PAWTECH Privacy Policy
Overview of PAWTECH Privacy Policy
We attach great importance to protecting the personal information of users ("you") and hope to briefly introduce to you how we collect, use and protect your personal information through this profile. This summary is an integral part of EZVIZ Privacy Policy. If you want to know our detailed privacy policy, please drop down to view the privacy policy text.
I How we collect and use your personal information
II We will collect and process your personal information in accordance with the principles of legality, legitimacy, necessity and integrity, and explain the types of personal information collected and processed when you use our products / services, as well as the corresponding processing purposes and collection methods. Please refer to the corresponding Privacy Statement of PAWTECH Application for details (Including personal APP information collection list and third-party SDK list). How will we share your personal information?
In order to provide you with more perfect and high-quality products or services, your personal information may be shared among service providers. We will continuously improve the security level of your personal information in accordance with the requirements of laws and regulations and with reference best practices of the industry. We will ask for your authorization again once your personal sensitive information is referred or the shared parties are added. Furthermore, we will evaluate the risk of the behavior that provides information outwards. Please refer to the corresponding Privacy Statement of PAWTECH Application for details (Including personal APP information collection list and third-party SDK list).
III How do you manage your information
We will realize your personal information access, correction, deletion, withdrawal of consent and other legal rights through permission setting, customer service and various ways and means, so that you will be fully capable of protecting your personal information security. Please refer to the corresponding Privacy Statement of PAWTECH Application for details (Including personal APP information collection list and third-party SDK list).
IV How do we protect minors
Our products and services are mainly for adults with full civil capacity. If you are a child under the age of 14, please carefully read the EZVIZ Children's Personal Information Protection Rules with your parents or other guardians before using our products and / or services. You can use our products and / or services under the guidance of your guardian after confirming that you have obtained the consent of your parents or guardians.
V How to contact us?
If you have any questions, comments or suggestions about this policy or your personal information, please send an email to [lynn@pawtech.com.cn] or call our personal information protection personnel at 400-900-3661.
You can also send a letter as follows:
Address: PAWTECH safety group,258 Qingchuan Road, Huzhen Town, Jinyun County, Lishui City, Zhejiang Province
Post code: 321400
We will reply within 15 working days.
PAWTECH privacy policy main body
Issue / update date: Nov 30, 2022
Effective date: Dec 02, 2022
[preface]
Welcome to use the “PAWTECH” (Refers to an intelligent device control application developed by [company name], which enables you to realize the networking, remote viewing and control of devices through simple operation, hereinafter referred to as "PAWTECH" or "us") services. We attach great importance to user privacy and know the importance of personal information to you. To this end, we promise to strictly comply with the requirements of laws and regulations, refer to the mature security standards in the industry, and do our best to protect the security of your personal information. For this reason, we hereby formulate this "PAWTECH" APP Privacy Policy (hereinafter referred to as "this policy") so that you can understand in detail how PAWTECH will collect, use, save, disclose and transfer your personal information and what rights you enjoy.
[special tips]
Please read this policy carefully before using PAWTECH (for minors, please read it with your guardian) and understand the content closely related to your rights and interests. We will highlight it in bold or underlined form; The explanation and source of each special term are listed in the form of appendix;
The content closely related to your rights and interests will be highlighted in bold or underlined form; The permission acquisition description of the licensed software and the integration status of the third-party SDK will be described in detail in the form of a specific chapter. We hope that you will carefully read and understand this privacy policy before using the licensed software and the corresponding PAWTECH services, and use it after agreeing to this policy; If you do not agree with the contents of this policy, it may lead to the failure of the PAWTECH service, or the failure to achieve the expected service effect. You should immediately stop accessing / using PAWTECH service. Please note that this policy does not apply to other third-party products / services you access through our products / services ("Other third parties", include third party websites and third party service providers). Please refer to the privacy policy or similar statement of the third party for specific provisions.
Please carefully read and fully understand this policy before using the products / services provided by us. The content closely related to your rights and interests will be highlighted in bold or underlined form; Once you use or continue to use our products / services, you agree that we will process your relevant information in accordance with this privacy policy.
If you have any questions, comments or suggestions about this policy or your personal information, please send an email to [lynn@pawtech.com.cn] or call us at 400-900-3661.
Your understanding and cooperation are very important for us to protect your personal information and privacy and safety. Your ID card, password, verification code and other information are kept by yourself. Please carefully evaluate the physical and electronic environment when you keep, input and use the information to prevent information leakage. In addition, our products and / or services may enable you to collect or use content containing personal information of others (For example, you can use an intelligent device with video recording function to view personnel activities within a specified range); In order to protect the legitimate rights and interests of the personal information subject, please ensure that you have legally obtained the authorization and consent of the relevant subject before submitting to us or collecting others' personal information through our products and or services. In particular, if the above information involves the personal information of the child, you need to obtain the consent of the corresponding child's guardian in advance.
[contents]
You can read the corresponding chapters according to the following indexes to further understand the specific contents of this policy:
Chapter 1: how we collect and use your personal information
1. Personal information we collect and use
2. Exceptions to obtaining authorization and consent in advance when collecting and using personal information
3. Changes with the purpose of collecting and using personal information
Chapter 2: How do we use cookies and similar technologies
I About cookies and similar technologies
II Use and management of cookies and similar technologies
III Our commitment to the use of cookies and similar technologies
Chapter III: how we entrust, share, transfer and publicly disclose your personal information
1. Entrusting and processing
2. Sharing
3. Transfer
4. Public disclosure
5、 Exceptions to the prior authorization and consent for sharing, transferring and publicly disclosing personal information
Chapter 4: how to protect and preserve your personal information
1. Our technology and security measures to protect your personal information
2. Storage of your personal information
Chapter 5: your rights
1. Access or correct personal information
2. Delete personal information
3. Change the scope of authorization consent or withdraw authorization
4. Account cancellation
5. Automatic decision of constrained information system
6. Get a copy of your personal information and request response
Chapter 6: how we deal with minors' personal information
Chapter VII: revision of this policy
Chapter 8: how to contact us
Appendix: relevant definitions
I. Personal information we collect and use
For the purpose of providing you with our products / or services, we may directly or indirectly collect, save and use personal information related to you, including:
Ÿ In order to provide you with the basic business functions of our products and / or services, you must provide the corresponding information or you will not be able to use the corresponding basic business functions normally;
Ÿ If you refuse to provide the necessary information provide you with value-added or additional business functions of our products and / or services, you will not be able to normally use the relevant additional business functions or achieve the function effect we plan to set, but it will not affect your normal use of the basic business functions of our products and / or services.
In order to ensure the normal realization of relevant business functions, we may collect and use your personal information by opening the system permission in some services provided to you; We will ask you in the form of a pop-up window and obtain your consent before calling. Please refer to the corresponding PAWTECH Application Privacy Statement for the specific permission calling instructions under each APP.
Please note that by opening any permission, you agree to authorize us to collect and use relevant personal information to provide you with corresponding services. Once you close any permission, you cancel the authorization. We will no longer continue to collect and use relevant personal information based on the corresponding permission, nor can we continue to provide you with services corresponding to the changed permission status. Your decision to close the permission will not affect the collection and use of information previously provided based on your authorization.
We will collect and use your personal information for the following purposes of this policy:
1. Registration, login and verification of the PAWTECH account:
(1) When you register or log in to the PAWTECH account, we will collect your mobile phone number, password and verification code; These information is to help you complete the registration and / or login of the PAWTECH account, protect your account security and meet the network real name system requirements of relevant laws and regulations; After your registration is completed, you can choose to complete your nickname, avatar, email address and region information according to your own needs in order to use our other services(The specific service content and corresponding information will be notified to you through the system prompt). Unless otherwise specified, refusal to submit these supplementary information will not affect your use of basic functions of the PAWTECH account.
2) In order to make your login more secure and convenient, if your device supports the fingerprint function or face ID function, you can choose to use the fingerprint or face ID login method. You need to enter your fingerprint information or face ID information on your device to complete the information verification. We only receive the verification results and do not collect your fingerprint information or face ID information. Facial image and fingerprint information belong to your sensitive personal information. If you do not need to use this login method, you can also choose the login method of password or SMS verification code.
2. CloudPlay online purchase service:
When you pay to purchase CloudPlay services, you can choose the payment services provided by the third-party payment institutions (including Alipay and Wechat payment, hereinafter referred to as "Payment institutions") cooperating with the PAWTECH. We need to share your order information with these payment institutions so that they can confirm your payment instructions and complete the payment; at the same time, in order to let us know your payment status in time for corresponding shipment preparation, you agree that we can collect information institution you choose.
3. Binding, unbinding and networking control of smart hardware devices:
After logging into your PAWTECH account, you can bind your smart hardware products in the PAWTECH APP for remote control or management (i.e. "PAWTECH service"). We will collect and use the corresponding personal information according to the specific functions you choose to use:
(1) When you bind your smart device to use the PAWTECH service, we will collect the information of your bound smart device (device serial number, device verification code) and the basic information of the terminal device (APP type, APP version number, device model, operating system version number, operator information); If your smart device is connected through WiFi, we will also collect your network connection method and WiFi information (Wi-Fi SSID information, WiFi MAC address information, signal strength); If your smart device is connected via Bluetooth, we will collect the Bluetooth MAC address information of your device. This kind of information is the basic information that must be collected to complete the binding of smart devices and further provide you with PAWTECH services.
(2) When you use preview function of the monitoring video, we will collect your current video screenshots so as to facilitate you to identify the monitoring location; The screenshot will be deleted immediately the next day. You can reject our collection through video encryption. It should be noted that unless you otherwise use value-added services based on video analysis and authorize the PAWTECH accordingly, we will not view your video content and / or the above video screenshots.
(3) When you use the function involving audio information input, we will collect the audio content you upload after you turn on the microphone permission, so as to achieve the purpose of this function for you. You can turn off microphone permission to reject our collection through system settings, but this will prevent you from using this function.
(4) When you use the analysis or comparison function based on the user's basic information (including face / human shape recognition, vehicle recognition, voice recognition, character recognition and face / fingerprint unlocking), you need to input the face picture, fingerprint, voice and text information after opening the photo album permission, so that we can extract and process the characteristic values of the basic information you submitted and implement relevant services on the hardware. Please refer to the interface prompt for specific operations. If you refuse to provide, you will not be able to use the relevant functions. Face pictures, fingerprint information and sound information are sensitive personal information, and you must decide whether to use them. Please note that some smart devices may support local-based analysis or comparison functions (including fingerprint unlocking, subject to the specific instructions of the device). Under such local functions, the PAWTECH only receives verification results and push message reminders to you, but will not collect your information by sending your information back to the server or other means (unless you actively authorize it).
(5) When you enable the message reminder function, we will collect the video screenshots taken by your camera, and then push the screenshots to you as the content of the reminder message. You can turn off this function through the alarm message setting button. It should be noted that unless you otherwise use value-added services based on video analysis and authorize the PAWTECH accordingly, we will not view your video content and / or the video screenshots.
(6) When you use smart devices or functions related to video and video sharing, you need to submit the account information of the relevant person, as prompted on the sharing function page; if you refuse to provide, you will not be able to use the relevant functions. It should be reminded that sharing or similar functions will make your corresponding personal information public within the scope specified by you. You must carefully decide whether to use them and be responsible for the relevant consequences.
(7) When you use value-added services based on the PAWTECH and EZIOT platform, we will collect your personal information directly related to the purpose of service. The specific service purpose and the personal information collected and processed to achieve the service purpose will be prompted to you in the form of service description or use rules and we will obtain your explicit consent.
(8) When you use geo-fencing and weather linkage services, we will collect and process your geographic location information after obtaining your consent, in order to provide you with corresponding services. This information is sensitive. Refusing to provide this information will only make you unable to enable the above services, but it will not affect your normal use of other functions of the PAWTECH services. In addition, you can also open or close the geographical location permission at any time through the following path.
IOS system: [Settings-Privacy-Location services-The PAWTECH]
Android system: [Settings->Application program->The PAWTECH->Permission->Location]
4. Customer service:
We provide you with the PAWTECH service consultation, use support and other customer services through telephone, online system and other ways. In order to contact you easily, help you solve the problem as soon as possible or record the handling plan and results of related problems, we may collect and keep the communication / call records and related contents between you and us in accordance with this policy, including account information, information of bound products, other information you provide to prove relevant facts, or the contact information you leave.
5. Comment and questionnaire functions:
You can publicly publish information through the information publishing function of comments and wish lists provided by us. In addition, we may push the questionnaire to you from time to time, or make a return visit after you use the product or service. We will record the contact information, feedback problems or suggestions you submitted when using the above functions, so as to improve our products or services and enhance your use experience. Please note that the comments and wish list (experience of use) you submitted are publicly displayed in the PAWTECH software, which may bring you certain risks. It is recommended that you carefully disclose your personal information in your submission.
During your use of our products and / or services, in order to identify the abnormal status of your account and ensure the security of your account and system operation, we may directly or indirectly collect and store relevant information generated during your use of our products and / or services, including:
(1) Terminal equipment information: we will receive and record the terminal equipment information you use to install and use the PAWTECH software according to the specific permissions you grant during software installation and use, including App type, App version number, device model, version number of the operating system, language of the operating system, IP address, network access method and operator. Please understand that such information is the basic information we must collect when providing services, ensuring the normal operation of products and updating the PAWTECH software.
(2) Smart device information: When your smart device is bound, we will automatically receive and record the information of relevant smart devices, including type, model, firmware number, MAC address, system version number and system settings. We rely on this information to provide you with services and ensure the safe operation of the device; For example, when the system is set to allow automatic upgrading of devices (this setting is enabled by default on some devices), we will automatically install and run the upgrade package for you when it is available, so as to ensure that your device can always be effectively adapted to the PAWTECH you use.
(3) Log information: When you use our services, we may automatically collect (including in the background running state) your detailed usage of our services and save them as relevant network logs. We may record the basic information of your terminal device (App type, App version number, device model, operating system version number, operating system language), network information (IP address, network connection mode and operator), and your operation records (page exposure, click button, jam, crash data).
Please note that the identity of a specific natural person cannot be recognized by separate smart device information and log information. If we combine this kind of non-personal information with other information to identify specific natural person, or combine it with personal information, this kind of non- personal information may be regarded as personal information during the combination.
1. We may integrate and use your personal information and / or other information related to your service or product use behavior obtained in a legal way, so that you can initiate a complaint and we can optimize the quality and process of customer service.
2. We may make statistics on the use of our products and / or services, and use the de-identified information that cannot identify you and cannot be recovered for the establishment of a database and commercial use, hereinafter referred to as "statistical information"; We may share these statistical information with the public or third parties to show the overall use trend of our products and / or services and / or form relevant market satisfaction research reports, service improvement plans and other research results.
3. When we want to use your personal information for other purposes not specified in this policy, or when the information collected for specific purposes is used for other purposes, we will ask for your consent in advance by checking it on your own initiative.
You are fully aware that according to the Information security technology—Personal information security specification and its legal basis, your authorization and consent are not required for the collection and use of your personal information in the following cases:
1. Related to the obligations under laws and regulations of the PAWTECH.
2. Directly related to national security and national defense security;
3. Directly related to public safety, public health and major public interests;
4. Directly related to criminal investigation, prosecution, trial and judgment execution;
5. To safeguard your or others’ lives, property and other major legitimate rights and interests, but difficult to obtain your consent;
6. The personal information involved is disclosed to the public by yourself;
7. Necessary information for you to sign and perform the contract or other written documents with us;
8. Your personal information collected from legally disclosed information, such as legal news reports, government information disclosure and other channels;
9. Necessary to maintain the safe and stable operation of our products and / or services, such as finding and handling the faults of products and / or services, discovering and investigating fraud, illegality, infringement or breach of contract.
Please understand that with the business expansion of the PAWTECH, our Internet products and / or services may be adjusted and changed. In principle, when the new function or service is related to the function or service we currently provide, the personal information collected and used will be considered to be directly or reasonably related to the original processing purpose. Under the scenes that are not directly or reasonably related to the original processing purpose, when we collect and use your personal information, we will inform you in the form of page prompts, interactive processes and agreement confirmation in accordance with the requirements of laws, regulations and national standards, and obtain your consent again.
Cookie is a mechanism that supports the server (or script) to store and retrieve information on the website or the App. It is a common technology in the Internet. Cookie like technologies are other technologies that can be used for cookie like purposes, such as beacon, website beacon, and embedded script.
At present, we will place secure cookies and website beacons in the software to collect your information in order to provide you with a more personalized user experience and services. Please know that with the development of technology and the further improvement of our products and services, we may also use other cookie like technologies.
1. When you use PAWTECH products or services, we will send one or more small data files called cookies on your computer or mobile device to simplify your repeated login steps, store your browsing preferences, help judge your login status and account or data security. The cookie assigned to you is unique and can only be read by the web server that publishes the cookie to your domain.
2. You can manage or delete cookies according to your preferences. For details, please see Aboutcookies.org. You can clear all cookies saved on the computer. Most web browsers will automatically accept cookies, but you can usually modify the settings of the browser to reject cookies based on your own needs; you can also clear all cookies saved in the software. However, if you do so, you may need to change the user settings each time you visit the EZVIZ website or software, and the corresponding information you recorded before will also be deleted, which may have a certain impact on the security of the service you use.
We promise that the PAWTECH's research on cookies and related technologies is only for the purpose of improving service / product quality and optimizing user experience, and we will not use it for any purpose other than those stated in this policy. In addition, for the third-party service providers that connect their services to our products or services, if they will also collect your personal information through cookies and similar technologies, we will do our best in business to impose constraints, asking them to comply with the requirements of cookies and related technology applications under this policy.
I. Entrusting
We may entrust the authorized partner to process your personal information, so that the authorized partner can provide some services or realize specific functions for you on behalf of us within the scope of authorization. We will entrust the processing of your information for the legal, legitimate, necessary, specific and clear purpose of this policy statement. At the same time, we will clarify the purpose, duration, processing method and types of personal information of the entrusted processing in the form of a written agreement, and make agreement with authorized partners on strict data protection measures to enable them to process personal information in accordance with this policy and the written agreement, and supervise the personal information processing activities of authorized partners.
In addition, when the authorized partner provides the processing of the entrusted information through the embedded SDK or other similar applications, we will carry out strict security testing on the application program interface (API) and software tool development kit (SDK) of the authorized partner to obtain the relevant information to ensure that they receive and use the entrusted information within the agreed scope.
II. Sharing
We promise to share your personal information with third parties only for legal, legitimate, necessary, specific and clear purposes, and will only share the personal information necessary for the realization of relevant purposes. At the same time, we will also manage third parties through various ways, including strict access, confidentiality agreement, audit and supervision, and require them to handle relevant information with confidentiality and security measures not lower than the standard required by this policy.
We will not share your personal information to others, except in the following cases:
(1) With the express of you or your guardian: After obtaining the explicit consent of you or your guardian, we will share your personal information with other parties;
(2) Sharing necessary to fulfill legal obligations: We may share your personal information in accordance with the provisions of laws and regulations, the necessity of litigation and dispute resolution, or the requirements of judicial, administrative and other competent authorities in accordance with the law and the necessity of performing other legal obligations;
(3) Share with our affiliates: We will only share the necessary personal information and be bound by the purposes stated in this policy. If we share your sensitive personal information or our affiliated companies change the purpose of using and processing your personal information, we will ask for your authorization and consent again. We promise that we will only share necessary personal information, and such sharing is subject to the purpose of this policy; At the same time, we will ensure security through a variety of measures, including legal documents between affiliated companies, internal systems and employee authority isolation.
(4) Share with our partners to serve you according to the relevant service agreement and usage rules between you and the PAWTECH: It depends on the products or services you purchase through each PAWTECH software and CloudPlay services and / or value-added services you choose to enable.
We remind that the shared party may have its own independent privacy policy or relevant statement. We suggest you carefully review it before making relevant authorization and make the choice you think is appropriate.
Please refer to the corresponding PAWTECH Privacy Statement (including the app personal information collection list and the third-party SDK list) for details.
III. Transfer
With the development of our business, we and our related parties may conduct mergers, acquisitions, reorganizations, asset transfers or similar transactions. If the transfer of personal information is involved, we will require the companies and organizations that receive your personal information to continue to be bound by this privacy policy. Otherwise, we will require the company or organization to re seek your authorization and consent.
IV. Public disclosure
We will only publicly disclose your personal information under the following circumstances:
(1) After obtaining your explicit consent;
(2) Disclosure based on law: In the cases of mandatory requirements of laws, legal procedures, lawsuits or government authorities, or to protect the personal and property security of EZVIZ users or the public from infringement, we may publicly disclose personal information related to your illegal activities or breach of contract to the extent explicitly requested by the legal documents of administrative and judicial organs and other functional departments.
V. Exceptions to obtaining authorization consent in advance when sharing, transferring or publicly disclosing personal information.
Please understand that in accordance with the applicable laws, regulations and national standards including the Personal Information Protection Law of the People’s Republic of China, the Cybersecurity Law, The Information Security Technology—Personal Information Security Specification, we don’t need your authorization consent to share, transfer, publicly disclose your personal information in the following situations:
1. Those related to the PAWTECH’s performance of obligations under laws and regulations.
2. Those directly related to national security and national defense security;
3. Those directly related to public security, public health or major public interests;
4. Those directly related to criminal investigation, prosecution, trial and execution of judgement;
5. For the protection of your or other individual’s life, property and other major legitimate rights and interests, but it is difficult to obtain the consent of the individual;
6. Personal information disclosed to the public by yourself;
7. Personal information collected from legally disclosed information, such as legal news reports, government information disclosure and other channels.
Chapter 4: How do we protect and preserve your personal information
I. Our technological and security measures to protect your personal information
We strive to safeguard the security of user’s information to prevent loss, improper use, tampering, unauthorized access or disclosure of information:
1. Technical measures of data security
We adopt security measures that meet legal requirements and industry standards to prevent user’s personal information from being illegally accessed, copied, modified, transmitted, lost, damaged, processed or used. For example, our network service adopts the encryption technology of transmission security protocol to provide browsing services through a variety of ways including HTTPS, to ensure the security of user data in the transmission process; the user’s sensitive personal information (including biometric information) is encrypted and saved by security measures such as encryption technology, permission control, de-identification/anonymization, and isolated by isolation technology at the same time; In the display of personal information, we’ll use various data desensitization technologies including encryption to enhance the security of personal information in use; in the environment of technology development or internal market analysis, we only use the de-identified information for statistical analysis.
2. Data protection management organization measures
We have established special department for data security and personal information protection, personal information protection specialists, information security emergency response team and other organizations to promote and ensure the security of data and personal information. In the meantime, we have established a series of institutional measures including data classification and grading system, data security management specification and data security development standard to regulate the storage and use of personal information; a strict data access system is set up to protect personal information, avoid violation use of data through permission control and multiple identity authentication technology; Special data and technology security audit is adopted, log audit and behavior audit measures have been set up. In order to further enhance information security awareness, we will also hold training courses on data security and privacy protection to enhance employee’s awareness of the importance of protecting personal information.
3. Security incident handling
To deal with various possible risks including personal information leakage, damage and loss, we have instituted the EZVIZ Privacy Data Leakage Response Management Procedure system, which defines the classification and grading standards of security incidents and security holes as well as the corresponding processing procedures. According to the requirements of security incident handling specifications, we will launch security preparedness for different safety events to stop losses, analyze, locate, formulate remedial measures and cooperate with relevant departments to trace and crack down. At the same time, we have developed an emergency treatment plan, which will be launched immediately in case of user information security incidents, and strive to prevent the expansion of the impact and consequences of security incidents.
Once a personal information security incident occurs, we will promptly inform you of the basic information and possible effect of the incident in accordance with the requirements of laws and regulations, and we have taken or will inform you by e-mail, letter, telephone, push notification, etc. When it is difficult to inform the subject of personal information one by one, we will take a reasonable and effective way to issue an announcement. If the relevant incident involves the personal information of children, we will inform the children and their guardians according to law. At the same time, we will report to the relevant competent authorities in accordance with the requirements of laws and regulations.
Please be aware and understand that although the above reasonable and effective measures have been taken, in view of the open nature of the network environment, we strongly recommend that you take positive measures to help us ensure the security of your personal information, such as setting a complex password, regularly changing your account password, not disclosing your sensitive personal information including the account password to others, and using information sharing or sharing functions cautiously. If you find that your personal information has been leaked, especially your account name or password, please contact us immediately according to the contact information provided in this privacy policy so that we can take corresponding measures.
1. Storage area: we will store the user's personal information collected in the mainland of the People's Republic of China in China in accordance with laws and regulations. PAWTECH will not transmit your personal information outside China, unless we have obtained your explicit consent or in order to implement the requirements of laws and regulations.
2. Storage period: unless there are mandatory storage requirements in laws and regulations, we will only retain your personal information for as long as necessary to achieve the purpose stated in this policy. For example, the E-commerce Law of the People’s Republic of China requires that the storage time of commodity and service information as well as transaction information shall be no less than three years from the date of transaction completion.
We judge the storage period of personal information mainly by referring to the following standards and whichever is longer: the service time of PAWTECH or products provided to you, the completion of transaction objectives related to you, and the maintenance of relevant transaction and business records in response to your possible inquiries or complaints; Ensure the safety and quality of our services for you; Whether you agree to a longer retention period or not; Whether there are other special agreements or provisions of laws and regulations concerning the retention period.
After the retention period expired, we will delete your personal information or anonymize it as required by law. If you cancel your account or delete your personal information by yourself, we will deal with it in accordance with the relevant laws and regulations.
3. Termination of operations: in case of termination of operation, we will notify you at least 30 days in advance and process your personal information according to the requirements of laws and regulations after termination of operations.
In accordance with relevant laws, regulations, standards of China and the common practice of other countries and regions, we guarantee that you can exercise the right of subject of personal information legally. PAWTECH provides an online access to exercise rights. In the meantime, you can also contact PAWTECH personal information protection specialist [open-team@EZVIZlife.com] for further support. You can conveniently exercise the following rights of subject of personal information:
You have the right to access your personal information, the exceptions provided by laws and regulations are excluded. If you want to exercise data access, you can access it by yourself in the following ways:
(1) Your account information: in the “PAWTECH” client, you can enter the personal information and account security page through “Me” under the main interface, and on this page you can check the avatar, nickname, mobile phone number, password, e-mail, third-party login information you submitted to PAWTECH. You can also update some relevant information through the above ways.
(2) Your usage of PAWTECH service. In the PAWTECH client, through the “EZVIZ” under the main interface you can view the intelligent devices that you have bound, through “Settings” page in the upper right corner of a single device preview box you can also view product information including device model, serial number, user manual, and your use information including device network access method, value-added service usage, and sharing.
(3) Personal information you cannot access and correct: except for the information listed above, we cannot provide you with access and correction services for part of your personal information, which is mainly your device information collected to improve your user experience and ensure transaction security and necessary personal information to ensure the normal operation of the business functions you choose. We will use the above information within the scope of your authorization, and you cannot access and correct it, but you can contact us to delete or anonymize it.
The information you can directly clear or delete in our product and/or service page, including unnecessary account registration information like avatar, order information, and shipping address information, the specific operation path is consistent with the above access or correction path;
You can request us to delete other personal information in the following cases:
(1) If we deal with personal information in violation of laws and regulations;
(2) If we collect and use your personal information without your consent;
(3) If our processing of personal information violates our agreement with you;
(4) If you delete your EZVIZ account;
(5) If we terminate the service and operation.
If we decide to respond to your deletion request, we will also notify the entities that have obtained your personal information from us and require them to delete it in time, unless there are other stipulations by laws and regulations, or these entities have obtained your independent authorization.
When you or we assist you in deleting relevant information, we may not be able to delete the corresponding information from the backup system immediately due to applicable legal and security technical restrictions. We will safely store your personal information and limit any further processing of it until the backup can be cleared or anonymized.
You can change the scope of your authorization to continue to collect personal information or withdraw your authorization by deleting information, shutting down a service or function, or by multiple ways including making privacy settings and application permission management in EZVIZ website or software. You can also withdraw all the authorization to continue to collect your personal information by canceling your account. The specific path is as follows:
1. Change or withdraw sensitive permission settings
(1) You can turn off GPS location, camera, microphone or photo album to change the scope of consent or withdraw your authorization. We will no longer collect information related to these permissions once the authorization is over.
2. Information processing after changing or withdrawing authorization
Please understand that each business function requires some basic personal information to be fulfilled. After you withdraw your consent or authorization, we cannot continue to provide you with the services corresponding to the withdrawal of consent or authorization, nor will we process your corresponding personal information. However, your decision to withdraw your consent or authorization will not affect the previous personal information processing based on your authorization.
3. Application Permission List
Android version:
Serial number | Permission name | Permission level | Purpose of use |
1 | ACCESS_FINE_LOCATION Access to precise location | sensitive | It is used to provide automatic identification of nearby Bluetooth devices, network configuration of intelligent device, intelligent scene weather linkage, geo-fencing, pet tracker device positioning function services |
2 | ACCESS_COARSE_LOCATION Access to coarse location | sensitive | |
3 | CAMERA Allow the camera to shoot | sensitive | It is used to provide services of uploading custom avatars, scanning QR codes to add smart devices |
4 | RECORD_AUDIO Allow the recording | sensitive | It is used to provide intelligent device voice intercom and custom alarm prompt tone function services |
5 | READ_EXTERNAL_STORAGE Allow reading of external storage
| sensitive | It is used to provide services of uploading customized avatars and submitting feedback |
6 | WRITE_EXTERNAL_STORAGE Allow writing to external storage | sensitive | It is used to provide services of saving video screenshots and videos |
7 | BLUETOOTH_ADMIN Discover and pair Bluetooth devices | common | It is used to provide services of Bluetooth pairing and connection for intelligent devices |
8 | BLUETOOTH Connect to Bluetooth device | common | It is used to provide services of Bluetooth pairing and connection for intelligent devices |
9 | ACCESS_WIFI_STATE Get WiFi network status information | common | When adding intelligent devices through the network configuration, it is used to get WiFi network status information |
10 | ACCESS_NETWORK_STATE Get network status information | common | When adding intelligent devices through the network configuration, it is used to view the network status information |
11 | CHANGE_NETWORK_STATE Modify network status | common | When the connection network of intelligent devices changes, the network can be changed and configured |
12 | CHANGE_WIFI_STATE Modify WiFi status | common | When the connection network of intelligent devices changes, the network can be changed and configured |
13 | CHANGE_WIFI_MULTICAST_STATE Receive WLAN multicast | common | When adding intelligent devices through the network configuration, it is used to receive WLAN multicast |
14 | INTERNET Allow access to network connections | common | It is used for the Internet function of mobile devices |
15 | RECEIVE_BOOT_COMPLETED Automatically start up at boot | common | It is used for application self-starting |
16 | REQUEST_IGNORE_BATTERY_OPTIMIZATIONS Request to ignore battery optimization | common | It is used for push notifications services |
17 | RESTART_PACKAGES Allow program restart | common | It is used for application restart function |
18 | com.android.launcher.permission.INSTALL_SHORTCUT Create desktop shortcuts | common | Allow applications to install shortcuts in the launcher |
19 | REQUEST_INSTALL_PACKAGES Allow the installation of applications | common | It is used for application update and installation functions |
20 | QUERY_ALL_PACKAGES Get information of installed app list | common | It is used for application update and installation functions |
21 | FOREGROUND_SERVICE Allow applications to start foreground services | common | It is used for application keepalive function |
22 | FLASHLIGHT Allow flash control | common | It is used to control the flash of the mobile phone, making it easy to scan the QR code to connect the intelligent device in the environment of insufficient light |
23 | WAKE_LOCK Prevent the phone from entering sleep state | common | It is used to preview the playback service and prevent the phone from entering the sleep state |
24 | USE_FINGERPRINT Allow using fingerprint hardware | common | For application fingerprint login function |
25 | VIBRATE Control device vibrator | common | It is used for push notification service and reminds users through mobile device vibration |
26 | MODIFY_AUDIO_SETTINGS Allow changing system audio settings | common | It is used for the device voice intercom service |
27 | com.android.launcher.permission.WRITE_SETTINGS Allow modifying system settings | common | In some cases there are unread messages, the desktop shortcut icon is modified to remind users |
28 | CHANGE_CONFIGURATION Allow changing user interface settings | common | It is used to set the default font or language |
29 | SYSTEM_ALERT_WINDOW Allow overlay display on other apps | common | For applet functions |
30 | oppo.permission.OPPO_COMPONENT_SAFE Push notification service of OPPO mobile phone | common | It is used for push notification service of OPPO mobile phone |
31 | com.coloros.mcs.permission.RECIEVE_MCS_MESSAGE Push notification service of OPPO mobile phone | common | It is used for push notification service of OPPO mobile phone |
32 | com.heytap.mcs.permission.RECIEVE_MCS_MESSAGE Push notification service of OPPO mobile phone | common | It is used for push notification service of OPPO mobile phone |
33 | com.huawei.appmarket.service.commondata.permission.GET_COMMON_DATA Push notification service of Huawei mobile phone | common | It is used for push notification service of Huawei mobile phone |
34 | com.EZVIZ.smart.permission.MIPUSH_RECEIVE Push notification service of Xiaomi mobile phone | custom | It is used for push notification service of Xiaomi mobile phone |
35 | com.EZVIZ.smart.permission.PUSH_PROVIDER | custom | It is used for EZVIZ’s self-built push notification service |
36 | com.google.android.c2dm.permission.RECEIVE | custom | It is used for push notification service of Android phone |
iOS version:
Serial number | Permission name | Permission level | Purpose of use |
1 | NSLocationAlwaysUsageDescription Always access location | sensitive | It is used to provide automatic identification of nearby Bluetooth devices,network configuration of intelligent device, intelligent scene weather linkage, geo-fencing, pet locator device positioning, selecting location when publicly sharing video function services |
2 | NSLocationWhenInUseUsageDescription Access location during use | sensitive | |
2 | NSCameraUsageDescription Access camera | sensitive | It is used to provide services of uploading custom avatars, scanning QR codes to add smart devices |
3 | NSMicrophoneUsageDescription Access microphone | sensitive | It is used to provide intelligent device voice intercom and custom alarm prompt tone function services |
4 | NSPhotoLibraryAddUsageDescription Access photo album | sensitive | It is used to provide services of saving video screenshots and videos |
5 | NSContactsUsageDescription Access address book | sensitive | It is used to add friends to the address book, which is convenient for users to use the sharing function service |
6 | NSFaceIDUsageDescription Face ID | sensitive | It is used to provide face ID login function service |
7 | NSMotionUsageDescription Sports and fitness | sensitive | It is used to provide sports and health intelligent device function services |
8 | NSSpeechRecognitionUsageDescription Voice recognition | sensitive | It is used to provide voice input function services |
9 | NSAppleMusicUsageDescription Access media library | sensitive | It is used to provide access to videos and photos in the media library |
10 | NSCalendarsUsageDescription Access calendar | sensitive | For intelligent devices to use the calendar function service |
11 | NSBluetoothPeripheralUsageDescription Access Bluetooth | common | It is used to provide Bluetooth pairing and connection for intelligent devices |
You can apply for logout of your account in the following ways
1. Contact our customer service;
2. The specific path of clients including PAWTECH app is: [home page → “Me” → “General Settings” → “Account Security” → “Logout”]
Please note that account logout is an irreversible operation. After account logout, we will stop providing products or services for you, your rights and interests under your account will be completely cleared, and your personal information will be deleted or anonymized, unless there are other stipulations by laws and regulations.
At present, there is no situation in PAWTECH business functions that decisions are made only based on non-manual automatic decision-making mechanisms including information systems and algorithms. If we think it is necessary to use the above-mentioned technical means during the operation, we will inform you in time; If you think these decisions significantly affect your legitimate rights and interests, you have the right to ask us for an explanation, and we will also provide a method of appeal without infringing EZVIZ's trade secrets or the rights and interests of other users as well as public interests.
If you cannot manage your personal information through the above methods, or you need to query your personal information has been obtained or the type, source, and purpose of the personal information, as well as the identity or type of the third party who has obtained the above personal information and for your other personal information rights claims, you can send an email to [open-team@EZVIZlife.com], or contact us in other ways listed in this policy. In order to ensure safety, we may need you to provide a written request or prove your identity in other ways. We will reply to your request within 15 working days of receiving your feedback and verifying your identity.
In principle, we will not charge for your reasonable request, but for repeated requests and requests exceed the reasonable limit, we will charge a certain cost according to the situation. We may refuse requests that are unreasonably repeated, require too many technical means (for example, need to develop new systems or fundamentally change current practices), pose risks to the legitimate rights and interests of others, or are very unrealistic (for example, involving information stored on backup tapes).
PAWTECH attaches great importance to the protection of minors' personal information. We do not take age identification as the premise when providing products or services to users, but the nature of our products and / or services requires that you should be an adult with full civil capacity. If you are a minor, we require you to ask your parents or other guardians to carefully read this Privacy Policy and use our services or provide information to us with the consent and supervision of your parents or other guardians. If you collect or submit personal information of minors to us through our products and / or services for interacting with children, please ensure that you have obtained the authorization consent of their legal guardians in advance.
If you are a child under the age of 14, before you use our products and / or services, you and your parents or other guardians should carefully read the EZVIZ Children's Personal Information Protection Rules specially formulated by us, you can use our products and / or services under the guidance of the guardians after assuredly obtaining the consent of your parents or guardians.
If parents or other legal guardians have reason to believe that minors have submitted personal information to us without your prior consent, or have questions about how we protect the minor's personal Information, please contact us through the methods listed at the beginning of this policy.
We may make changes to this policy in due course. Without your explicit consent, we will not reduce your rights under this policy, nor will we take the initiative to adjust your personal information related settings. We will post any changes to this policy on this page.
For major changes, we will notify you in various forms, including push notification, pop-up and email.
Major changes referred to in this policy include but are not limited to:
1) Major changes have taken place in our service model. Such as changing the purpose of processing personal information, the type of personal information to be processed, and the way of using personal information;
2) Significant changes have taken place in our ownership structure and organizational structure. Such as owner change caused by business adjustment, bankruptcy and merger;
3) The main objects of personal information sharing, transfer or public disclosure have changed;
4) Your right to participate in personal information processing and its form have changed significantly;
5) Our responsible departments, contact methods and complaint channels for handling personal information security change;
6) When the impact assessment report of personal information security indicates that there is a high risk.
If you have any questions, comments or suggestions about this policy or your personal information, please contact our personal information protection specialists by sending an email to [open-team@EZVIZlife.com] or calling 400-900-3661. You can also send a letter as follows:
Address: PAWTECH safety group,258 Qingchuan Road, Huzhen Town, Jinyun County, Lishui City, Zhejiang Province Province (received)
Post code: 321400
Normally, we will reply you within 15 days.
If you are not satisfied with our reply, especially our personal information processing behavior has damaged your legitimate rights and interests, you can also complain or report to the regulatory authorities of network information, telecommunications, public security as well as industry and commerce.
Appendix: Relevant Definitions
1. The headings in this policy are for convenience only and shall not affect the meaning or interpretation of any provision.
2. The concepts and terms quoted in this policy shall be interpreted as follows:
1. PAWTECH: PAWTECH refers to Hangzhou EZVIZ Network Co., Ltd. (formerly known as Hangzhou EZVIZ Network Co., Ltd.) and its affiliates (including Hangzhou EZVIZ Software Co., Ltd. and other affiliated subjects specified in writing by Hangzhou EZVIZ Network Co., Ltd.) that operate EZVIZ IOT platform and licensed software, engaging in the design, research and development as well as maintenance of related products or services. The registered address of PAWTECH is No. 399, Danfeng Road, Binjiang District, Hangzhou, Zhejiang Province, and its common office address is No. 555, Qianmo Road, Binjiang District, Hangzhou, Zhejiang Province. The person in charge of the company is Jiang Haiqing.
2. Personal information: all kinds of information related to identified or identifiable natural persons recorded electronically or in other ways, excluding the information after anonymization. This interpretation comes from the Personal Information Protection Law of the People’s Republic of China. The personal information involved in this policy shall be subject to the description in the text of the policy.
3. Sensitive personal information: refers to personal information that, once leaked or illegally used, is easy to cause the human dignity of natural persons to be infringed or the safety of human and property to be endangered, including biological recognition, religious belief, specific identity, health care, financial account, track and other information, as well as the personal information of minors under the age of 14. This interpretation comes from the Personal Information Protection Law of the People’s Republic of China; The personal sensitive information mentioned in this policy is subject to the description in the text of the policy, which will prompt you in bold form.
4. Collection: refers to the behavior of obtaining the control right of personal information, including the active collection behavior like being actively provided by the personal information subject, interacting with the personal information subject, or recording the behavior of the personal information subject, and the indirect acquisition of personal information through sharing, transferring, collecting public information, etc. If the provider of a product or service provides tools for the personal information subjects to use, and the provider does not access personal information, then it doesn’t belong to the collection of personal information. This interpretation comes from GB/T35273-2020 Information Security Technology—Personal Information Security Specification.
5. Children: refers to minors under the age of 14; this interpretation comes from the Provisions on the Cyber Protection of Children's Personal Information.
6. Minors: natural persons under the age of 18 are minors; Minors over the age of 16 who take their own labor income as their main source of livelihood are regarded as persons of full civil capacity. This interpretation comes from the Civil Code of the People's Republic of China.
7. Authorization consent: sometimes expressed as "authorization" and "consent", it refers to the behavior that the subject of personal information explicitly authorizes the specific processing of his personal information, including authorization through positive actions and authorization through negative inactions. This interpretation comes from GB/T35273-2020 Information Security Technology—Personal Information Security Specification.
8. De-identification: refers to the technical processing of personal information, making the subject of personal information unable to be identified or related without the help of additional information. This interpretation comes from GB/T35273-2020 Information Security Technology—Personal Information Security Specification.
9. Anonymization: refers to the technical processing of personal information of making the subject of personal information unable to be identified or related, and the processed information cannot be restored. The information obtained from anonymization of personal information is not personal information. This interpretation comes from GB/T35273-2020 Information Security Technology—Personal Information Security Specification.
10. Deletion: refers to the act of removing personal information from the system involved in the realization of daily business functions, so that it cannot be retrieved and accessed. This interpretation comes from GB/T35273-2020 Information Security Technology—Personal Information Security Specification.
11. SDK: also known as software development kit, it generally refers to the collection of development tools for establishing application software within the industry, such as specific software packages, software frameworks, hardware platforms, operating systems, etc.