Jooan Privacy Policy

Version updated on August 10, 2023

Effective date: July 22, 2021

introduction

Shenzhen Jooan Technology Co., Ltd. and its affiliates (hereinafter referred to as "Jooan") respect and protect user information, and we promise to take corresponding security protection measures with reference to mature security standards in the industry to protect your personal information. When you use the services provided by the www.qacctv.com and other related websites developed and operated by Jooan (hereinafter referred to as the "Jooan Website") and all software including "Jooan Connect" and "Jooan Cloud Monitoring" (hereinafter referred to as the "Jooan Software"), Jooan will collect, process and disclose your information in accordance with this Jooan Privacy Policy (hereinafter referred to as the "Policy").

This Policy is the basic document for your use of Jooan's products and/or services, and we hope that you will carefully read and make sure that you have fully understood the content of this Policy before using Jooan's services, and hope that you can make appropriate choices according to your own understanding. Your continued use of our products and/or services after we update this Policy (and we will prompt you to update the Policy in a timely manner) means that you agree to the content of this Policy (including the updated version), and agree that we collect, use, store, disclose and transfer your relevant information in accordance with this Policy. Jooan wants to provide you with a clear introduction to how Jooan handles your information through this Policy, so we recommend that you read this Policy in its entirety to help you understand how to maintain your privacy.

If you have any questions, comments or suggestions, you can contact us through the methods specified in Article 10 of this Policy.

This policy will help you understand the following:

1. Scope of application

2. How We Collect and Use Your Personal Information

3. How we use cookies and similar technologies

4. How We Share, Transfer, and Publicly Disclose Your Personal Information

5. How we protect your personal information

6. Your Rights

7. Third-party SDK access and information usage

8. How we process the personal information of minors

9. How this Policy is revised and updated

10. How to contact us

1. Scope of application

This Policy applies to all Jooan Services, which refer to the various services provided by Jooan through the Jooan Website, Jooan Software, and Jooan Cloud Services.

Please note that this Policy does not apply to other third-party products/services ("other third parties", including any third-party websites and third-party service providers) that you access through our products/services, please refer to the privacy policy or similar statement of that third party.

2. How We Collect and Use Your Personal Information

Personal information refers to all kinds of information recorded electronically or otherwise that can identify a specific natural person or reflect the activities of a specific natural person, either alone or in combination with other information (the interpretation of the terms in this article is from the Information Security Technology - Personal Information Security Specification, the same below). The personal information involved in this Policy includes: basic information (including personal name, personal telephone number, and email address); Personal identification information (including ID card, military ID, passport, driver's license, relevant identification, etc.); personal location information; Network identification information (including system account, IP address, email address, password and password related to the foregoing); Personal Internet access records (including search records, software usage records, and click records); Personal commonly used device information (including hardware model, device MAC address, operating system type, software list, unique device identification code (such as IMEI/Android ID/IDFA/OPENUDID/GUID, SIM card IMSI information, etc., including information describing the basic situation of personal commonly used devices), video content containing personal information;

Sensitive personal information refers to personal information that, once disclosed, illegally provided or abused, may endanger personal and property safety, and can easily lead to damage to personal reputation, physical and mental health, or discriminatory treatment. The sensitive personal information involved in this Policy includes: personal identity information (including ID cards, military IDs, passports, driver's licenses, and household registration books); Internet identification information (including username, nickname, email address and password related to the foregoing); Other information (including personal phone numbers, mobile phone numbers, web browsing records, precise location information); Proof of relevant identity; Video content that contains sensitive personal information.

2.1 Information collected by Jooan during your use of the Services

Our products and/or services include some core functions, including the services of Jooan website, and the basic functions related to Jooan products based on Jooan Cloud (such as surveillance video preview, device operation and control, etc.). We may collect, store and use some information about you in order to achieve these functions. If you do not provide this information, you will not be able to enjoy the products and/or services we provide.

Our products and/or services also include some additional features, including Jooan cloud storage, value-added services such as phone reminders, message reminders, device unbinding, etc. If you do not provide such personal information, you can still browse the Jooan website and use the basic functions related to Jooan products, but you will not be able to use the corresponding additional functions.

2.1.1 In the process of using our products and/or services, we will collect the information that you voluntarily provide when using our products and/or services or generated as a result of using our products and/or services in the following ways, so as to provide you with our products and/or services, optimize our products and/or services, and ensure the security of your account:

1) When you register an account to use our products and/or services, we will collect your username, password, email address, mobile phone number and other information. We collect mobile phone numbers in order to meet the requirements of relevant laws and regulations for online real-name system. The mobile phone number you submit is used to accept the verification code when you register, log in, bind your account, and retrieve your password, and is used as one of the contact methods specified by you and Jooan to receive relevant business notifications (such as new product launches, service changes, etc.). If you refuse to provide such information, you may not be able to use our products and/or services normally.

2) When you search for products, videos, or other information through search, we will collect your search content to facilitate your repeated typing or show you the information associated with your search content. Please note that your search keyword information cannot identify you separately and does not belong to your personal information, and we have the right to use it for any purpose; Only when your search keyword information is combined with other information and can identify you, we will treat your search keyword information as your personal information and process and protect it in accordance with this policy together with your search history during the combined use.

3) When you use Jooan Cloud Services, Jooan will receive and record information about the device you use (such as device model, operating system version, device settings, unique device identifiers and other software and hardware feature information) and information about the location of the device (such as IP address, GPS location, and sensor information such as Wi-Fi access points, Bluetooth, and base stations that can provide relevant information) according to the specific permissions granted by you in the installation and use of the software. Jooan may associate the above two types of information in order for Jooan to provide you with consistent service across devices.

4) When you use Jooan's website or software to provide services, Jooan will automatically collect your detailed use of Jooan's services and save them as relevant web logs. For example, the content of your search query, IP address, browser type, telecommunications operator, language used, date and time of access, and the history of the web pages you visit, etc.

5) When you purchase products and/or services from Jooan, we will also collect your order information, including the order number, information about the goods or services you purchased, the amount of payment you have paid, the payment method, the consignee's information and the delivery address. We will use this information to determine transactions, pay and settle payments, complete deliveries, inquire about your orders, provide customer service consultation and after-sales service, and determine whether your transactions are abnormal to protect the security of your transactions.

6) When you bind your smart camera and other devices for network use, we will collect the device information you bind (most of the time, the device serial number) and the basic information of the client terminal device (client type, client version number, device model, hardware feature code, operating system version number, operator information, and optical transmitter); When your device is connected via WIFI, we will also collect your device's network connection mode, carrier, WIFI information (Wi-Fi SSID information, BSSID information, signal strength) and WIFI password; When your device is connected via Bluetooth, we collect the Bluetooth MAC address information of your smart hardware device. This information is necessary for the completion of device binding and further service for you, if you refuse to provide it, you will not be able to use the device to add functions. In addition, when you configure the network for your IoT hardware device, we will also use the location permission of your client terminal device to search for WIFI information in order to complete the network configuration function for you; If you refuse to turn on location permissions, you won't be able to use the feature. Please note that this location information is not uploaded to the server, and we will not record and store it.

7) When you use the function of previewing, playing, playback and downloading surveillance videos, we will collect the ID of your monitoring device, the internal IP address of the device, the external IP address of the device, the type of network currently connected, the current network status, and the carrier type, client type, client version number, operating system version, operating system type, device model, device screen width, device screen height, and device screen orientation of your client terminal device, so that you can achieve the purpose of this function; In addition, we will also collect the accelerometer information of your mobile phone when you use the preview and playback functions, which will be used to judge the horizontal and vertical screen of your mobile phone. This information is necessary for you to use the surveillance video viewing function, and if you refuse to provide it, we will not be able to provide you with the corresponding services. When you use the surveillance video preview and playback function, we will collect the current video screenshot of your monitoring device and show it to you, so that you can easily identify the monitoring location.

8) When you turn on the message reminder function, we will collect video screenshots taken by your camera and push the screenshots to you. You can turn this feature off through your account settings.

9) When you use some of our value-added services, we need you to fill in the corresponding personal information so that we can provide you with the corresponding value-added services in the future. We will only collect your personal information for the purpose of providing corresponding value-added services, and only use the collected personal information to provide you with corresponding value-added services. For example, when you subscribe to the phone alert service, we need you to fill in the corresponding mobile phone number so that we can contact you when a message push occurs.

10) Our customer service and after-sales functions will use your account information, order information, and product information you bind. In order to ensure the security of your account, our customer service will use your account information to verify your identity with you. When you need us to provide customer service and after-sales service related to your order information, we will inquire about your order information. You may provide additional information when communicating with our customer service staff, such as when you ask us to change your delivery address, contact person or contact number. When you need us to provide customer service and after-sales service related to the product information you bind, we will query the product information you bind.

11) Based on the user's consultation records, fault reporting records and troubleshooting processes (such as communication or call records) generated by your use of Jooan services, Jooan will record and analyze such information in order to respond to your help requests in a more timely manner and improve the service.

12) In addition, we may launch third-party service functions, and when you use these functions, we will not disclose or disclose your personal information to third-party service providers without your permission.

13) If we need to obtain your personal information outside the above-mentioned scenarios, we will obtain your express consent again, and fully explain the application scenarios and the content and scope of obtaining your relevant information to you before obtaining your express consent.

2.1.2 In the process of using Jooan software, we will use the following permissions, and we list the corresponding rights and uses as follows:

1) List of Android OS app permissions

List of sensitive permissions for Android

serial number Permissions Purpose of use Usage scenarios
1 CAMERA
shot
Used for: 1. Scan the QR code to add a smart device 2. Scan the QR code to share the device with your family Scenario: 1、APP ["+" button in the upper right corner - add 4G camera] 2、APP [Device Settings - Device Sharing - Add with QR code]
2 ACCESS_FINE_LOCATION
Access precise targeting
Used for: 1、Search for nearby WIFI information to complete smart device network configuration (only read location information for device network configuration, and will not be uploaded to the server.) Scenario: 1、APP ["+" button in the upper right corner - WIFI connection] 2、APP [left menu - About Us - Stand-alone mode]
3 ACCESS_COARSE_LOCATION
Visit the coarse location
4 RECORD_AUDIO
recording
Used for: 1、Device voice intercom to record custom alert voice Scenario: 1、APP [Device List - Live Preview - Voice Intercom] 2、APP [Device List - Device Settings - Detection and Alarm Settings - Alarm Alarm - Alert Voice - Press and Hold to Record Custom Voice]
5 WRITE_CONTACTS
Contacts
Used for: 1、Share the device to the address book user Scenario: 1、APP [Device List - Device Settings - Device Sharing - Mobile Phone Contacts Add]
6 READ_EXTERNAL_STORAGE
Read external memory
Used for: 1、Save screenshots of camera messages, record the screen 2、download and save the new version of the installation package 3、store the user's device information 4、scan the code to bind the device to get photos from the album 5、apply for the device to unbind and read the mobile phone album 6、scan the QR code to share the device with your family 7、and record a custom warning voice Scenario: 1、APP [Left Menu - Message List - Device Message Details - Save Picture/Share Picture/Record Video] 2、APP [Left Menu - Permanent Backup] 3、APP [Device List - Live Broadcast Preview - Screenshot/Screen Recording] 4、 APP [Device List - Device Settings - Cloud Storage - Single Cloud Storage Video - Download/Screenshot] 5、APP [Left Menu - About Us - Stand-alone Mode] 6、APP [Left Menu - About Us - APP Update Version] 7、APP [ "+" button in the upper right corner - add 4G camera] 8、APP [device settings - device sharing - add using QR code] 9, APP [add device - apply for unbinding - upload photos] 10、APP [device list - device settings - detection alarm setting - alarm sound alarm - alert voice - press and hold to record custom voice]
7 WRITE_EXTERNAL_STORAGE
Write to external memory
8 BLUETOOTH_CONNECT
Nearby devices
Used for: 1、 Scan nearby Bluetooth devices Scenario: 1、APP ["+" button in the upper right corner - Bluetooth to add device function]
9 READ_SMS
Read text messages
(SMS or MMS)
Used for: 1、Obtain the login SMS verification code service Scenario: 1、 APP [Forgot Password - Get Verification Code]

List of common permissions for Android

serial number Permission name Feature description
1 BLUETOOTH_ADMIN
Discover and pair Bluetooth devices
Bluetooth pairing and connection for smart devices
2 BLUETOOTH
Connect to a Bluetooth device
Bluetooth pairing and connection for smart devices
3 BLUETOOTH_CONNECT
Connect to a Bluetooth device
Bluetooth pairing and connection for smart devices
4 BLUETOOTH_ADVERTISE
Make the current device detectable by other Bluetooth devices
Make the current device detectable by other Bluetooth devices
5 BLUETOOTH_SCAN
Bluetooth pairing and connection for smart devices
Bluetooth pairing and connection for smart devices
6 ACCESS_NETWORK_STATE
Obtain the network information status
It is used to obtain network status information to optimize the efficiency of video communication
7 ACCESS_WIFI_STATE
Get WIFI information
It is used to obtain network status information to optimize the efficiency of video communication
8 INTERNET
Access a network connection
It is used for mobile phone card Internet service
9 CHANGE_NETWORK_STATE
Modify the network status
When the connection network of smart devices changes, the WIFI network can be changed and configured
10 CHANGE_WIFI_STATE
Modify the WIFI status
When the connection network of smart devices changes, the WIFI network can be changed and configured
11 KILL_BACKGROUND_PROCESSES
End the enddesk process
Used to turn off the application running in the background
12 FOREGROUND_SERVICE
The application starts the foreground service
It is used for NetEase Yunxin, Huawei Push, and Mall Live Service
13 VIBRATE
Control the device vibrator
Mobile phone vibration reminder for Xiaomi mobile phone push and message reminder service
14 WAKE_LOCK
Prevent your phone from going to sleep
It is used for video playback function to prevent the phone screen from turning off
15 REQUEST_INSTALL_PACKAGES
Get the package name of the app itself
For the update and installation of the application
16 com.meizu.c2dm.permission.RECEIVE Message push service for Meizu mobile phones
17 com.videogo.push.permission.MESSAGE Message push service for Meizu mobile phones
18 com.videogo.permission.C2D_MESSAGE Message push service for Meizu mobile phones
19 com.meizu.flyme.push.permission.RECEIVE Message push service for Meizu mobile phones
20 com.meizu.flyme.permission.PUSH Message push service for Meizu mobile phones
21 com.heytap.mcs.permission.RECIEVE_MCS_MESSAGE Message push service for OPPO mobile phones
22 com.coloros.mcs.permission.RECIEVE_MCS_MESSAGE Message push service for OPPO mobile phones
23 oppo.permission.OPPO_COMPONENT_SAFE Message push service for OPPO mobile phones
24 com.huawei.appmarket.service.commondata.permission.GET_COMMON_DATA Message push service for Huawei phones
25 com.videogo.permission.MIPUSH_RECEIVE Message push service for Xiaomi mobile phones
26 QUERY_ALL_PACKAGES Query for a specific application name It is used to query the package name of a specific application, which is used by Guangdiantong SDK

2) LIST OF IOS OPERATING SYSTEM APP PERMISSIONS

serial number Permissions Purpose of use Usage scenarios
1 Camera Used for: 1、Scan the QR code to add a smart device 2、Scan the QR code to share the device with your family Scenario: 1、APP ["+" button in the upper right corner - add 4G camera] 2、APP [Device Settings - Device Sharing - Add with QR code]
2 Location Always Use
Always access the location
Used for: 1、Search for nearby WIFI information to complete the network configuration of smart devices Scenario: 1、APP ["+" button in the upper right corner - WIFI connection] 2、APP [left menu - About Us - Stand-alone mode]
3 Location Always And When In Use
Always visit the location
4 Location When In Use
Access locations during use
5 Microphone Used for: 1、equipment voice intercom 2、record custom warning voice Scenario: 1、APP [Device List - Live Preview - Voice Intercom] 2、APP [Device List - Device Settings - Detection and Alarm Settings - Alarm Alarm - Alert Voice - Press and Hold to Record Custom Voice]
6 Contacts Used for: 1、Share the device to the address book user Scenario: 1、APP [Device List - Device Settings - Device Sharing - Mobile Phone Contacts Add]
7 Photo Library Add
Write only the photo gallery
Used for: 1、Save the first image of the camera's live broadcast, message screenshots, and videos Scenario: 1、APP [Left Menu - Message List - Device Message Details - Save Picture/Share Picture] 2、APP [Left Menu - Permanent Backup] 3、APP [Device List - Live Broadcast Preview - Screenshot / Screen Recording] 4、APP [Device List - Device Settings - Cloud Storage - Single Cloud Storage Video - Download/Screenshot]
8 Photo Library
Read and write to Photo Gallery
9 Bluetooth Always
Access to Bluetooth permissions
Used for: 1、Bluetooth pairing and connection between APP and Jooan devices Scenario: 1、APP ["+" button in the upper right corner - Bluetooth to add device function]
10 Bluetooth Peripheral
Access to Bluetooth permissions
11 Local Network Usage
Access to the network
Used for: 1、Discover devices in the local area network Scenario: 1、APP ["+" button in the upper right corner - network cable connection]
12 Notification
notice
Used for: 1、Mobile phone message push service Scenario: 1、Receiving device alarm messages; 2、Receive the intercom notification of the device 3、Receive the order status of the user's value-added services
13 App Tracking Transparency permission
Transparent permissions for app tracking
Used for: 1、Protect users' privacy and give users more control over how their personal data is used by apps and advertising companies Scenario: 1、APP [Start APP-Advertisement]

2.1.3 You are fully aware that we do not need to obtain your authorization and consent to collect and use personal information under the following circumstances:

1) Related to national security and national defense security;

2) Where it is related to public safety, public health, or major public interests;

3) Related to criminal investigation, prosecution, trial and enforcement of judgments;

4) Where it is for the purpose of protecting the life, property, or other major lawful rights and interests of the Personal Data Subject or other individuals, but it is difficult to obtain the consent of the individual;

5) The personal information collected is disclosed to the public by the Personal Data Subject on his own;

6) Your personal information collected from legally and publicly disclosed information, such as legitimate news reports, government information disclosure, and other channels;

7) Necessary to enter into a contract at your request;

8) Necessary to maintain the safe and stable operation of the products and/or services provided, such as discovering and disposing of faults of products and/or services;

9) Necessary for legitimate news reporting;

10) When it is necessary for academic research institutions to carry out statistical or academic research based on the public interest, and when the results of academic research or descriptions are provided externally, the personal information contained in the results is de-identified;

11) Other circumstances stipulated by laws and regulations.

2.2 Rules for the Use of Your Personal Information

2.2.1 We will use your personal information in accordance with the following rules:

1) We will use the collected personal information in accordance with the provisions of this Policy and for the realization of our products and/or service functions.

2) We will send you commercial electronic information (including SMS, email, etc.) to provide you with product/service information related to you. If you do not wish to receive such information, you can unsubscribe by using the "unsubscribe" function in the messages we send.

2.2.2 Please note that all personal information you provide when using our products and/or services will continue to be authorized for us to use our products and/or services during your use of our products and/or services, unless you delete or refuse to be collected by us through your account settings or system settings.

2.2.3 We will compile statistics on the use of our products and/or services, and may share these statistics with the public or third parties to show the overall usage trend of our products and/or services. However, these statistics do not contain any identifying information about you.

2.2.4 When we display your personal information, we will desensitize your information by means of content substitution and anonymization to protect your information security.

2.2.5 When we want to use your personal information for other purposes not specified in this Policy, or when the information collected for a specific purpose is used for other purposes, we will ask for your consent in advance by actively checking the box.

3. How we use cookies and similar technologies

3.1. Cookies and similar technologies

A cookie is a mechanism that allows a server (or script) to store and retrieve information on a website or client, and is a commonly used technology on the Internet. Cookie technologies are other technologies that can be used for similar purposes of cookies, mainly including beacons, web beacons, embedded scripts, and pixel tags.

Currently, we collect information from you by placing secure cookies and web beacons in some Jooan software for the purpose of improving your experience with Jooan products and/or services. Please be aware that with the development of technology and the further improvement of our products and services, we will also use other cookies and similar technologies as needed.

3.2. Use and management of cookies and similar technologies

3.2.1. We use cookies and similar technologies primarily to achieve the following functions or services:

a. To ensure the safe and efficient operation of products and services: We will set authentication and security cookies or anonymous identifiers as needed to enable us to confirm whether you have logged in to the services safely, or whether you have encountered theft, fraud or other illegal acts. These technologies also help us improve the efficiency of our services, and improve the speed of logins and responses;

b. To help you have an easier access experience: The use of such technologies can help you avoid the steps and processes of filling in your personal information and entering search content (including: record searches, form filling).

3.2.2. Most browsers provide users with the function of clearing browser cache data, and you can perform the corresponding data clearing operation in the browser settings function. However, if you do so, you will need to change your user settings every time you visit Jooan's website or software, and the corresponding information you have previously recorded will also be deleted, which may affect the security of the services you use.

3.3.3 If you click on an email that Jooan sends to you, it may contain a link to the content of Jooan's website, and Jooan will track that click to help Jooan understand your product or service preferences so that Jooan can proactively improve your customer service experience. If you do not want your activity to be tracked in this way, you can unsubscribe from Jooan's mailing list at any time.

3.3. Our commitment to the use of cookies and similar technologies

We promise that Jooan's research on the information collected by cookies and similar technologies will only be used for the purpose of improving the quality of our services/products and optimizing the user experience, and we will not use it for any purpose other than the purposes described in this policy. In addition, if third-party service providers whose services are connected to our products or services also collect your personal information through cookies and similar technologies, we will use our best commercial efforts to bind them to comply with the requirements for the use of cookies and similar technologies under this Policy.

4.How We Share, Transfer, and Publicly Disclose Your Personal Information

4.1 Sharing

4.1.1 Jooan will not share your user information with any company, organization or individual other than Jooan, except in the following circumstances:

1) Jooan has obtained the express authorization or consent of you or your guardian;

2) Judicial or administrative authorities require us to disclose based on legal procedures;

3) When Jooan files a lawsuit or arbitration with you to protect its legitimate rights and interests;

4) According to the relevant service agreement and usage rules between you and Jooan;

5) To the extent permitted by laws and regulations, to protect Jooan, its affiliates, Jooan users, and the public interest;

6) Comply with the relevant agreements between you and other third parties;

7) Other circumstances required or permitted by applicable laws and regulations such as the Cybersecurity Law.

4.1.2 We may share your personal information with our authorized partners: Jooan may entrust trusted partners to provide services, so Jooan may share some of your user information with partners to provide better customer service and optimize user experience. Jooan will only share your user information for legitimate, legitimate, necessary, specific and explicit purposes, and will only share the user information necessary to provide services. Jooan's partners are not authorized to use the shared user information for any other purpose. Currently, Jooan's authorized partners include the following types: vendors, service providers, and other partners. Jooan sends information to vendors, service providers, and other partners who support Jooan's business, including the provision of basic technical services, the provision of consulting, analysis, and other professional services. Jooan will sign strict confidentiality agreements and information protection agreements with companies, organizations and individuals with whom Jooan shares user information, requiring them to handle user information in accordance with Jooan's instructions, this Policy and any other relevant confidentiality and security measures.

4.1.3 Exchange information with other companies and organizations in order to comply with the law, enforce or apply our Conditions of Use and other agreements, or to protect the rights, property or safety of Jooan, you or other Jooan users, such as to prevent illegal activities such as fraud and to reduce credit risk. However, this does not include personal information that is sold, rented, shared, or otherwise disclosed for profit in violation of the commitments made in this Privacy Policy.

4.1.4 You may share your videos, location information, identity information, etc. with specific objects, or share your videos, location information, identity information, etc. with unspecified people based on our products and/or services. The shared party may have its own independent privacy policy or relevant statement, and we recommend that you read it accordingly and follow it carefully; When your information is leaked due to your sharing behavior, Jooan shall not be legally responsible.

4.2 Assignment

4.2.1 Jooan will not transfer your user information to any company, organization or individual, except in the following circumstances:

1) Obtain your explicit consent in advance;

2) When it is necessary to provide it in accordance with applicable laws and regulations, the requirements of legal procedures, or mandatory administrative or judicial requirements;

3) Comply with the relevant agreements signed with you (including the electronic agreements signed online and the corresponding platform rules) or other legal documents;

4) In the event of a merger, acquisition or bankruptcy liquidation between Jooan and other legal entities, or other circumstances involving merger, acquisition or bankruptcy liquidation, if the transfer of user information is involved, Jooan will require the new company or organization that holds your user information to continue to be bound by this Policy, otherwise Jooan will require the company, organization or individual to seek your authorization and consent again.

4.3 Public Disclosure

4.3.1 Jooan will only publicly disclose your personal information under the following circumstances:

1) After obtaining your explicit consent or based on your active choice;

2) Disclosure based on law: We may publicly disclose your personal information under the mandatory requirements of laws, legal procedures, litigation or government authorities.

4.4 Exceptions to Obtaining Prior Authorization and Consent for Sharing, Transferring, and Publicly Disclosing Personal InformationPlease understand that in accordance with applicable laws, regulations, and national standards, including the Personal Information Protection Law of the People's Republic of China, the Cybersecurity Law, and the Personal Information Security Specification for Information Security Technology, we do not need to obtain your authorization and consent for sharing, transferring, and publicly disclosing your personal information under the following circumstances:

1. Related to the performance of obligations stipulated by laws and regulations;

2. Directly related to national security and national defense security;

3. Directly related to public safety, public health, or major public interests;

4. Directly related to criminal investigation, prosecution, trial and judgment enforcement;

5. For the purpose of protecting the life, property and other major legitimate rights and interests of you or other individuals, but it is difficult to obtain the consent of the person;

6. You disclose your personal information to the public on your own;

7. Personal information is collected from legally and publicly disclosed information, such as lawful news reports, government information disclosure, and other channels.

5. How we protect your personal information

5.1 Jooan takes the security of your information very seriously. Jooan will endeavor to take reasonable physical, electronic, and managerial security measures to protect your user information. Protect user information from unauthorized access, public disclosure, use, modification, damage, or loss. Jooan uses encryption technology to improve the security of user information; Jooan will use trusted protection mechanisms to prevent malicious attacks on user information; Jooan will establish strict data use and access policies, and strive to ensure that only authorized personnel have access to user information, and require them to fulfill corresponding confidentiality obligations.

5.2 Jooan will take reasonable and practicable measures to avoid collecting irrelevant user information. Jooan will only retain your user information for as long as necessary to achieve the purposes stated in this policy, unless it is necessary to extend the retention period or is permitted by law. After the above retention period of user information is exceeded, Jooan will delete or anonymize your personal information.

5.3 Although we have taken the above reasonable and effective measures and have complied with the standards required by relevant laws and regulations, we still cannot guarantee the security of your personal information when it is communicated through insecure channels. Therefore, you should take active measures to assist Jooan in ensuring the security of your account, such as setting complex passwords, changing your account passwords regularly, and not disclosing your account password and other personal information to others. Jooan will make every effort to ensure the security of any information you send to Jooan. If Jooan's physical, technical or administrative protection facilities are damaged, resulting in unauthorized access, public disclosure, tampering or destruction of information, resulting in damage to your legitimate rights and interests, Jooan will bear the corresponding legal responsibility.

5.4 There is always a risk of information leakage in the network environment, and in the event of an accident, force majeure or other circumstances that lead to the occurrence of a user information security incident (leakage, loss, etc.), Jooan will, in accordance with the requirements of laws and regulations, promptly inform you of the basic situation and possible impact of the security incident, the measures that Jooan has taken or will take, the suggestions you can take to prevent and reduce the risk independently, and the remedial measures for you. Jooan will promptly notify you of the relevant situation of the incident by email, letter, telephone, push notification, etc., and if it is difficult to inform the user information subject one by one, Jooan will take reasonable and effective measures to make an announcement. At the same time, Jooan will also report the handling of user information security incidents in accordance with the requirements of the regulatory authorities.

5.5 Jooan will store the collected information of your users within the territory of the People's Republic of China, and if it is necessary to transfer personal information overseas due to business needs in accordance with the provisions of applicable laws, Jooan will obtain your consent in advance and inform you of the purpose, recipient, security measures, security risks, etc. of the export of your user information.

5.6 In the event that Jooan products and services cease to operate, Jooan will take reasonable measures to protect the security of your user information, including stopping the activities of continuing to collect user information in a timely manner; The notice of suspension of operation will be notified to the user in the form of delivery or announcement one by one; and delete or anonymize the personal information we hold.

5.7 Jooan will inform you again and obtain your express consent before using the user information beyond the stated purpose at the time of collecting the user information or beyond the scope of direct or reasonable connection.

6. Your Rights

In accordance with the relevant laws, regulations and standards of China, as well as the common practices of other countries and regions, we protect you to exercise the following rights in relation to your personal information:

6.1 Accessing or Correcting Personal Information

You have the right to access your personal information, subject to exceptions provided by laws and regulations. If you want to exercise your right to access your data, you can do so in the following ways:

6.1.1 Your account information: If you need to change the personal information of your Jooan account, you need to go to the personal information page through the Jooan Client Portal: Home Page - Column symbol in the upper left corner to change it. Other Jooan software can be set up accordingly on the "My" page.

6.1.2 Your use of Jooan Cloud Services. In the Jooan Connected client, you can enter the cloud storage page through the column symbol in the upper left corner of the home page to view your cloud storage usage, and you can also view the device model, serial number and other product information through the "More Functions" page in the upper right corner of the single device preview box, as well as the sharing of the device, SD card settings, and cloud recording functions. Other Jooan software can be set up accordingly on the "My" page.

6.1.3 Personal information that you cannot access and correct: In addition to the information listed above, we are unable to provide you with access and correction services for some of your personal information, which is mainly your device information collected to improve your user experience and ensure the security of transactions, and personal information necessary to ensure the normal operation of the business functions you choose. We will use the above information within the scope of your authorization, and you cannot access and correct it, but you can contact us to delete or anonymize it.

6.2 Deletion of Personal Information

6.2.1 You may request us to delete your personal information under the following circumstances:

1) If our processing of personal information violates laws and regulations;

2) If we collect and use your personal information without your consent;

3) If our processing of personal information violates the agreement with you;

4) If you cancel your Jooan account;

5) If we terminate our services and operations.

6.2.2 For security purposes, you may be required to provide a written request or otherwise prove your identity. Jooan may ask you to verify your identity before processing your request. If we decide to respond to your deletion request, we will also notify the entity that obtained your personal information from us and request it to delete it in a timely manner, unless otherwise provided by laws and regulations, or these entities have obtained your independent authorization.

6.2.3 When you delete information from our Services, we may not immediately delete the corresponding information from our backup system, but we will delete such information when the backup is updated.

6.3 Change the scope of consent or withdraw authorization

6.3.1 You may change the scope of your authorization for us to continue to collect personal information or withdraw your authorization by deleting information, turning off a service or function, setting privacy settings on Jooan websites or software, applying permission management, etc. You can also withdraw all authorization for us to continue to collect your personal information by canceling your account.

6.3.2 Please understand that each business function requires some basic personal information to be completed, and after you withdraw your consent or authorization, we will not be able to continue to provide you with the services corresponding to the withdrawal of consent or authorization, nor will we process your corresponding personal information. However, your decision to withdraw your consent or authorization will not affect the processing of personal information previously carried out based on your authorization.

6.4 Cancellation of Account

You can cancel your previously registered account at any time, and you can do it yourself in the following ways: under the Jooan client, you can enter the "Cancel Account" page through the column symbol in the upper left corner of the home page to cancel it; Other Jooan software can be set up accordingly on the "My" page. After the account is cancelled, we will stop providing you with products or services and delete your personal information according to your request, unless otherwise provided by laws and regulations.

6.5 Obtaining Copies of Personal Information and Responding to Requests

6.5.1 If you are unable to manage your personal information through the above methods, or you need to obtain a copy of your personal information, or you have other claims for personal information rights, you can send an email to [rd18@qacctv.com] or other methods listed in this Policy to contact us. For security purposes, we may require you to provide a written request or otherwise prove your identity, and we will respond to your request within 15 business days of receiving your feedback and verifying your identity.

6.5.2 In principle, we do not charge a fee for your reasonable request, but we will charge a certain cost fee for repeated requests that exceed a reasonable limit. We may reject requests that are unreasonably repetitive, require excessive technical means (e.g., need to develop new systems or fundamentally change current practices), pose a risk to the legitimate rights and interests of others, or are highly impractical (e.g., involving information stored on backup tapes).

6.5.3 In accordance with applicable laws, regulations and national standards such as the Cybersecurity Law and the Information Security Technology Personal Information Security Specification, we will not be able to respond to your request under the following circumstances:

1) Directly related to national security and national defense security;

2) Directly related to public safety, public health, or major public interests;

3) Directly related to criminal investigation, prosecution, trial, and enforcement of judgments;

4) There is sufficient evidence that you have subjective malice or abuse of rights;

5) Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations.

6) Involving trade secrets.

7. Third-party SDK access and information usage

7.1 List of third-party SDKs we access

serial number Android version iOS version
1 Umeng (Umeng Mobile Statistics/Componentized Basic Library) Umeng (Umeng Mobile Statistics/Componentized Basic Library)
2 Tencent Bugly Tencent Bugly
3 VIVO PUSH Chuanshanjia (Toutiao Rewarded Advertising/ByteDance Open Platform); on huge engine data; com.bytedance
4 OPPO push Tencent Youlianghui (Guangdiantong)
5 Xiaomi push WeChat Open Platform (no WeChat Pay SDK)
6 Huawei push Kuaishou SDK
7 Chuanshanjia (Toutiao Rewarded Advertising/ByteDance Open Platform); on huge engine data; com.bytedance TopOn aggregation, com.tramini.plugin
8 Tencent Youlianghui (Guangdiantong) com.mbridge.m
9 MSA Mobile Security Alliance (OAID) TUTK SDK
10 WeChat open platform Shanghai Beizi BeiZ (com.beizi) SDK
11 Kuaishou SDK Alibaba Cloud Real-Name Authentication (com.alibaba.one)
12 TopOn aggregation, com.tramini.plugin Alibaba Cloud LV SDK
13 com.mbridge.m IJKPlayer (IJKMediaFramework) SDK
14 TUTK-SDK Baidu Alliance Advertising SDK
15 Alipay (Alipay Security) SDK
16 Shanghai BeiZi (com.beizi) SDK
17 Alibaba Cloud Real-Name Authentication (com.alibaba.one)
18 Alibaba Cloud LV SDK
19 Ali push
20 Alipay Device Identity Generation Library SDK
21 HONOR Push SDK
22 Baidu Alliance Advertising SDK

7.2 Information collection by us and the third-party SDKs accessed by us

7.2.1 Description of Personal Information Collected by Jooan Software

field meaning Whether to report to the server Business Use
MAC address The physical address of the SIM card of the mobile phone not When Alibaba's AP is added to the configuration network, the generation of the token passed to the device is useful
List of software A list of software installed on your phone not It is used to determine whether to install WeChat and other apps, and to prompt users to install them when logging in or paying
Location information Location information for your phone not When you get the WIFI list of your phone, you need to get the location permission

7.2.2 Information collection by third-party SDKs

Umeng (Umeng Mobile Statistics/Componentized Basic Library) SDK (Android, iOS)

Tencent Bugly SDK (Android, iOS)

VIVO PUSH SDK (ANDROID)

OPPO Push SDK (Android)

Mi Push SDK (Android)

HUAWEI Push SDK (Android)

Chuanshanjia (Toutiao Rewarded Ads/ByteDance Open Platform), Giant Engine Data, com.bytedance SDK (Android, iOS)

Tencent Youlianghui (Guangdiantong) SDK (Android, iOS)

MSA Mobile Security Alliance (OAID) SDK (Android)

WeChat Open Platform SDK (Android, iOS)

Kuaishou SDK (Android, iOS)

TopOn Aggregation, com.tramini.plugin SDK (Android, iOS)

com.mbridge.m SDK (Android, iOS)

TUTK SDK (Android, iOS)

Alipay (Alipay Security) SDK (Android)

Shanghai BeiZi(com.beizi) SDK (Android, iOS)

Alibaba Cloud Real-Name Authentication (com.alibaba.one) SDK (Android, iOS)

Alibaba Cloud LV SDK (Android, iOS)

Ali Push SDK (Android)

Alipay Device Identity Generator SDK (Android)

IJKPlayer(IJKMediaFramework) SDK(iOS)

HONOR Push SDK (Android)

Baidu Alliance Advertising SDK (Android, iOS)

8. Protection of personal information of minors

8.1 Jooan attaches great importance to the protection of minors' personal information. If you are a minor under the age of 18, you should obtain the written consent of your parent or legal guardian before using our products and/or services. Jooan protects the personal information of minors in accordance with relevant national laws and regulations.

8.2 For the collection of minors' personal information with the consent of their parents or legal guardians, we will only use or publicly disclose this information when permitted by law, with the explicit consent of parents or guardians, or when it is necessary for the protection of minors.

8.3 If we find that we have collected the personal information of minors without the prior consent of a verifiable parent or legal guardian, we will try to delete the relevant data as soon as possible.

8.4 If parents or other legal guardians have reason to believe that minors have submitted personal information to us without your prior consent, or have questions about the way in which we protect minors' personal information, please contact us through the methods set out in this Policy.

9. Updates to this Privacy Policy

9.1 In order to provide you with better services and with the development of Jooan's business, we may change this Policy from time to time; We will keep previous versions of this Policy on file for your review.

9.2 Without your express consent, Jooan will not reduce your rights under this Policy. Jooan will post any revisions to the Privacy Policy on a dedicated page.

9.3 For material revisions, Jooan will also provide more prominent notices (including for certain services, Jooan will notify you by means of public notice on the website to explain the specific changes to the Privacy Policy).

9.4 The material changes referred to in this Policy include, but are not limited to:

9.4.1 Jooan's service model has changed significantly. Such as the purpose of processing user information, the type of user information processed, the way in which user information is used, etc.;

9.4.2 Jooan has undergone significant changes in terms of control, organizational structure, etc. Such as business adjustment, bankruptcy mergers and acquisitions, etc., resulting in changes in ownership, etc.;

9.4.3 Changes in the main object of user information sharing, transfer or public disclosure;

9.4.4 There are significant changes in your rights to participate in the processing of user information and the way in which you exercise them;

9.4.5 When there is a change in the department responsible for handling the security of the User's information, the contact information and the complaint channel of Jooan;

9.4.6 When the user information security impact assessment report indicates that there is a high risk.

10. How to Contact Jooan

If you have any questions, comments or suggestions about this Privacy Policy, or if you have any questions or comments about Jooan's practices and operations regarding this Policy, you can contact our Personal Information Protection Officer by calling Jooan's Customer Service Center at [400-8566-866] or by sending an email to [rd18@qacctv.com].

You can also send a letter as follows:

Address: Jooan Information Protection Group, 15th Floor, Block B, Runhong International, Longhua New District, Shenzhen, Guangdong Province (Received)

In general, we will reply within 15 working days.

If you are not satisfied with our reply, especially if our personal information processing has harmed your legitimate rights and interests, you may also file a complaint or report to the regulatory authorities such as cyberspace, telecommunications, public security, and industry and commerce. The complaint method is as follows:

(1) Reporting Center of the Cyberspace Administration of China: www.12377.cn

(2) Consumer complaint and reporting telephone: 12315