legitimate rights and interests of the personal information subject or other individuals where obtaining consent is difficult;
5.The personal information collected is publicly disclosed by the personal information subject;
6.Collected from legally publicly disclosed information, such as legal news reports, government information disclosures, etc.;
7.Necessary for the performance of contracts as requested by you;
8.Necessary for maintaining the security and stable operation of our products and/or services, such as identifying and handling faults in our products and/or services;
9.Necessary for legitimate news reporting;
10.Necessary for academic research institutions to conduct statistical or academic research based on public interest, and when providing academic research or descriptions of results, the personal information included in the results is anonymized;
11.Other situations stipulated by laws and regulations.
4. How we use Cookies and similar technologies
1.Cookies
       Cookies are mechanisms that support the storage and retrieval of information on a website or software from the server side (or scripts). When you use our products or services, we send a data file known as a Cookie to your computer or mobile device. The Cookie assigned to you is unique and can only be read by the web server that issued it. Cookies usually contain identifiers, site names, and some numbers and characters. We use Cookie technology to simplify repeated logins, store your browsing preferences or items in your shopping cart, provide shopping preferences, optimize ad selection and interaction, assess your login status, and ensure the security of accounts and data. We commit to using Cookie information solely to enhance service/product quality and optimize user experience. We will not use Cookies for purposes beyond those described in this policy. You can manage or delete Cookies according to your preferences. You can clear all Cookies stored on your computer. Most web browsers automatically accept Cookies, but you can typically modify your browser settings to reject Cookies if you prefer. Additionally, you can clear all Cookies stored in software memory. However, doing so may require you to manually adjust user settings each time you visit our website or use our software, and certain services may not function properly, potentially affecting the security of the services you use.
2.Website Beacons and Pixel Tags
       In addition to Cookies, we also use website beacons and pixel tags on our websites. For example, emails we send may contain URLs linking to our website content. If you click on such links, we can track this click to help us understand your product or service preferences and improve customer service. Website beacons are typically transparent images embedded in websites or emails. With pixel tags in emails, we can determine if the email has been opened. If you do not wish your activities to be tracked in this manner, you may unsubscribe from our mailing list at any time.
5. How we protect and store your personal information
1.Protection and Security Measures
       We make every reasonable effort to protect the personal information we collect from you, with dedicated data security teams in place. To prevent unauthorized access, copying, modification, transmission, loss, destruction, processing, or use of personal information, we have implemented the following measures:
1.1 Our network services use secure transmission protocols and encryption technologies, such as HTTPS, to ensure data security during transmission.
1.2 User personal information is encrypted during storage and isolated using separation techniques.
1.3 When using personal information, such as displaying or associating it, we employ data anonymization techniques like content replacement and encryption.
1.4 We have strict data usage and access policies, using rigorous access controls and multi-factor authentication to protect personal information and prevent misuse. Only authorized personnel can access personal information and are required to maintain confidentiality.
1.5 Specialized data and technology security audits, including log and behavior audits, are conducted.
2.Additional Security Measures
2.1 We manage personal information storage and usage through data classification, security management norms, and development standards.
2.2 We have established a dedicated information protection department and a data security emergency response organization to promote and ensure personal information security.
2.3 We enhance security awareness by providing training courses on security and privacy protection to employees, emphasizing the importance of personal information protection.
3.Despite taking the above reasonable and effective measures and complying with relevant legal standards, we cannot guarantee the security of personal information transmitted through insecure channels. Therefore, you should take proactive measures to ensure your personal information's security, such as setting complex passwords, regularly changing your account passwords, and not disclosing your account information to others.
4.The risk of information leakage exists in the online environment. If information leakage occurs due to unforeseen events or force majeure, we will make every effort to control the situation, promptly inform you of the incident's cause, the security measures we have taken, and the actions you can take to protect yourself.
5.In the event of a personal information security incident, we will notify you in accordance with legal requirements: the basic situation and possible impacts of the security incident, the measures we have taken or will take, suggestions for self-protection and risk reduction, and any remedial measures. We will notify you via email, letter, phone, push notifications, or other methods. If it is difficult to notify each individual, we will publish a reasonable and effective announcement. We will also report the incident to the relevant authorities as required by law.
6.Storage of Your Personal Information
       We will store user personal information collected within China domestically, as required by law. If there is a need to transmit your personal information abroad, we will clearly inform you and obtain your consent.
       During your use of our products or services, we will continue to store your personal information. If you cancel your account or actively delete personal information, we will continue to store your information for up to 6 months after account cancellation or deletion, in accordance with cybersecurity laws and regulations.
6. How We Share, Transfer, and Publicly Disclose Your Personal Information
Sharing
1.We will not share your personal information with any company, organization, or individual outside of Micronet except in the following cases:
1.1 Micronet has obtained your explicit authorization or consent;
1.2 In accordance with applicable laws, legal procedures, or as required by judicial or administrative authorities based on legal procedures;
1.3 When Micronet needs to initiate litigation or arbitration to protect its legitimate rights and interests;
1.4 As stipulated in relevant service agreements or usage rules between you and Micronet;
1.5 Within the scope permitted by laws and regulations, to protect Micronet and its affiliates, Micronet users, and the public interest from harm;
1.6 In accordance with agreements between you and other third parties;
1.7 For academic research purposes.
2.Additionally, we may share your order information, account information, and device information with partners and other third parties to ensure the smooth completion of the services we provide to you. We will only share your personal information for legitimate, necessary, specific, and explicit purposes, and only share the information necessary for providing the service. Our partners are not authorized to use the shared personal information for any other purposes. Currently, our partners include suppliers of goods or technology services. We may share your personal information with third parties that support our functions, such as suppliers of infrastructure technology services, logistics services, payment services, data processing, etc. For example, we need to share your order information with logistics service providers to arrange delivery, or share your order number and amount with third-party payment institutions to confirm and complete the payment. Similarly, if you order value-added services from us, we need to share your order information or contact details with value-added service providers to provide the corresponding services.
3.You may choose to share your video, location information, identity information, etc., with specific individuals, or with unspecified individuals based on our products and/or services. Micronet is not responsible for any legal liabilities resulting from information leakage due to your sharing actions.
4.Regarding third-party SDK service providers: To ensure the implementation and stable operation of Micronet’s functions, we may integrate software development kits (SDKs) or similar applications provided by third parties. We conduct strict security evaluations of the SDKs or similar applications used by our partners to protect your personal information. If you find any risks with these SDKs or similar applications, we recommend that you immediately terminate the relevant operations and contact us promptly. Detailed information about SDKs is provided in the appendix of this policy.
Transfer
       We will not transfer your personal information to any company, organization, or individual except in the following cases:
1.Transfer with explicit consent: We will transfer your personal information to other parties after obtaining your explicit consent;
2.In the event of a merger, acquisition, or bankruptcy liquidation, if personal information transfer is involved, we will require the new entity holding your personal information to continue to abide by this privacy policy, otherwise, we will require the new entity to seek your authorization again.
Public Disclosure
       We will only publicly disclose your personal information in the following cases:
1.After obtaining your explicit consent;
2.Based on legal disclosures: We may publicly disclose your personal information in accordance with laws, legal procedures, litigation, dispute resolution, or mandatory requirements of government authorities;
3.Entrusted Processing;
4.If we entrust a third party to process your personal information, we will agree with the trustee on the purpose, duration, processing methods, types of personal information, protection measures, and the rights and obligations of both parties, and supervise the trustee’s personal information processing activities.
7. Your Rights
       In accordance with relevant Chinese laws, regulations, standards, and common practices in other countries and regions, we ensure that you can exercise the following rights concerning your personal information:
       Access or Correct Your Personal Information: You have the right to access your personal information, except as required by law. If you wish to exercise data access rights, you can access:
       Your account information: You can review all personal information you have submitted to Micronet on the "My" > "Account Settings" page, and you may update your personal information through the same method.
       Personal information that you cannot access or correct: Beyond the information listed above, there is some personal information that we cannot provide access to or correction services for, primarily to enhance your user experience and ensure transaction security, such as device information and information generated when using additional features. This information is used within the scope of your authorization, but if you wish, you may contact us for deletion or anonymization.
       Delete Your Personal Information: You can request the deletion of your personal information in the following circumstances:
a. If our processing of personal information violates laws and regulations;
b. If we collect or use your personal information without your consent;
c. If our processing of personal information violates agreements with you;
d. If you cancel your Micronet account;
e. If we terminate services and operations.
       If we decide to comply with your deletion request, we will also notify entities from whom we obtained your personal information to delete it unless required otherwise by law, or if these entities have obtained your independent authorization.
       After you delete information from our services, we may not immediately delete the corresponding information in backup systems, but we will remove this information when updating backups.
       Change or Withdraw Your Authorization: You can change the scope of authorization or withdraw your authorization by deleting information, disabling device functions, or adjusting privacy settings in the app. Please understand that some basic personal information is necessary to complete certain business functions. When you withdraw consent or authorization, we will no longer provide the corresponding services and will cease processing the relevant personal information. However, withdrawing consent or authorization does not affect the processing of personal information based on your authorization before such withdrawal.
       Respond to Your Requests: If you cannot access, correct, or delete your personal information through the above methods, or if you need access, correction, or deletion of other personal information generated while using our products and/or services, or if you believe Micronet is in violation of laws or agreements related to your personal information collection or use, you can send an email to [after-sale@micronet.ltd] or contact us using other methods specified in this policy. For security reasons, we may require you to provide a written request or other methods to verify your identity, and we will respond to your request within 15 days of receiving and verifying your identity.
       We generally do not charge fees for reasonable requests, but may charge a fee for repeated or excessive requests based on the situation. We may refuse requests that are unreasonable, require excessive technical measures (such as developing new systems or fundamentally changing existing practices), pose risks to the legitimate rights of others, or are impractical (such as information stored on backup tapes). We will not be able to respond to requests in the following cases as required by law:
a. Related to national security or defense;
b. Related to public safety, public health, or major public interests;
c. Related to criminal investigations, prosecutions, trials, and enforcement of judgments;
d. Where there is sufficient evidence indicating malicious intent or abuse of rights;
e. Responding to the request would seriously harm the legal rights of you or other individuals or organizations;
f. Involving trade secrets.
8. Handling Minors' Personal Information
1.We attach great importance to the protection of minors' personal information. If you are under 18 years old, you should obtain written consent from your parents or legal guardians before using our products and/or services. We protect minors' personal information in accordance with relevant national laws and regulations.
2.For situations where we collect minors' personal information with the consent of their parents or legal guardians, we will only use or disclose this information when legally permitted, with explicit consent from parents or legal guardians, or when necessary to protect minors.
3.If we find that we have collected minors' personal information without prior verifiable consent from parents or legal guardians, we will make efforts to delete the relevant data as soon as possible.
9. Device Permission Usage Guidelines
Essential Functions for Managing and Controlling Routers
1.Upgrade Services
       Product Software Upgrade: We collect your mobile device's country code information to notify you of new product software updates and provide a better user experience.
       App Software Upgrade: We collect data on your mobile device’s software installation list, app versions, regional and language settings to notify you of new app software updates and enhance your user experience.
2.Device Management
       We collect your mobile device’s location information, MAC address, IP address, and the SSID of the WiFi network to ensure you can manage your device correctly. This helps in verifying if your device is connected to the managed WiFi and prevents accidental blacklisting of your device.
3.Router Settings
       When you access router settings (e.g., wireless settings, internet settings, LAN settings, signal strength features), it may cause temporary WiFi disconnection on your mobile device. To facilitate automatic reconnection, we collect your mobile device’s location information for an improved user experience.
4.Regional Services
       When using our products or services, we collect your mobile device’s country code, time zone, and language information to determine your location. This ensures that location-specific functionalities are properly provided and that services related to time are correctly functioning.
5.Notification Services
       When enabling notification services, we collect your mobile device’s unique identifier (IMEI/Android ID) to push notifications to your device. If you do not wish to receive notifications, you can disable this feature in "Personal Center - Notification Alerts."
Ensuring Wi-Fi Security
       To enhance system security and prevent unauthorized access, we collect your Environmental Characteristic Value (ECV) to verify user identity.
10. Policy Revisions
       We may revise this policy periodically. We will not reduce your rights under this policy without your explicit consent. Changes to this policy will be posted on this page. For significant changes, we will notify you via push notifications, pop-ups, or emails. Significant changes include but are not limited to:Major changes in our service model, such as purposes, types, or methods of personal data processing.
1.Major changes in ownership or organizational structure, such as business adjustments or acquisitions.
2.Changes in the main parties involved in personal information sharing, transfer, or public disclosure.
3.Significant changes in your rights or methods of participation in personal information processing.
4.Changes in the department responsible for personal information security, contact information, or complaint channels.
5.High-risk findings in personal information security impact assessments.
11. Contact Us
       For questions, feedback, or concerns about this policy or your personal information, please email us at [after-sale@micronet.ltd]. Our dedicated Personal Information Protection Officer can be contacted through this email as well, and we generally respond within 15 days. If unsatisfied with our response, especially if our handling of personal information harms your rights, you may also file complaints with regulatory authorities such as the Internet Information Office, telecommunications, public security, or commerce departments.