PylontechAuto APP Privacy Policy

Update date: July 1st,2022
Effective date: July 1st,2022

 

PylontechAuto (referred to as "Pylon") understands the importance of personal information to you, and your trust is very important to us. We will protect your personal information and privacy security in accordance with laws and regulations and with reference to industry best practices. We have formulated this "privacy policy" and special tips: we hope you can carefully read and understand this privacy policy before using the Pylon app and related services, so as to make appropriate choices.

 

This privacy policy will help you understand:

We will collect and use your information in accordance with the privacy policy, but we will not collect personal information in a mandatory way just because you agree to this privacy policy. When you use or enable relevant functions or use services, we will collect and use relevant information necessary for the realization of functions and services. Unless it is necessary information to achieve business functions or in accordance with laws and regulations, you can refuse to provide it without affecting other functions or services. We will specify the information to be collected item by item in the privacy policy.

When you use our products or services, we need to collect, store, use, share your information, provide services to you and improve service quality in accordance with the relevant requirements of laws and regulations. We hope to explain to you through this policy: when you use our products or services, what data we collect, why we collect this data, what we will do with this data and how we will protect this data. This policy is closely related to your use of our products or services, and is crucial to your exercise of user rights and protection of your user information. Please carefully read and fully understand the contents of this policy before using our products or services.

The following will help you understand in detail how we collect, use, store, transfer (if applicable) and protect personal informationHelp you understand the ways of querying, copying, deleting, correcting and withdrawing authorized personal information. This policy is closely related to your use of our services. We suggest you carefully read and understand all the contents of this policy and make the appropriate choices you think We have highlighted the important content of the terms of your personal information rights and interests in bold, please pay special attention.

1. How we collect and use personal information

2. How we use cookies and similar technologies

3. Third parties involved in the use of data and transfer and disclosure of personal information

4. How we store personal information

5. How we protect the security of personal information

6. How we manage personal information

7. Information protection of minors

8.  Update and notification of privacy policy

9. Contact information

1.How we collect and use personal information

We will collect the information you actively provide when using the service, as well as the information you generate in the process of using the function or receiving the service through automated means in the following ways:

1.1Registration, login and retrieval

1.1.1Registration, login

a. When you register and log in to the Pylon app, you can create an app account and password through your email account. This information is collected to help you complete the registration.

b. When you visit the Pylon app, you need to log in to use the homepage, app version, my device, information sharing, feedback and other user services.

c. The information collected and used for realizing business functions is as follows: email account, nickname, password, email verification code. For example, when you register your account, Pylon will send a verification code to your email, and you need to verify it through the verification code.

1.1.2Password retrieval

You can retrieve your password through the retrieval function. It is necessary to ensure the security of your account. When retrieving your password, we need you to verify your identity by entering the verification code received by your email.

1.2 Information display

1.2.1 The log information used for information display includes:

(1)location information. When you enable the location function of your mobile device through system authorization and use location-based services, we will collect and use your location information to search for nearby battery devices for you.

(2)Log information. When you use the products / services we provide, we will collect your search, click, share and other information and save it as a relevant network log, including your IP address, language used, version of operating system, date and time of access, network request, etc.

1.2.2 Data analysis

We will de-identify the information collected and used above. Data analysis only corresponds to specific codes that cannot be directly associated with your identity, and will not be associated with your real identity.

 

1.3 User feedback and service

1Customer service and problems: In order to contact you easily, help you solve the problem as soon as possible or record the handling plan and results of relevant problems, we may save your communication / call records and relevant contents (including account information, feedback information, other information you provide to prove relevant facts, or the contact information you leave).If you make inquiries, complaints or suggestions about specific orders, we will use your account information and order information. In order to facilitate users who are not logged in to use customer service or feedback functions, we may associate the above information with your device information, which can be viewed after logging in.

2QuestionnaireIn order to provide services and improve service quality, we may also use your other information, including the relevant information you provided when you contacted customer service, and the questionnaire reply information you sent to us when you participated in the questionnaire survey. You may also refuse to provide participation in the questionnaire if you do not wish to.

1.4 Operation and safety assurance

1.4.1 Operation and safety assurance

We are committed to providing you with safe and reliable products and use environment, and providing high-quality and reliable services and information is our core goal. In order to maintain the normal operation of our services and protect the legitimate interests of you or other users or the public from loss, we will collect the necessary information to maintain the safe and stable operation of our products or services.

1.4.2 Functions of using device information and log information

In order to ensure the safe operation, quality and efficiency of software and services, we will collect the hardware model, operating system version number and device identifier of your deviceAndroid such as IMEIAndroidIDOAIDIMSIICCIDMEIDiOS such as IDFVIDFADifferent identifiers differ in terms of validity, whether they can be reset by the user, and how they are obtained)、BluetoothSoftware version number, network access method, type, status, network quality data, operation, usage, service logs. We may associate your device information or email account with your Pylon app account.

1.5 Change in the purpose of collecting and using personal information

Please understand that with the development of our business, there may be adjustments and changes to the functions and services provided by the Pylon app.In principle, when the new function or service is related to the function or service we currently provide, the personal information collected and used will be directly or reasonably related to the original processing purpose. If we need to collect and use your personal information in a scenario that is not directly or reasonably related to the original processing purpose, we will inform you again in the form of page prompts, interactive processes and agreement confirmation in accordance with the requirements of laws, regulations and national standards, and obtain your consent.

1.6 Device permission call

In order to ensure the normal implementation of relevant business functions, we need to call the corresponding necessary permissions according to the specific use scenarios, and ask you through a pop-up window before calling.

Location permissions: Some third-party functional components used in our products apply for location information to help users locate their location when posting information. You have the right to choose whether to agree or not. If you do not agree, you will not be able to use location-based services.

Camera permissions:When you use the feedback function, if you need to take photos of battery devices and upload them, in order to ensure that you can use the camera function normally, the app will apply for permission to take photos. You have the right to choose whether to agree or not. If you do not agree, you will not be able to use the photo service.

Album permissions: When you use the feedback function, in order to send the photos already on your mobile phone, the app needs to get the album permission. You have the right to choose whether to agree or not. If you do not agree, you will not be able to open the album and upload the existing photos directly.

Read and write mobile phone storage permissions: When using the save application cache function and image upload service in our products, the app may apply for read and write external storage permissions. You have the right to choose whether to agree or not. If you do not agree, you will not be able to use the image upload service.

Bluetooth permissions: When you use the app to connect the battery, you need to allow Bluetooth pairing to connect the battery. You have the right to choose whether to agree or not. If you do not agree, you will not be able to use the Bluetooth function, and the app will not be able to connect the battery.

Data permission: When you use the registration or login function, the password modification or retrieval function, the app feedback function, the upgrade battery version function, the document viewing function and the information sharing function, you need to allow the app to connect to the network through Wi-Fi or mobile data. You have the right to choose whether to agree or not. If you do not agree, you will not be able to use the above functions, and the app will not be able to upload or download network data.

 

You can choose to turn off some or all permissions in the device settings, which may cause the corresponding business functions to fail to achieve or fail to achieve the expected results.

 

1.7 Third-party SDK directory

Tencent buglySDK

§ Purpose of use: record application crash information

§ Type of personal information involved: device identification informationIDFVOAIDIMEIMEIDIMSI etc.

§ Third party entityTencent Software Co., Ltd

§ Official website linkhttps://www.qq.com/

§ Privacy policy:https://privacy.qq.com/policy/cookie-privacypolicy/

§ Note: applicable to the battery app of Pylon

1.8Exceptions with authorization

Please understand that in the following cases, according to laws and regulations and relevant national standards, we do not need to obtain your authorization and consent in advance to collect and use your personal information:

a. Related to our obligations under laws and regulations;

b. Directly related to national security and national defense security;

c. Directly related to public safety, public health and major public interests;

d. Directly related to criminal investigation, prosecution, trial and judgment execution;

e. It is difficult to obtain your or others' authorization and consent for safeguarding your or others' major legitimate rights and interests such as life and property;

f. Your personal information disclosed to the public by yourself;

g. Necessary for signing and performing the contract according to the requirements of the personal information subject;

h. Your personal information is collected from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels;

i. Necessary for maintaining the safe and stable operation of the software and related services, such as finding and dealing with faults in the software and related services;

j. Necessary for legitimate news reporting;

k.  It is necessary for academic research institutions to carry out statistics or academic research based on the public interest, and when providing the results of academic research or description to the public, the personal information contained in the results is de identified;

l. Other circumstances stipulated by laws and regulations.

It is specially reminded that if the information cannot identify your personal identity alone or in combination with other information, it does not belong to your personal information in the legal sense. When your information can identify your personal identity alone or in combination with other information, or when we use the data that we cannot contact with any specific personal information in combination with other personal information, these information will be treated and protected as your personal information in accordance with this Privacy Policy during the period of combined use.

 

2.How we use cookies and similar technologies

Cookies, device information identification and other similar technologies are widely used in the Internet. you use the Pylon app and related services, we may use related technologies to send one or more cookies or anonymous identifiers to your device to collect, identify and store information when you access and use this product. We promise that we will not use cookies for any purpose other than the purpose stated in this privacy policy. We use cookies and similar technologies mainly to achieve the following functions or services:

2.1Ensure the safe and efficient operation of products and services

We may set cookies or anonymous identifiers for authentication and security to confirm whether you log in to the service safely, or whether you encounter theft, fraud and other illegal acts. These technologies will also help us improve service efficiency, login and response speed.

2.2Help you get an easier access experience

Using this technology can help you avoid filling in your personal information repeatedly.

2.3 Clearing of cookies

Most browsers provide users with the function of clearing browser cache data. You can clear the corresponding data in the browser setting function. If you clear, because of these modifications, you may not be able to use services or corresponding functions that rely on cookies provided by the company.

3.Third parties involved in data use and transfer and disclosure of personal information

3.1Partners involved in the use of data

3.1.1 Principle

a. Principle of legality: if data use activities are involved in the process of cooperation with partners, they must have a legitimate purpose and conform to the legal legitimacy basis. If the use of information by the partner no longer conforms to the principle of legality, it should not use your personal information again, or use it after obtaining the corresponding legal basis.

b. Principle of legitimacy and minimum necessity: the use of data must have a legitimate purpose and be limited to the necessity of achieving the purpose.

c. Principle of safety and prudence: we will carefully evaluate the purpose of the partners' use of information, comprehensively evaluate the security guarantee ability of these partners, and require them to abide by the cooperation legal agreement. We will conduct strict security monitoring on the software tool development kits (SDK) and application programming interfaces (API) used by partners to obtain information to protect data security.

3.1.2 Delegated processing

Some specific modules or functions in this business function are provided by external suppliers. For example, we will hire service providers to assist us provide customer support.

For companies, organizations and individuals who entrust us with processing personal information, we will sign a strict confidentiality agreement with them, requiring them to process personal information in accordance with our requirements, this Privacy Policy and any other relevant confidentiality and security measures.

3.1.3 share

We will not share your personal information with any companies, organizations and individuals other than our company unless we obtain your explicit consent.

Unless otherwise stipulated by laws, regulations and regulatory authorities, we only share your information with third parties in the case of safety and analysis statistics. If we need to share your information with a third party in order to provide services to you, we will evaluate the legitimacy, legitimacy and necessity of the information collected by the third party. We will require third parties to take protective measures for your information and strictly comply with relevant laws, regulations and regulatory requirements.

We may share your personal information in accordance with laws and regulations or the mandatory requirements of the competent government departments.

3.1.4 Scope of partners

If the specific functions and scenarios involve services provided by our related parties and third parties, the scope of partners includes our related parties and third parties.

3.1.5 Provide information for implementing security and analytics statistics

1Ensure the safety of use: we attach great importance to the security of account, service and content. In order to protect the account and property safety of you and other users and protect your and our legitimate rights and interests from illegal infringement, our partners may use necessary equipment, account and log information.

2Analysis of product conditions: In order to analyze the use and performance of our products, our partners may need to use information such as product usage (crash, flashback), device identification information, and overall application installation and usage.

3.2 Transfer

We will not transfer your personal information to any companies, organizations and individuals, except in the following cases:

a) Transfer with explicit consent: We will transfer your personal information to other parties with your explicit consent;

b) When it comes to merger, acquisition or bankruptcy liquidation, if it involves the transfer of personal information, we will require the new company or organization that holds your personal information to continue to be bound by this Privacy Policy, otherwise we will require the company or organization to ask you for authorization and consent again.

3.3 Disclosure

We will not disclose your personal information unless we comply with national laws and regulations or obtain your consent. We will adopt security measures that meet industry standards when we disclose your personal information.

 

 

4.How we store personal information

4.1 Storage location

In accordance with the provisions of laws and regulations, we will store your personal information collected and generated in the process of domestic operations in the territory of the people's Republic of China. At present, we will not transmit the above information overseas. If we transmit it overseas, we will strictly abide by the relevant laws and regulatory policies of China, and will follow the relevant national regulations or ask for your consent.

4.2 Storage period

We will only retain your personal information for the period necessary for the purpose of providing the Pylon app and services, such as:

1Email account: when you use your email account to register and log in, we need to keep your email account continuously, so as to provide you with normal services, deal with your possible inquiries and customer complaints, and ensure the security of your account and system.

2We will keep the information you post until you withdraw, delete or cancel your account.

If you cancel your account, actively delete your personal information or exceed the necessary period, we will delete or anonymize your personal information, except for the following cases:

1Comply with the requirements of laws and regulations on information retention.

2The period needs to be reasonably extended for the purposes of finance, audit, dispute resolution, etc.

5.How do we protect the security of personal information

5.1 We attach great importance to the security of your personal information and will strive to take reasonable security measures (including technical and management) to protect your personal information. We will prevent the personal information you provide from being improperly used or being accessed, publicly disclosed, used, modified, damaged, lost or disclosed without authorization.

5.2 We will protect your personal information with encryption technology no less than industry-accepted, anonymization processing and related reasonably feasible means, and use security protection mechanisms to prevent your personal information from being maliciously attacked.

5.3 We will establish a special security department, security management system and data security process to ensure the security of your personal information. We adopt a strict data usage and access system to ensure that only authorized personnel can access your personal information, and conduct security audits on data and technology in a timely manner.

5.4 Although the above reasonable and effective measures have been taken and the standards required by relevant laws and regulations have been complied with, please understand that due to technical limitations and possible malicious means, in the Internet industry, even if we try our best to strengthen security measures, it is impossible to always ensure the 100% security of information. We will try our best to ensure the security of the personal information you provide us.

5.5 You know and understand that the system and communication network you use to access our services may have problems due to factors beyond our control. Therefore, we strongly recommend that you take active measures to protect the security of personal information, including but not limited to using complex passwords, changing passwords regularly, and not disclosing your account password and related personal information to others.

5.6 We will formulate emergency response plans, and immediately activate emergency plans when user information security incidents occur, and strive to prevent the impact and consequences of these security incidents from expanding. Once a user information security incident (leakage, loss) occurs, we will promptly inform you in accordance with the requirements of laws and regulations: The basic situation and possible impact of the security incident, the disposal measures we have taken or will take, the suggestions you can independently prevent and reduce the risk, and the remedial measures for you. We will promptly notify you of the relevant information of the event by means of push notifications, emails, letters, text messages and other related forms. When it is difficult to inform you one by one, we will take a reasonable and effective way to publish an announcement. At the same time, we will also report the disposal of user information security incidents in accordance with the requirements of relevant regulatory authorities.

 

 

6.How we manage personal information

We attach great importance to the management of your personal information, and do our best to protect your rights to access, copy, correct, supplement, delete, withdraw consent, cancel your account, and report complaints, so that you have the ability to protect your privacy and information security. In order to optimize your use experience, we may also adjust the operation settings, so the following guidelines are for reference only.

6.1 Personal information inquiry and correction

You can click "menu account" on the Pylon app:

1Check your identity information, including name, email, password, etc;

2If you find your name is incorrect, click the name option directly to modify it. If you want to change your password, you need to click password selection, enter the old password and the new password you want to replace to complete the change.

6.2 Manage your authorization scope

If you want to change the authorization scope, you can modify the authorization scope through the permission setting of your mobile phone. For example, in the operating system of the device itself, you can turn off the identification permissions such as GPS geographical location, camera, storage, change the consent range or withdraw your authorization. After turning off authorization, we will no longer collect information related to these permissions.

Specific business functions and services will need your information to be completed. When you withdraw your consent or authorization, we cannot continue to provide you with the functions and services corresponding to the withdrawal of consent or authorization, nor will we process your corresponding personal information. However, your decision to withdraw your consent or authorization will not affect the personal information processing previously carried out by the company based on your authorization.

6.3 In the following cases, you can request us to delete your personal information:

a. The purpose of processing has been achieved, cannot be achieved, or is no longer necessary to achieve the purpose of processing.

b. We stop providing products or services, or the shelf life has expired.

c. Individual withdraws consent.

d. If our processing of personal information violates laws, administrative regulations or agreements with you.

e. Other circumstances stipulated by laws and administrative regulations.

Personal information deletion: It refers to the behavior of removing personal information from the system involved in the realization of daily business functions, so that it cannot be retrieved and accessed. After you or we assist you to delete relevant information, we may not be able to delete the corresponding information from the backup system immediately due to applicable legal and security technical restrictions, we will store your personal information securely and restrict any further processing of it until backups can be cleared or anonymised.

 

6.4  Despite the above agreement, in accordance with relevant laws, regulations and national standards, we may not be able to respond to your request under the following circumstances:

1Directly related to national security and national defense security.

2Directly related to public safety, public health and major public interests.

3Directly related to criminal investigation, prosecution, trial and enforcement of sentences.

4There is sufficient evidence to show that you have subjective malice or abuse of rights.

5Responding to your request will cause serious damage to the legitimate rights and interests of other individuals and organizations.

6Involving trade secrets.

 

7. Minor Information Protection

7.1 Personal Information Protection Principles for Minors

We attach great importance to the protection of minors' personal information. The Pylon app is mainly for adults. If you are a minor under the age of 18, you should read and agree to this Privacy Policy under the supervision and guidance of your parents or other guardians before using this product. If you are the guardian of a minor under the age of 16, you should read and agree to this Privacy Policy for your ward before using the Pylon app and related services.

7.2 We protect the personal information of minors in accordance with relevant national laws and regulations, We will only collect, use or disclose personal information of minors as permitted by law, with the express consent of parents or other guardians, or as necessary to protect minors. If we find that we have collected the personal information of minors without the prior consent of a verifiable guardian, we will try to delete the relevant information as soon as possible.

7.3 If you are the guardian of a minor, when you have any other questions about the personal information of the minor under your guardianship, please contact us through the contact information published in the company's privacy policy.

 

8. Privacy Policy Updates and Notices

8.1In order to provide you with better services, the Pylon app and related services will be updated and changed from time to time. We will revise this privacy policy from time to time. These revisions constitute a part of this Privacy Policy and have the same effect as this privacy policy. We will not reduce your rights under this Privacy Policy currently in effect without your express consent.

8.2After the update of this privacy policy, we will send the updated version to the Pylon app, and remind you of the updated content through the official website announcement or other appropriate ways before the updated terms take effect, so that you can know the latest version of this Privacy Policy in time.

 

9. Contact details

9.1 The Pylon app is provided by Shanghai Pylon Energy Technology Co., Ltd. If you have complaints, suggestions or questions about personal information protection, you can send your questions to (sys.account@pylontech.com.cn), We will feed back your complaints and reports within 15 days after checking and verifying your user identity.

9.2 If you have any questions, comments or suggestions about the content of this Privacy Policy, you can contact us through the "Feedback" page in the upper left corner of the " PylontechAuto " client.