Privacy Policy
Our app recognizes the importance of personal information and is
committed to ensuring its security and reliability. We strive to maintain your trust and adhere to the following
principles to protect your personal information: principle of responsibility, purpose limitation principle, choice
and consent principle, data minimization principle, security assurance principle, user participation principle,
and transparency principle. Additionally, we promise to follow industry-standard security measures to protect your
personal information. Please read and understand this Privacy Policy before using our products (or services).
The product is developed based on DCloud uni-app (5+ App/Wap2App).
During application runtime, we need to collect your device's unique identifier (IMEI/Android ID/DEVICE_ID/IDFA,
SIM card IMSI information, OAID) to provide statistical analysis services and improve performance and user
experience through application launch data and error logs analysis. For detailed information, please visit the
DCloud User Service Terms.
1. Information We Collect and How We Use It
Personal information refers to various data recorded
electronically or otherwise that can identify a specific individual or reflect their activities. The personal
information involved in this policy includes: basic information (such as phone number, email address); personal
location information; network identity information (including system accounts, IP addresses, phone numbers, email
addresses, and related passwords and security codes); and common device information (including hardware model,
device MAC address, operating system type, software list, and unique device identifiers such as IMEI/Android
ID/IDFA/OPENUDID/GUID, SIM card IMSI information).
Sensitive personal information is data that, if leaked or altered,
could have a negative impact on the individual's reputation, physical or mental health, or lead to discriminatory
treatment. The sensitive personal information involved in this policy includes: network identity information (such
as username, nickname, phone number, email address, and related passwords); and other information (such as
personal phone numbers, mobile numbers, and precise location information).
2. Situations Where You Must Authorize Us to Collect and Use Your Personal Information
Our products or services include core functions that may require us to
collect, store, and use information related to you to realize these functions. If you do not provide the relevant
information, you will not be able to enjoy our products and services. These functions include:
Customer Service Functions: If you contact our customer service, we may
need you to provide necessary personal information for identity verification to ensure the security of your
account. To address your requests, with your authorization, customer service personnel may need to query or verify
your relevant information within the scope of your authorization. We will take technical and management measures
to ensure the security of your information and use it only as necessary. We may retain your contact information
(phone number or other contact details you use or provide), your communication records and content with us, and
other necessary information to provide and record customer service.
Security Assurance Functions: To enhance the security of your use of our
products and services, protect your or other users' personal and property safety from harm, better prevent
phishing websites, fraud, network vulnerabilities, computer viruses, and other security risks, and accurately
identify violations of laws and regulations, we may collect, use, or integrate your account information,
transaction information, and device information to comprehensively assess your account and transaction risks,
perform identity verification, detect and prevent security incidents, and take necessary recording, auditing,
analyzing, and handling measures in accordance with the law.
3. Situations in which we collect and use personal information without obtaining your
consent:
1.Related to national security and defense security;
2.Related to public safety, public health, and major public interests;
3.Related to criminal investigation, prosecution, trial, and execution of judgments;
4.Necessary for protecting the life, property, or other major legitimate rights and interests of the
personal information subject or other individuals where obtaining consent is difficult;
5.The personal information collected is publicly disclosed by the personal information subject;
6.Collected from legally publicly disclosed information, such as legal news reports, government information
disclosures, etc.;
7.Necessary for the performance of contracts as requested by you;
8.Necessary for maintaining the security and stable operation of our products and/or services, such as
identifying and handling faults in our products and/or services;
9.Necessary for legitimate news reporting;
10.Necessary for academic research institutions to conduct statistical or academic research based on public
interest, and when providing academic research or descriptions of results, the personal information included in
the results is anonymized;
11.Other situations stipulated by laws and regulations.
4. How we use Cookies and similar technologies
1.Cookies
Cookies are mechanisms that support the storage and
retrieval of information on a website or software from the server side (or scripts). When you use our products or
services, we send a data file known as a Cookie to your computer or mobile device. The Cookie assigned to you is
unique and can only be read by the web server that issued it. Cookies usually contain identifiers, site names, and
some numbers and characters. We use Cookie technology to simplify repeated logins, store your browsing preferences
or items in your shopping cart, provide shopping preferences, optimize ad selection and interaction, assess your
login status, and ensure the security of accounts and data. We commit to using Cookie information solely to
enhance service/product quality and optimize user experience. We will not use Cookies for purposes beyond those
described in this policy. You can manage or delete Cookies according to your preferences. You can clear all
Cookies stored on your computer. Most web browsers automatically accept Cookies, but you can typically modify your
browser settings to reject Cookies if you prefer. Additionally, you can clear all Cookies stored in software
memory. However, doing so may require you to manually adjust user settings each time you visit our website or use
our software, and certain services may not function properly, potentially affecting the security of the services
you use.
2.Website Beacons and Pixel Tags
In addition to Cookies, we also use website beacons
and pixel tags on our websites. For example, emails we send may contain URLs linking to our website content. If
you click on such links, we can track this click to help us understand your product or service preferences and
improve customer service. Website beacons are typically transparent images embedded in websites or emails. With
pixel tags in emails, we can determine if the email has been opened. If you do not wish your activities to be
tracked in this manner, you may unsubscribe from our mailing list at any time.
5. How we protect and store your personal information
1.Protection and Security Measures
We make every reasonable effort to protect the personal
information we collect from you, with dedicated data security teams in place. To prevent unauthorized access,
copying, modification, transmission, loss, destruction, processing, or use of personal information, we have
implemented the following measures:
1.1 Our network services use secure transmission protocols and encryption technologies, such as HTTPS, to
ensure data security during transmission.
1.2 User personal information is encrypted during storage and isolated using separation techniques.
1.3 When using personal information, such as displaying or associating it, we employ data anonymization
techniques like content replacement and encryption.
1.4 We have strict data usage and access policies, using rigorous access controls and multi-factor
authentication to protect personal information and prevent misuse. Only authorized personnel can access personal
information and are required to maintain confidentiality.
1.5 Specialized data and technology security audits, including log and behavior audits, are conducted.
2.Additional Security Measures
2.1 We manage personal information storage and usage through data classification, security management norms,
and development standards.
2.2 We have established a dedicated information protection department and a data security emergency response
organization to promote and ensure personal information security.
2.3 We enhance security awareness by providing training courses on security and privacy protection to
employees, emphasizing the importance of personal information protection.
3.Despite taking the above reasonable and effective measures and complying with relevant legal standards, we
cannot guarantee the security of personal information transmitted through insecure channels. Therefore, you should
take proactive measures to ensure your personal information's security, such as setting complex passwords,
regularly changing your account passwords, and not disclosing your account information to others.
4.The risk of information leakage exists in the online environment. If information leakage occurs due to
unforeseen events or force majeure, we will make every effort to control the situation, promptly inform you of the
incident's cause, the security measures we have taken, and the actions you can take to protect yourself.
5.In the event of a personal information security incident, we will notify you in accordance with legal
requirements: the basic situation and possible impacts of the security incident, the measures we have taken or
will take, suggestions for self-protection and risk reduction, and any remedial measures. We will notify you via
email, letter, phone, push notifications, or other methods. If it is difficult to notify each individual, we will
publish a reasonable and effective announcement. We will also report the incident to the relevant authorities as
required by law.
6.Storage of Your Personal Information
We will store user personal information collected within China
domestically, as required by law. If there is a need to transmit your personal information abroad, we will clearly
inform you and obtain your consent.
During your use of our products or services, we will continue to
store your personal information. If you cancel your account or actively delete personal information, we will
continue to store your information for up to 6 months after account cancellation or deletion, in accordance with
cybersecurity laws and regulations.
6. How We Share, Transfer, and Publicly Disclose Your Personal Information
Sharing
1.We will not share your personal information with any company, organization, or individual outside of
Micronet except in the following cases:
1.1 Micronet has obtained your explicit authorization or consent;
1.2 In accordance with applicable laws, legal procedures, or as required by judicial or administrative
authorities based on legal procedures;
1.3 When Micronet needs to initiate litigation or arbitration to protect its legitimate rights and
interests;
1.4 As stipulated in relevant service agreements or usage rules between you and Micronet;
1.5 Within the scope permitted by laws and regulations, to protect Micronet and its affiliates, Micronet
users, and the public interest from harm;
1.6 In accordance with agreements between you and other third parties;
1.7 For academic research purposes.
2.Additionally, we may share your order information, account information, and device information with
partners and other third parties to ensure the smooth completion of the services we provide to you. We will only
share your personal information for legitimate, necessary, specific, and explicit purposes, and only share the
information necessary for providing the service. Our partners are not authorized to use the shared personal
information for any other purposes. Currently, our partners include suppliers of goods or technology services. We
may share your personal information with third parties that support our functions, such as suppliers of
infrastructure technology services, logistics services, payment services, data processing, etc. For example, we
need to share your order information with logistics service providers to arrange delivery, or share your order
number and amount with third-party payment institutions to confirm and complete the payment. Similarly, if you
order value-added services from us, we need to share your order information or contact details with value-added
service providers to provide the corresponding services.
3.You may choose to share your video, location information, identity information, etc., with specific
individuals, or with unspecified individuals based on our products and/or services. Micronet is not responsible
for any legal liabilities resulting from information leakage due to your sharing actions.
4.Regarding third-party SDK service providers: To ensure the implementation and stable operation of
Micronet’s functions, we may integrate software development kits (SDKs) or similar applications provided by third
parties. We conduct strict security evaluations of the SDKs or similar applications used by our partners to
protect your personal information. If you find any risks with these SDKs or similar applications, we recommend
that you immediately terminate the relevant operations and contact us promptly. Detailed information about SDKs is
provided in the appendix of this policy.
Transfer
We will not transfer your personal information to any company,
organization, or individual except in the following cases:
1.Transfer with explicit consent: We will transfer your personal information to other parties after
obtaining your explicit consent;
2.In the event of a merger, acquisition, or bankruptcy liquidation, if personal information transfer is
involved, we will require the new entity holding your personal information to continue to abide by this privacy
policy, otherwise, we will require the new entity to seek your authorization again.
Public Disclosure
We will only publicly disclose your personal information in the
following cases:
1.After obtaining your explicit consent;
2.Based on legal disclosures: We may publicly disclose your personal information in accordance with laws,
legal procedures, litigation, dispute resolution, or mandatory requirements of government authorities;
3.Entrusted Processing;
4.If we entrust a third party to process your personal information, we will agree with the trustee on the
purpose, duration, processing methods, types of personal information, protection measures, and the rights and
obligations of both parties, and supervise the trustee’s personal information processing activities.
7. Your Rights
In accordance with relevant Chinese laws, regulations, standards, and
common practices in other countries and regions, we ensure that you can exercise the following rights concerning
your personal information:
Access or Correct Your Personal Information: You have the right to
access your personal information, except as required by law. If you wish to exercise data access rights, you can
access:
Your account information: You can review all personal information
you have submitted to Micronet on the "My" > "Account Settings" page, and you may update your personal information
through the same method.
Personal information that you cannot access or correct: Beyond the
information listed above, there is some
personal information that we cannot provide access to or correction services for, primarily to enhance your user
experience and ensure transaction security, such as device information and information generated when using
additional features. This information is used within the scope of your authorization, but if you wish, you may
contact us for deletion or anonymization.
Delete Your Personal Information: You can request the deletion of
your personal information in the following
circumstances:
a. If our processing of personal information violates laws and regulations;
b. If we collect or use your personal information without your consent;
c. If our processing of personal information violates agreements with you;
d. If you cancel your Micronet account;
e. If we terminate services and operations.
If we decide to comply with your deletion request, we will also
notify entities from whom we obtained your
personal information to delete it unless required otherwise by law, or if these entities have obtained your
independent authorization.
After you delete information from our services, we may not
immediately delete the corresponding information
in backup systems, but we will remove this information when updating backups.
Change or Withdraw Your Authorization: You can change the scope of
authorization or withdraw your
authorization by deleting information, disabling device functions, or adjusting privacy settings in the app.
Please understand that some basic personal information is necessary to complete certain business functions. When
you withdraw consent or authorization, we will no longer provide the corresponding services and will cease
processing the relevant personal information. However, withdrawing consent or authorization does not affect the
processing of personal information based on your authorization before such withdrawal.
Respond to Your Requests: If you cannot access, correct, or delete
your personal information through the
above methods, or if you need access, correction, or deletion of other personal information generated while using
our products and/or services, or if you believe Micronet is in violation of laws or agreements related to your
personal information collection or use, you can send an email to [after-sale@micronet.ltd] or contact us using
other methods specified in this policy. For security reasons, we may require you to provide a written request or
other methods to verify your identity, and we will respond to your request within 15 days of receiving and
verifying your identity.
We generally do not charge fees for reasonable requests, but may
charge a fee for repeated or excessive
requests based on the situation. We may refuse requests that are unreasonable, require excessive technical
measures (such as developing new systems or fundamentally changing existing practices), pose risks to the
legitimate rights of others, or are impractical (such as information stored on backup tapes). We will not be able
to respond to requests in the following cases as required by law:
a. Related to national security or defense;
b. Related to public safety, public health, or major public interests;
c. Related to criminal investigations, prosecutions, trials, and enforcement of judgments;
d. Where there is sufficient evidence indicating malicious intent or abuse of rights;
e. Responding to the request would seriously harm the legal rights of you or other individuals or
organizations;
f. Involving trade secrets.
8. Handling Minors' Personal Information
1.We attach great importance to the protection of minors' personal information. If you are under 18 years old, you
should obtain written consent from your parents or legal guardians before using our products and/or services. We
protect minors' personal information in accordance with relevant national laws and regulations.
2.For situations where we collect minors' personal information with the consent of their parents or legal
guardians, we will only use or disclose this information when legally permitted, with explicit consent from
parents or legal guardians, or when necessary to protect minors.
3.If we find that we have collected minors' personal information without prior verifiable consent from
parents or legal guardians, we will make efforts to delete the relevant data as soon as possible.
9. Device Permission Usage Guidelines
Essential Functions for Managing and Controlling Routers
1.Upgrade Services
Product Software Upgrade: We collect your mobile device's country
code information to notify you of new product software updates and provide a better user experience.
App Software Upgrade: We collect data on your mobile device’s
software installation list, app versions, regional and language settings to notify you of new app software updates
and enhance your user experience.
2.Device Management
We collect your mobile device’s location information, MAC address,
IP address, and the SSID of the WiFi network to ensure you can manage your device correctly. This helps in
verifying if your device is connected to the managed WiFi and prevents accidental blacklisting of your device.
3.Router Settings
When you access router settings (e.g., wireless settings, internet
settings, LAN settings, signal strength features), it may cause temporary WiFi disconnection on your mobile
device. To facilitate automatic reconnection, we collect your mobile device’s location information for an improved
user experience.
4.Regional Services
When using our products or services, we collect your mobile
device’s country code, time zone, and language information to determine your location. This ensures that
location-specific functionalities are properly provided and that services related to time are correctly
functioning.
5.Notification Services
When enabling notification services, we collect your mobile
device’s unique identifier (IMEI/Android ID) to push notifications to your device. If you do not wish to receive
notifications, you can disable this feature in "Personal Center - Notification Alerts."
Ensuring Wi-Fi Security
To enhance system security and prevent unauthorized access, we
collect your Environmental Characteristic Value (ECV) to verify user identity.
10. Policy Revisions
We may revise this policy periodically. We will not reduce your rights
under this policy without your explicit consent. Changes to this policy will be posted on this page. For
significant changes, we will notify you via push notifications, pop-ups, or emails. Significant changes include
but are not limited to:Major changes in our service model, such as purposes, types, or methods of personal data
processing.
1.Major changes in ownership or organizational structure, such as business adjustments or acquisitions.
2.Changes in the main parties involved in personal information sharing, transfer, or public disclosure.
3.Significant changes in your rights or methods of participation in personal information processing.
4.Changes in the department responsible for personal information security, contact information, or complaint
channels.
5.High-risk findings in personal information security impact assessments.
11. Contact Us
For questions, feedback, or concerns about this policy or your personal
information, please email us at [after-sale@micronet.ltd]. Our dedicated Personal Information Protection Officer
can be contacted through this email as well, and we generally respond within 15 days. If unsatisfied with our
response, especially if our handling of personal information harms your rights, you may also file complaints with
regulatory authorities such as the Internet Information Office, telecommunications, public security, or commerce
departments.