zPlus Privacy Policy
Update
Date: August 2, 2023
Effective
Date: April 20, 2023
Welcome
to choose the products or services provided by Beijing zjinnova
Software Co., Ltd. (referred to as "we" or " zjinnova
"). This policy explains to you how we collect, use, store, and share your
personal information when you use our products or services, as well as the
rights you have. If you have any questions, opinions, or suggestions, please
contact us through the following contact information:
Email:
product@zjinnova.com
This
policy will help you understand the following:
1.
How we collect and use your personal information
2.
How we use cookies and similar technologies
3.
How we share, transfer, and disclose your personal information
4.
How we protect your personal information
5.
Your rights
6.
How we handle personal information of minors
7.
How your personal information is transferred globally
8.
How this privacy policy is updated
9.
How to contact us
Beijing
zjinnova Software Co., Ltd. (referred to as
"we" or " zjinnova ") deeply
understands the importance of personal information to you and will make every
effort to protect the security and reliability of your personal information. We
are committed to maintaining your trust and adhere to the following principles
to protect your personal information: the principle of consistency between
rights and responsibilities, the principle of clear purpose, the principle of
choice and consent, the principle of minimum necessity, the principle of
ensuring security, the principle of subject participation, and the principle of
openness and transparency. At the same time, Zhi Jian
promises that we will adopt appropriate security measures to protect your
personal information in accordance with industry standards. Please read and
understand this Privacy Policy carefully before using our products or services.
1.
How We Collect and Use Your Personal Information
(1)
How We Collect Your Information
We
collect and use your personal information for the following purposes as stated
in this policy:
1.
Providing products or services to you
1)
Information you provide to us
A.
When you use the "Navigation" function, you need to authorize us to
access the "location" and "location information" permissions.
After you grant authorization, we will read your precise location information
and latitude and longitude to provide navigation services according to your
needs.
B.
When you use the "Add App" function to project other mobile
applications onto the central control screen of the vehicle, you need to
authorize the opening of the "Allow apps to appear on top" and
"App usage" permissions so that you can use this function when
projecting.
2)
Information we collect during your use of the service
We
collect information about your use of products, services, and usage patterns
and associate this information to enhance our services. This information
includes:
A.
Device Information: We will receive and record device-related information based
on the specific permissions granted by you during software installation and
usage (such as IMEI, IDFA, IDFV, Android ID, MEID, MAC address, OAID, IMSI,
ICCID, hardware serial number), current application information (application
name, application version number), device parameters and system information
(system properties, device model, operating system, carrier information),
device location-related information (such as IP address, GNSS information, WiFi status, WiFi parameters, WiFi list, SSID, BSSID, base station information, signal
strength information, Bluetooth information, sensor information (vector,
acceleration, pressure), device signal strength information, external storage
directory).
B.
Read and write external storage information on the phone: After the cycling
track is completed, we will store the cycling track locally on the phone for
your viewing and sharing convenience.
C.
Log information: When you use our website or client-provided products or
services, we automatically collect detailed usage information about our
services as network log records. For example, your search queries, software
lists, MAC addresses, language used, access dates and times, your browsing
history, call status generated from within the application, etc. Please note
that individual device information, log information, etc., are not personally
identifiable information. If we combine such non-personal information with
other information to identify a specific individual, or use it in conjunction
with personal information, during the period of combination, such non-personal
information will be treated as personal information. Unless authorized by you
or otherwise provided by laws and regulations, we will anonymize and
de-identify such personal information.
D.
When you contact us, we may save communication/call records and content
generated within the application, or the contact information you leave, in
order to contact you, help you solve problems, or record the handling plans and
results of relevant issues.
E.
When you use third-party SDKs integrated in this software, the third party may
require you to provide corresponding personal information based on the
functionality provided. Before using this functionality, please carefully read
the third party's "Privacy Policy". If you do not agree, you can
choose to stop using this functionality. Currently.
(II)
How we use your information
We
collect your information in order to provide you with services and improve
their quality. To achieve this purpose, we may use your information for the
following purposes:
1.
Provide you with the product or service you use and maintain, improve, and
optimize these services and service experiences.
2.
To prevent, detect, investigate fraud, infringement, harm to security, illegal
or behavior that violates our agreements, policies, or rules, and protect your,
other users' or the public's and our legitimate rights and interests, we may
use or integrate your user information, service usage information, device
information, log information, and information shared with us based on your
authorization or in accordance with the law to comprehensively detect and
prevent security incidents and take necessary records, audits, analysis, and
disposal measures according to the law.
3.
Other purposes with your permission.
How
we use cookies and similar technologies
The
products or services we provide do not use cookies and similar technologies.
How
we share, transfer, and disclose your information
(I)
Sharing
We
will not share your personal information with companies, organizations, or
individuals outside of our service providers, except in the following cases:
1.
Sharing with explicit consent: After obtaining your explicit consent, we will
share your personal information with other parties.
2.
Sharing in accordance with legal requirements: We may share your personal
information with external parties based on legal requirements, regulations,
dispute resolution needs, or requests from administrative or judicial
authorities.
3.
When you are reported by others for infringing intellectual property rights or
other legal rights, it is necessary to disclose your necessary information to
the complainant for complaint handling.
4.
Sharing with authorized partners: For the purpose stated in this privacy
policy, some of our services will be jointly provided by us and authorized
partners. We may share some of your personal information with our partners to
provide better customer service and user experience. For statistical analysis
and other purposes, our products may integrate third-party SDKs or similar
applications. For the security of your information, we have signed strict data
security and confidentiality agreements with third-party SDK service providers,
and these companies will strictly comply with our data privacy and security
requirements. Unless you give your consent, we will not share your personal
identity information with them.
(II)
Transfer
We
will not transfer your personal information to any company, organization, or
individual, except in the following cases:
1.
Transfer with explicit consent: After obtaining your explicit consent, we will
transfer your personal information to other parties.
2.
In the event of a merger, acquisition, or bankruptcy liquidation involving us,
or other situations involving mergers, acquisitions, or bankruptcy liquidation,
if it involves the transfer of personal information, we will require the new
company or organization holding your personal information to continue to be
bound by this policy; otherwise, we will request the company, organization, and
individual to seek your authorization and consent again.
(III)
Public disclosure
We
will only disclose your personal information in the following cases:
1.
After obtaining your explicit consent.
2.
If we determine that you have violated laws and regulations or seriously
violated the relevant agreements and rules of this service or product, or in
order to protect the personal and property safety of zjinnova or the public
from infringement, we may disclose your personal information, including
relevant violations and the measures zjinnova has
taken against you, with your consent based on laws and regulations or the
relevant agreements and rules of this service or product.
(四) Exceptions to obtaining authorization
and consent for sharing, transferring, and publicly disclosing personal
information:
The
following circumstances do not require obtaining your authorization and consent
for sharing, transferring, and publicly disclosing your personal information:
1.
Related to national security and national defense;
2.
Related to public safety, public health, and major public interests;
3.
Related to criminal investigations, prosecutions, trials, and judgment enforcement;
4.
Necessary for the protection of your or other individuals' vital interests,
such as life and property, when it is difficult to obtain your consent;
5.
Personal information that you voluntarily disclose to the public;
6.
Collected from legally disclosed information channels, such as legal news
reports and government information disclosure;
7.
Other circumstances stipulated by laws and regulations.
According
to legal requirements, sharing and transferring personal information after
de-identification, ensuring that the data recipient cannot recover and
re-identify the subject of personal information, does not constitute sharing,
transferring, and publicly disclosing personal information. The storage and
processing of this type of data will not require separate notification and
consent from you.
IV.
How We Protect Your Information
(1)
Storage Period
During
your use of our products and services, we will continuously store your personal
information. If you cancel your account or actively delete the aforementioned
information, we will store your information in accordance with the
Cybersecurity Law and other relevant laws and regulations. After you cancel
your account or actively delete the aforementioned information, we will no
longer use your personal information for commercial purposes, but we may use
your personal information after anonymization.
(2)
Storage Location
Your
personal information is stored within the territory of the People's Republic of
China. If some products or services involve cross-border transfer, we will
strictly comply with the requirements of laws and regulations and ensure the
security of your personal information.
(3)
Security Measures
1.
We will take various precautions to protect your personal information from
unauthorized access, disclosure, use, modification, damage, or loss. We will
use encryption technology to ensure the confidentiality of data. We will use
trusted protection mechanisms to prevent data from malicious attacks. We will
deploy access control mechanisms to ensure that only authorized personnel can
access personal information. We will enhance employees' awareness of the
importance of protecting personal information.
2.
We will take reasonable and feasible measures to avoid collecting irrelevant
personal information. We will only retain your personal information within the
time required to achieve the purposes stated in this policy, unless an
extension of the retention period is necessary or permitted by law.
3.
The internet environment is not completely secure, and despite our security
measures, please be aware that "perfect security measures" do not
exist on the internet. We will do our best to ensure the security of your
information.
4.
The internet is not an absolutely secure environment, and email and instant
messaging are not encrypted. We strongly recommend that you do not send
personal information through such means. Please use complex passwords to help
us ensure the security of your account.
5.
If a personal information security incident occurs, we will inform you promptly
in accordance with legal requirements: the basic situation and possible impact
of the security incident, the measures we have taken or will take to address
the incident, advice on how to prevent and reduce risks, and remedial measures
for you. We will promptly inform you of the relevant information of the
incident through email, letter, phone, push notification, etc. If it is
difficult to inform each individual, we will publish a notice in a reasonable
and effective manner.
At
the same time, we will also report the disposal of personal information
security incidents according to the requirements of regulatory authorities.
V.
Your Rights
In
accordance with the relevant laws, regulations, standards of China, as well as
common practices in other countries and regions, we guarantee that you can
exercise the following rights in relation to your personal information:
(1)
Access to Your Personal Information
You
have the right to access your personal information, except for exceptions
stipulated by laws and regulations.
(2)
Correction of Your Personal Information
When
you find that the personal information we process
about you is incorrect, you have the right to request correction. You can
notify us through telephone or email. We will respond to your correction
request within 30 days. To ensure security, we will verify your identity
information before you exercise the right to correct information.
(3)
Deletion of Your Personal Information
In
the following circumstances, you can request us to delete your personal
information:
1.
If our processing of personal information violates laws and regulations;
2.
If we collect and use your personal information without your consent;
3.
If our processing of personal information violates the agreement with you;
4.
If you no longer use our products or services or you have canceled your
account;
5.
If we no longer provide products or services to you.
If
we decide to respond to your deletion request, we will also notify the entities
that have obtained your personal information from us to promptly delete it,
unless otherwise provided by laws and regulations or these entities have
obtained your independent authorization.
When
you delete information from our service, we may not immediately delete the
corresponding information from our backup systems or anonymize the information.
(4) Changing the Scope of Your Authorized Consent
Each
business function requires some basic personal information to be completed. For
additional collection and use of personal information, you can grant or
withdraw your consent at any time.
When you withdraw your consent, we will no
longer process the corresponding personal information. However, your decision
to withdraw consent will not affect the processing of personal information that
was carried out based on your authorization before.
5.
Restricting Automated Decision Making of Information Systems
In certain
business functions, we may make decisions solely based on non-human automated
decision-making mechanisms, such as information systems and algorithms. If
these decisions significantly impact your legitimate rights and interests, you
have the right to request an explanation, and we will provide appropriate
remedies.
6.
Responding to Your Above-mentioned Requests
To ensure security, you may need to
provide a written request or other proof of your identity. We may request you
to verify your identity before processing your request. We will respond within
thirty days.
For reasonable requests, we generally do not charge a fee.
However, for repeated or excessive requests beyond reasonable limits, we may
charge a certain cost fee. We may also refuse requests that are repetitious
without cause, require excessive technical means (e.g., involve developing new
systems or fundamentally changing current practices), pose risks to the
legitimate rights and interests of others, or are very impractical (e.g.,
involve information stored on backup tapes).
In the following situations,
according to legal requirements, we may be unable to respond to your requests:
1.
Directly related to national security and national defense;
2.
Directly related to public safety, public health, and major public interests;
3.
Directly related to criminal investigations, prosecutions, trials, and judgment
enforcement;
4.
There is sufficient evidence to show your malicious intent or abuse of rights;
5.
Responding to your request would cause serious harm to your or other
individuals' legitimate rights and interests;
6.
Involving trade secrets.
6.
Protection of Minors
Our products, websites, and services are primarily
targeted towards adults. Minors may not create their own user accounts without
the consent of their parents or guardians.
Although the definitions of minors
may vary under local laws and customs, we will consider anyone under the age of
18 as a minor.
If we discover that we have collected personal information of a
minor without the verifiable consent of their parents in advance, we will take
steps to delete the relevant data as soon as possible.
7.
How Your Personal Information Is Transferred Globally
In principle, personal
information collected and generated within the territory of the People's
Republic of China will be stored within the territory of the People's Republic
of China.
As we provide products or services through global resources and
servers, this means that, with your authorized consent, your personal
information may be transferred to the overseas jurisdiction where you use the
product or service, or be accessed from such jurisdictions.
Such jurisdictions
may have different data protection laws and may not have relevant laws in
place. In such cases, we will ensure that your personal information receives the
same level of protection as within the territory of the People's Republic of
China. For example, we will request your consent for the cross-border transfer
of personal information or implement security measures such as
de-identification before cross-border data transfer.
8.
How This Policy Is Updated
Our privacy policy may change.
Without your explicit
consent, we will not reduce the rights you are entitled to according to this
privacy policy. We will post any changes made to this policy on this page.
For
major changes, we will also provide more significant notice (including, for
certain services, sending an email notification that specifically explains the
changes to the privacy policy).
Major changes referred to in this policy
include, but are not limited to:
1.
Significant changes in our service model, such as the purpose of processing
personal information, types of personal information processed, and ways of
using personal information;
2.
Major changes in ownership structure, organizational structure, etc., such as
business adjustments, bankruptcy mergers, and changes in ownership caused by
such events;
3.
Major changes in the main objects of personal information sharing, transfer, or
public disclosure;
4.
Major changes in your rights regarding the processing of personal information
and the ways they are exercised;
5.
Changes in the department responsible for personal information security,
contact information, and complaint channels;
6.
When the personal information security impact assessment report indicates a
high risk.
9.
How to Contact Us
If you have any questions, opinions, or suggestions regarding
this privacy policy, you can contact us through the following
ways:
Email: product@zjinnova.com
In
general, we will respond within thirty days."