zPlus Privacy Policy

 

Update Date: August 2, 2023

Effective Date: April 20, 2023

 

Welcome to choose the products or services provided by Beijing zjinnova Software Co., Ltd. (referred to as "we" or " zjinnova "). This policy explains to you how we collect, use, store, and share your personal information when you use our products or services, as well as the rights you have. If you have any questions, opinions, or suggestions, please contact us through the following contact information:

Email: product@zjinnova.com

 

This policy will help you understand the following:

1. How we collect and use your personal information

2. How we use cookies and similar technologies

3. How we share, transfer, and disclose your personal information

4. How we protect your personal information

5. Your rights

6. How we handle personal information of minors

7. How your personal information is transferred globally

8. How this privacy policy is updated

9. How to contact us

Beijing zjinnova Software Co., Ltd. (referred to as "we" or " zjinnova ") deeply understands the importance of personal information to you and will make every effort to protect the security and reliability of your personal information. We are committed to maintaining your trust and adhere to the following principles to protect your personal information: the principle of consistency between rights and responsibilities, the principle of clear purpose, the principle of choice and consent, the principle of minimum necessity, the principle of ensuring security, the principle of subject participation, and the principle of openness and transparency. At the same time, Zhi Jian promises that we will adopt appropriate security measures to protect your personal information in accordance with industry standards. Please read and understand this Privacy Policy carefully before using our products or services.

 

1. How We Collect and Use Your Personal Information

(1) How We Collect Your Information

We collect and use your personal information for the following purposes as stated in this policy:

1. Providing products or services to you

1) Information you provide to us

A. When you use the "Navigation" function, you need to authorize us to access the "location" and "location information" permissions. After you grant authorization, we will read your precise location information and latitude and longitude to provide navigation services according to your needs.

B. When you use the "Add App" function to project other mobile applications onto the central control screen of the vehicle, you need to authorize the opening of the "Allow apps to appear on top" and "App usage" permissions so that you can use this function when projecting.

2) Information we collect during your use of the service

We collect information about your use of products, services, and usage patterns and associate this information to enhance our services. This information includes:

A. Device Information: We will receive and record device-related information based on the specific permissions granted by you during software installation and usage (such as IMEI, IDFA, IDFV, Android ID, MEID, MAC address, OAID, IMSI, ICCID, hardware serial number), current application information (application name, application version number), device parameters and system information (system properties, device model, operating system, carrier information), device location-related information (such as IP address, GNSS information, WiFi status, WiFi parameters, WiFi list, SSID, BSSID, base station information, signal strength information, Bluetooth information, sensor information (vector, acceleration, pressure), device signal strength information, external storage directory).

B. Read and write external storage information on the phone: After the cycling track is completed, we will store the cycling track locally on the phone for your viewing and sharing convenience.

C. Log information: When you use our website or client-provided products or services, we automatically collect detailed usage information about our services as network log records. For example, your search queries, software lists, MAC addresses, language used, access dates and times, your browsing history, call status generated from within the application, etc. Please note that individual device information, log information, etc., are not personally identifiable information. If we combine such non-personal information with other information to identify a specific individual, or use it in conjunction with personal information, during the period of combination, such non-personal information will be treated as personal information. Unless authorized by you or otherwise provided by laws and regulations, we will anonymize and de-identify such personal information.

D. When you contact us, we may save communication/call records and content generated within the application, or the contact information you leave, in order to contact you, help you solve problems, or record the handling plans and results of relevant issues.

E. When you use third-party SDKs integrated in this software, the third party may require you to provide corresponding personal information based on the functionality provided. Before using this functionality, please carefully read the third party's "Privacy Policy". If you do not agree, you can choose to stop using this functionality. Currently.

(II) How we use your information

We collect your information in order to provide you with services and improve their quality. To achieve this purpose, we may use your information for the following purposes:

 

1. Provide you with the product or service you use and maintain, improve, and optimize these services and service experiences.

2. To prevent, detect, investigate fraud, infringement, harm to security, illegal or behavior that violates our agreements, policies, or rules, and protect your, other users' or the public's and our legitimate rights and interests, we may use or integrate your user information, service usage information, device information, log information, and information shared with us based on your authorization or in accordance with the law to comprehensively detect and prevent security incidents and take necessary records, audits, analysis, and disposal measures according to the law.

3. Other purposes with your permission.

 

How we use cookies and similar technologies

The products or services we provide do not use cookies and similar technologies.

 

How we share, transfer, and disclose your information

(I) Sharing

We will not share your personal information with companies, organizations, or individuals outside of our service providers, except in the following cases:

1. Sharing with explicit consent: After obtaining your explicit consent, we will share your personal information with other parties.

2. Sharing in accordance with legal requirements: We may share your personal information with external parties based on legal requirements, regulations, dispute resolution needs, or requests from administrative or judicial authorities.

3. When you are reported by others for infringing intellectual property rights or other legal rights, it is necessary to disclose your necessary information to the complainant for complaint handling.

4. Sharing with authorized partners: For the purpose stated in this privacy policy, some of our services will be jointly provided by us and authorized partners. We may share some of your personal information with our partners to provide better customer service and user experience. For statistical analysis and other purposes, our products may integrate third-party SDKs or similar applications. For the security of your information, we have signed strict data security and confidentiality agreements with third-party SDK service providers, and these companies will strictly comply with our data privacy and security requirements. Unless you give your consent, we will not share your personal identity information with them.

 

(II) Transfer

We will not transfer your personal information to any company, organization, or individual, except in the following cases:

1. Transfer with explicit consent: After obtaining your explicit consent, we will transfer your personal information to other parties.

2. In the event of a merger, acquisition, or bankruptcy liquidation involving us, or other situations involving mergers, acquisitions, or bankruptcy liquidation, if it involves the transfer of personal information, we will require the new company or organization holding your personal information to continue to be bound by this policy; otherwise, we will request the company, organization, and individual to seek your authorization and consent again.

 

(III) Public disclosure

We will only disclose your personal information in the following cases:

1. After obtaining your explicit consent.

2. If we determine that you have violated laws and regulations or seriously violated the relevant agreements and rules of this service or product, or in order to protect the personal and property safety of zjinnova or the public from infringement, we may disclose your personal information, including relevant violations and the measures zjinnova has taken against you, with your consent based on laws and regulations or the relevant agreements and rules of this service or product.

() Exceptions to obtaining authorization and consent for sharing, transferring, and publicly disclosing personal information:

The following circumstances do not require obtaining your authorization and consent for sharing, transferring, and publicly disclosing your personal information:

1.     Related to national security and national defense;

2.     Related to public safety, public health, and major public interests;

3.     Related to criminal investigations, prosecutions, trials, and judgment enforcement;

4.     Necessary for the protection of your or other individuals' vital interests, such as life and property, when it is difficult to obtain your consent;

5.     Personal information that you voluntarily disclose to the public;

6.     Collected from legally disclosed information channels, such as legal news reports and government information disclosure;

7.     Other circumstances stipulated by laws and regulations.

According to legal requirements, sharing and transferring personal information after de-identification, ensuring that the data recipient cannot recover and re-identify the subject of personal information, does not constitute sharing, transferring, and publicly disclosing personal information. The storage and processing of this type of data will not require separate notification and consent from you.

IV. How We Protect Your Information

(1) Storage Period

During your use of our products and services, we will continuously store your personal information. If you cancel your account or actively delete the aforementioned information, we will store your information in accordance with the Cybersecurity Law and other relevant laws and regulations. After you cancel your account or actively delete the aforementioned information, we will no longer use your personal information for commercial purposes, but we may use your personal information after anonymization.

(2) Storage Location

Your personal information is stored within the territory of the People's Republic of China. If some products or services involve cross-border transfer, we will strictly comply with the requirements of laws and regulations and ensure the security of your personal information.

(3) Security Measures

1.     We will take various precautions to protect your personal information from unauthorized access, disclosure, use, modification, damage, or loss. We will use encryption technology to ensure the confidentiality of data. We will use trusted protection mechanisms to prevent data from malicious attacks. We will deploy access control mechanisms to ensure that only authorized personnel can access personal information. We will enhance employees' awareness of the importance of protecting personal information.

2.     We will take reasonable and feasible measures to avoid collecting irrelevant personal information. We will only retain your personal information within the time required to achieve the purposes stated in this policy, unless an extension of the retention period is necessary or permitted by law.

3.     The internet environment is not completely secure, and despite our security measures, please be aware that "perfect security measures" do not exist on the internet. We will do our best to ensure the security of your information.

4.     The internet is not an absolutely secure environment, and email and instant messaging are not encrypted. We strongly recommend that you do not send personal information through such means. Please use complex passwords to help us ensure the security of your account.

5.     If a personal information security incident occurs, we will inform you promptly in accordance with legal requirements: the basic situation and possible impact of the security incident, the measures we have taken or will take to address the incident, advice on how to prevent and reduce risks, and remedial measures for you. We will promptly inform you of the relevant information of the incident through email, letter, phone, push notification, etc. If it is difficult to inform each individual, we will publish a notice in a reasonable and effective manner.

At the same time, we will also report the disposal of personal information security incidents according to the requirements of regulatory authorities.

V. Your Rights

In accordance with the relevant laws, regulations, standards of China, as well as common practices in other countries and regions, we guarantee that you can exercise the following rights in relation to your personal information:

(1) Access to Your Personal Information

You have the right to access your personal information, except for exceptions stipulated by laws and regulations.

(2) Correction of Your Personal Information

When you find that the personal information we process about you is incorrect, you have the right to request correction. You can notify us through telephone or email. We will respond to your correction request within 30 days. To ensure security, we will verify your identity information before you exercise the right to correct information.

(3) Deletion of Your Personal Information

In the following circumstances, you can request us to delete your personal information:

1.     If our processing of personal information violates laws and regulations;

2.     If we collect and use your personal information without your consent;

3.     If our processing of personal information violates the agreement with you;

4.     If you no longer use our products or services or you have canceled your account;

5.     If we no longer provide products or services to you.

If we decide to respond to your deletion request, we will also notify the entities that have obtained your personal information from us to promptly delete it, unless otherwise provided by laws and regulations or these entities have obtained your independent authorization.

When you delete information from our service, we may not immediately delete the corresponding information from our backup systems or anonymize the information.

4) Changing the Scope of Your Authorized Consent
Each business function requires some basic personal information to be completed. For additional collection and use of personal information, you can grant or withdraw your consent at any time.
When you withdraw your consent, we will no longer process the corresponding personal information. However, your decision to withdraw consent will not affect the processing of personal information that was carried out based on your authorization before.

5.     Restricting Automated Decision Making of Information Systems
In certain business functions, we may make decisions solely based on non-human automated decision-making mechanisms, such as information systems and algorithms. If these decisions significantly impact your legitimate rights and interests, you have the right to request an explanation, and we will provide appropriate remedies.

6.     Responding to Your Above-mentioned Requests
To ensure security, you may need to provide a written request or other proof of your identity. We may request you to verify your identity before processing your request. We will respond within thirty days.
For reasonable requests, we generally do not charge a fee. However, for repeated or excessive requests beyond reasonable limits, we may charge a certain cost fee. We may also refuse requests that are repetitious without cause, require excessive technical means (e.g., involve developing new systems or fundamentally changing current practices), pose risks to the legitimate rights and interests of others, or are very impractical (e.g., involve information stored on backup tapes).
In the following situations, according to legal requirements, we may be unable to respond to your requests:

1.     Directly related to national security and national defense;

2.     Directly related to public safety, public health, and major public interests;

3.     Directly related to criminal investigations, prosecutions, trials, and judgment enforcement;

4.     There is sufficient evidence to show your malicious intent or abuse of rights;

5.     Responding to your request would cause serious harm to your or other individuals' legitimate rights and interests;

6.     Involving trade secrets.

6.     Protection of Minors
Our products, websites, and services are primarily targeted towards adults. Minors may not create their own user accounts without the consent of their parents or guardians.
Although the definitions of minors may vary under local laws and customs, we will consider anyone under the age of 18 as a minor.
If we discover that we have collected personal information of a minor without the verifiable consent of their parents in advance, we will take steps to delete the relevant data as soon as possible.

7.     How Your Personal Information Is Transferred Globally
In principle, personal information collected and generated within the territory of the People's Republic of China will be stored within the territory of the People's Republic of China.
As we provide products or services through global resources and servers, this means that, with your authorized consent, your personal information may be transferred to the overseas jurisdiction where you use the product or service, or be accessed from such jurisdictions.
Such jurisdictions may have different data protection laws and may not have relevant laws in place. In such cases, we will ensure that your personal information receives the same level of protection as within the territory of the People's Republic of China. For example, we will request your consent for the cross-border transfer of personal information or implement security measures such as de-identification before cross-border data transfer.

8.     How This Policy Is Updated
Our privacy policy may change.
Without your explicit consent, we will not reduce the rights you are entitled to according to this privacy policy. We will post any changes made to this policy on this page.
For major changes, we will also provide more significant notice (including, for certain services, sending an email notification that specifically explains the changes to the privacy policy).
Major changes referred to in this policy include, but are not limited to:

1.     Significant changes in our service model, such as the purpose of processing personal information, types of personal information processed, and ways of using personal information;

2.     Major changes in ownership structure, organizational structure, etc., such as business adjustments, bankruptcy mergers, and changes in ownership caused by such events;

3.     Major changes in the main objects of personal information sharing, transfer, or public disclosure;

4.     Major changes in your rights regarding the processing of personal information and the ways they are exercised;

5.     Changes in the department responsible for personal information security, contact information, and complaint channels;

6.     When the personal information security impact assessment report indicates a high risk.

9.     How to Contact Us
If you have any questions, opinions, or suggestions regarding this privacy policy, you can contact us through the following ways:
Email: product@zjinnova.com


In general, we will respond within thirty days."