Updated: November 30, 2023

Effective Date: November 30, 2023

iSenseLink Privacy Agreement

  iSenseLink Brief introduction

iSenseLink is a secure and intelligent hardware management platform that focuses on secure networking, trusted remote control, and reliable remote management of smart devices. It is an intelligent hardware management APP provided by iSenselink Infotech (Beijing) Co., Ltd. (hereinafter referred to as "iSenseLink").

You can use your mobile phone to interact with smart devices securely and conveniently, and realize trusted interaction and secure sharing between devices.

iSenseLink builds a secure bridge between people and cloud devices, bringing you into a smart life and enjoying the digital world with peace of mind!

Your device is in the cloud and only listens to you.

- -Smart devices are securely connected to the Internet and securely migrated to the cloud;

- -Real-time and credible remote control of smart devices, realize trusted linkage between devices, and quickly form your device "circle of friends" in the cloud;

- Build a "digital fence" where you can share your devices with family and friends easily, quickly and securely;

 

Privacy Policy

For example, after obtaining your express consent, we will collect the following personal information from you, such as device information, software information, IP address, etc., in order to provide you with services;

You can access and correct your personal information on the "Me-[Avatar]-Modify Account Information" page;

We use industry-leading security technology to protect your personal information.

For details of third-party information sharing, please refer to "5-1".

You can read the following to learn more detailed rules for the handling of personal information, such as the correspondence between the types and purposes of personal information.

 

1. Information We Collect

 

In the process of using iSenseLink services, we will collect the information you voluntarily provide when using the services or generated as a result of using the services in the following ways, so as to provide you with services, optimize our services and ensure the security of your account:

 

 In order to provide users with the best quality online services, iSenseLink's software and website will collect non-sensitive information about users' use of software and access to websites, including but not limited to usersTime and geographic location of use of the software, frequency of use of the software, IP address, length and frequency of visits to the website. This data is usually used for statistical purposes, does not involve sensitive user information, is not used to trace individual users, and we use statistical information to feedback the user experience to improve and enhance our services. The above statistical information may be shared with iSenseLink's collaborators to reflect the user's use of the software/website in an aggregate manner.

When you use the login function, we will collect your device information after obtaining your express consent to help you complete the registration purpose.

 

Log information

When you use our services, we may automatically collect relevant information and store it as service log information.

1) Device information

For example, device type, device model, operating system version, hardware-related information, unique device identifier, OAID, battery, signal strength and other information, device identifier (IMEI, IDFA, Android ID, MAC address, OAID, IMSI, etc.), mobile phone number, storage permissions.

2) Software Information

For example, the version number of the software, the browser type. We collect information about the mobile applications and other software you use to ensure the security of the operating environment or to provide services.

3) IP address

4) Service log information

For example, information you search for and view when using our services, service failure information, referral URLs, and other information.

5) Communication log information

For example, the account you used to communicate with when you used our services, and the duration of the communication.

6) Application Information

For example, information about app crashes, notification switch status, software lists, and more.

 

How We Use the Information We Collect

We strictly abide by the provisions of laws and regulations and the agreement with users, and use the collected information for the following purposes. If we use your information beyond the following purposes, we will explain this to you again and obtain your consent.

1) Product development and service optimization

For example, when our system fails, we record and analyze the information generated by the system failure to optimize our services.

2) Safety and security

For example, we may use your information for identity verification, security, anti-fraud monitoring, archival backup, customer security services, and more. For example, security software you download or install can detect malicious programs or viruses or identify scams for you.

3) Management software

For example, software certification, software upgrades, etc.

 

To ensure the security of the Services and to help us better understand how our Apps are performing, we may record information such as how often you use the Apps, fault information, aggregate usage, performance data, and the source of the Apps. We do not combine the information we store in our analytics software with the personally identifiable information you provide in the app.

In addition, in accordance with relevant laws, regulations and national standards, we may collect and use your relevant personal information without your authorization and consent under the following circumstances:

1) Directly related to national interests such as national security and national defense security, and directly related to major public interests such as public security, public health, and public knowledge;

2) Directly related to criminal investigation, prosecution, trial and enforcement of judgments;

3) For the purpose of protecting the life, property, reputation and other major legitimate rights and interests of you or other individuals, but it is difficult to obtain the consent of the individual;

4) The personal information collected is disclosed to the public by yourself;

5) Personal information is collected from lawfully and publicly disclosed information, such as lawful news reports, government information disclosure, and other channels;

6) Where it is necessary to conclude and perform a contract at your request;

7) It is necessary to maintain the safe and stable operation of the products or services provided, such as discovering and disposing of faults in products or services;

8) Where it is necessary for lawful news reporting;

9) Where it is necessary to carry out statistical or academic research in the public interest, and when it provides the results of academic research or descriptions to the outside world, the personal information contained in the results is de-identified;

10) Other circumstances stipulated by laws and regulations.

Please understand that the functions and services we provide to you are constantly updated and developed, and if a function or service is not included in the above description and your information is collected, we will separately explain to you the content, scope and purpose of information collection through page prompts, interactive processes, website announcements, etc., so as to obtain your consent.

Please note that at this time, we do not actively obtain your personal information from third parties. If we need to obtain your personal information indirectly from a third party for business development in the future, we will inform you of the source, type and scope of use of the personal information before obtaining it, and if the personal information processing activities we need to carry out in the course of our business exceed the scope of your authorization and consent when you originally provided personal information to the third party, we will obtain your authorization and consent before processing such personal information, and we will also strictly comply with the provisions of relevant laws and regulations, and require the third party to ensure the legality of the information provided by it.

 

2. Storage of Information

 

1. How and for how long the information is stored

We store your information in a secure manner. In general, we will only store your personal information for the time necessary to achieve the purpose of the service or within the time limit stipulated by laws and regulations.

2. The region where the information is stored

In accordance with laws and regulations, we will store the personal information of users collected in China within the territory of China.

At this time, we do not transfer or store your personal information across borders. If cross-border transmission or storage is required in the future, we will inform you of the purpose of the cross-border transfer of information, the recipient, the security assurance measures and security risks, and obtain your consent.

3. Notification when a product or service is discontinued

When our products or services cease operation, we will notify you in the form of push notifications, announcements, etc., and delete or anonymize your personal information within a reasonable period of time, unless otherwise provided by laws and regulations.

 

3. Information Security

 

1. Security protection measures

We strive to ensure the security of users' information to prevent leakage, loss, improper use, unauthorized access and disclosure, etc. We use multi-faceted security protection measures to ensure that the protection of users' personal information is at a reasonable level of security, including technical protection means, management system control, security system guarantee and many other aspects. The technical means we use include, but are not limited to, firewalls, encryption (e.g., SSL), de-identification or anonymization, access control measures, etc. In addition, we are constantly enhancing the security capabilities of the software installed on your device. For example, we will complete some information encryption work locally on your device to strengthen secure transmission, and we will learn about the application information installed on your device and the process information running on your device to prevent malicious programs such as viruses and Trojan horses.

 We have established a dedicated management system, process and organization to ensure the security of personal information. For example, we strictly limit the scope of people who have access to information, require them to comply with confidentiality obligations and conduct audits, and those who violate these obligations are subject to penalties in accordance with the regulations. We store any information we have about our users on secure and controllable servers, and our employees and contractors who provide us with the relevant information are required to comply with iSenseLink's confidentiality regulations regarding user information. We also review our management systems, processes, and organization to prevent unauthorized access to, use, or disclosure of your information. However, iSenseLink will not be responsible for incidents caused by unauthorized access to user information, and users also play an important role in maintaining information security and are required to take necessary confidentiality measures for passwords and accounts used on iSenseLink's software and websites. If you become aware of any unauthorized access to your account, please contact us immediately.

 

2. Measures to deal with security incidents

In the event of a security incident such as leakage, damage, or loss of personal information, we will activate an emergency plan to prevent the security incident from expanding. After a security incident occurs, we will promptly inform you of the basic situation of the security incident, the measures we are about to take or have taken, and our suggestions for dealing with the security incident, in the form of push notifications and emails. If it is difficult to inform one by one, we will issue a warning through announcements and other means.

 

IV. How We Use Information

 

We strictly abide by the provisions of laws and regulations and the agreement with users, and use the collected information in accordance with this Privacy Agreement to provide you with better services.

 

1. Information Use Rules

We use the information we collect in accordance with the following rules:

1) We will provide you with various functions and services based on the information we collect, including functions such as uploading files;

2) We will analyze the operation of our products according to the fault information and performance information when you use iSenseLink to ensure the safety of the service, optimize our products, and improve the quality of our services.

How to obtain consent after notifying the purpose of the change

We will use the information we collect for the purposes covered by this Privacy Policy. If we use your personal information beyond the scope of the purpose stated at the time of collection and are directly or reasonably related, we will inform you again and obtain your express consent before using your personal information.

 

5. Sharing, Transfer, and Public Disclosure of Personal Information

1. Sharing of Personal Information

Except as otherwise provided in this Privacy Agreement, we will not actively share or transfer your personal information to a third party other than iSenseLink, and if there are other circumstances that share or transfer your personal information or you need us to share or transfer your personal information to a third party outside iSenseLink, we will directly or confirm that the third party has obtained your express consent to the above behavior.

1) Third-Party Services

In order to achieve specific functions, some of the services in iSenseLink are provided by our affiliates or other third parties. We will carefully select third parties and third-party services, urge relevant third parties to collect and use your personal information in accordance with this Privacy Agreement or separately agreed with you, and take appropriate security technology and management measures to ensure the security of your personal information. The details of third-party information sharing are as follows: "iSenseLink iSenseLink Third-Party Information Sharing List" (including the "Third-Party SDK Directory"):

Huawei Push SDK

Function/Purpose: Used by the iSenseLink app to push messages to Huawei mobile phone users

Third Party Name: Huawei Software Technologies Co., Ltd

Types of personal information collected: basic app information, in-app device identifiers, device hardware information, basic system information, and system setup information

Link to Privacy Policy:

https://developer.huawei.com/consumer/cn/doc/development/HMSCore-Guides/sdk-data-security-0000001050042177

 

Mi Push SDK

Function/Purpose: Used by iSenseLink APP to push messages to Xiaomi mobile phone users

Third party name: Beijing Xiaomi Mobile Software Co., Ltd

Types of personal information collected: basic app information, in-app device identifiers, device hardware information, basic system information, and system setup information

Link to Privacy Policy:

https://dev.mi.com/distribute/doc/details?pId=1534

 

OPPO pushes SDK

Function/purpose: Used by iSenseLink APP to push messages to OPPO mobile phone users

Third party name: OPPO Guangdong Mobile Communications Co., Ltd

Type of personal information collected: device information (OAID, IMEI, hardware serial number, IMSI, User ID, Android ID, Google Advertising ID, mobile phone region settings, device model, mobile phone battery level, mobile phone operating system version and language), current application information (APP package name and version number, running status), SDK version number, network-related information (such as IP or domain name connection results, current network type), message sending result, notification bar status (such as notification bar permissions, user click behavior), and lock screen status (such as whether the screen is locked and whether lock screen notifications are allowed).

Link to Privacy Policy:

https://open.oppomobile.com/new/developmentDoc/info?id=10288

 

VIVO PUSH SDK

Access purpose: used for iSenseLink APP to push messages to VIVO mobile phone users

Third party name: Vivo Mobile Communications Co., Ltd., Guangdong Tianchen Network Technology Co., Ltd

Types of personal information collected: device information (OAID, list of running applications), storage files, directories, and space status

Link to Privacy Policy:

https://www.vivo.com.cn/about-vivo/privacy-policy

 

Huawei Unified QR Code Scan SDK for Android

Access purpose: It is used to add IoT devices by scanning the iSenseLink APP

Third Party Name: Huawei Software Technologies Co., Ltd

Types of personal information collected: text information, pictures, sensor information (accelerometers, light sensors), network information, in-app device identifiers, basic application information, device hardware information, carrier information (operator name), system information (system settings, system attributes, device model, operating system), Wi-Fi information (Wi-Fi status), and information about your use of the App

Link to Privacy Policy:

https://developer.huawei.com/consumer/cn/doc/development/HMSCore-Guides/sdk-data-security-0000001050043971

 

Alibaba Cloud EMAS pushes SDKs

Purpose: Push information to users

Third Party Name: Alibaba Cloud Computing Limited

Type of personal information collected: Device information

Link to Privacy Policy:

https://terms.aliyun.com/legal-agreement/terms/suit_bu1_ali_cloud/suit_bu1_ali_cloud202112071754_83380.html?spm=a2c4g.434217.0.0.3eb45a1eW2gYdF

 

Agora audio and video intercom SDK

Access purpose: real-time intercom with smart devices

Third Party Name: Shanghai Zhaoyan Network Technology Co., Ltd

Type of personal information collected: Device information

Link to Privacy Policy:

https://www.agora.io/cn/privacy-policy

 

2. Public Disclosure of Personal Information We will not publicly disclose the personal information we collect, and if it is necessary to disclose it publicly, we will inform you of the purpose of the public disclosure, the type of information to be disclosed and the sensitive information that may be involved, and obtain your express consent.

3. Transfer of Personal Information With the continuous development of our business, we may carry out mergers, acquisitions, asset transfers and other transactions, and we will inform you of the relevant circumstances, and continue to protect your personal information in accordance with laws and regulations and standards not lower than those required by this Privacy Agreement, or require a new controller to continue to protect your personal information.

4. In addition, in accordance with relevant laws, regulations and national standards, we may share, transfer, or publicly disclose personal information without the prior authorization and consent of the personal information subject under the following circumstances:

1) Directly related to national security and national defense security;

2) Directly related to public safety, public health, or major public interests;

3) Directly related to criminal investigation, prosecution, trial, and enforcement of judgments;

4) For the purpose of protecting the life, property, or other major lawful rights and interests of the Personal Data Subject or other individuals, but it is difficult to obtain the consent of the individual;

5) Personal information disclosed to the public by the Personal Data Subject on their own;

5) Personal information is collected from lawfully and publicly disclosed information, such as lawful news reports, government information disclosure, and other channels.

6. Your Rights

During your use of iSenseLink, in order to make it more convenient for you to access, correct and delete your personal information, we have provided you with corresponding operation settings in the product design, and you can refer to the following guidelines to operate. In addition, we have also set up a complaint and reporting channel, and your comments will be dealt with in a timely manner.

For example: 1. Modify your personal information

1) After entering iSenseLink, click "Mine";

2) Click on "Avatar".

3) Click "Modify Account Information".

2. Sign out

1) After entering iSenseLink, click "Mine";

2) Click "Exit";

3. Complaints, reports and problem feedback

1) After entering iSenseLink, click "Mine";

2) Click "About Us";

3) Click "Customer Service Hotline"

7. Equipment information and usage records

Device information and usage records refer to the registration information and daily use records generated by users in the process of using smart hardware products supported by "iSenseLink".

1. Equipment information and usage records include but are not limited to:

Device name/nickname/remark name,

Device user/member profile, including but not limited to user/member nickname and avatar,

Current or historical status information of the device, such as switch, battery level, networking, etc.,

Device usage records, such as device switch records, device mode changes, etc.,

Other device-related information as described above.

2. iSenseLink may use device information and usage records to:

share the device usage behavior of a single user among device users;

 

To use the statistical data to develop iSenseLink's product or marketing strategy, to upgrade software or function development;

They may report information about their business activities and users to third parties, including investors, auditors, potential business partners or public bodies.

3. iSenseLink is obliged to manage the device registration information and usage records as confidential, but excludes the following situations: if iSenseLink realizes that maintaining the confidentiality will endanger the user's own safety, others or the public, if the device registration and usage records are required by legal procedures, such as responding to summons and retrieval requests, and if the user discloses it himself.

8. Telephone and text message communication

As part of the verification code login method, users will receive a verification code notification text message, and may receive one or more similar text messages each time they log in with a verification code.

If the alarm function is enabled on the device, the user will receive a phone call or SMS alarm when the alarm condition is triggered by the device, depending on the risk level. iSenseLink does not promise the timeliness and accuracy of alarms, but will do its best to ensure that alarms are timely and accurate. Users should be aware that some devices may have the alarm function enabled by default for security reasons.

9. Information feedback

iSenseLink welcomes feedback on various aspects of the software and website and stores the feedback that users send to us. This feedback will be used to manage and improve the service and will be shared with iSenseLink's partners in aggregate form or without user demographics.

10. Cancel your account

You can log in to the mobile client and go through the following path "My - About Us - Service Phone" for help to assist you in applying for cancellation of your account. After you cancel your account, we will immediately stop providing you with products and/or services, and we will delete your personal information at your request, unless otherwise provided by laws and regulations. Once the account is cancelled, it cannot be recovered, please back up all the information and data related to the account before the operation. Once you have closed your account, you will no longer be able to use your account and you will not be able to retrieve any content or information in or related to your account. You can contact us to exercise your rights, or you can exercise the right to access, update and delete information, cancel your account through your apps and products, and we will assist you in exercising your rights. If you have any questions about these rights or wish to exercise them, please call [4008-238-616]. For security purposes, we may require you to provide a written request, or provide proof of your identity, and we will respond to your request within 15 days of receiving your feedback and verifying your identity. In principle, we do not charge a fee for your reasonable request, but we will charge a certain cost fee for repeated requests that exceed reasonable limits due to repeated requests. We may reject requests that are unreasonably repetitive, require excessive technical means (e.g., need to develop new systems or fundamentally change current practices), pose a risk to the legitimate rights and interests of others, or are highly impractical (e.g., involving information stored on backup tapes).

11. Changes

We may revise this Privacy Policy from time to time. When the terms of the Privacy Policy change, we will show you the changed guidelines in the form of push notifications and pop-up windows when you log in and update the version. Please note that only after you click the agree button in the pop-up window will we collect, use and store your personal information in accordance with the updated guidelines.

XII. Protection of Minors

We attach great importance to the protection of minors' personal information. According to relevant laws and regulations, if you are a minor under the age of 18, you should obtain the written consent of your parent or legal guardian before using the iSenseLink service.

XIII. Miscellaneous

The iSenseLink Privacy Policy is our general privacy policy, which applies to iSenseLink users in terms of user rights and information security measures. If there is any inconsistency or contradiction between the iSenseLink Privacy Policy and this Privacy Policy, this Privacy Agreement shall prevail.

14. Contact Us

If you have any other questions about inquiring, following or modifying your personal records held on iSenseLink, please call customer service at 4008-238-616. Email: isenselink@sense.com.cn

 

We will review the issues involved as soon as possible and give feedback within 15 working days or the time limit stipulated by laws and regulations.