User Agreement: Here is a special reminder that you must carefully read and fully understand the terms of this "User Agreement" (hereinafter referred to as the "Agreement") and choose whether to accept this agreement. This agreement will be legally binding on your use of this software. You have promised and guaranteed that you have the right and ability to enter into this agreement. Please carefully read and understand the terms of this agreement, including exemption and limitation of liability and exemption clauses for users Limitation of rights (minor review should be accompanied by a legal guardian); if you cannot accept all the terms in this agreement, please do not start using this software. 1. Use In order to facilitate your use of more functions of this software, you need to register an account and provide relevant personal information. You must promise and guarantee: 1.1 All registration information submitted by you must be true and accurate; 1.2 Your use of this software must be legal; 1.3 You must promise to keep your login information confidential, not to be obtained and used by others, and be responsible for all your actions under your software account. You must notify us as soon as possible of any unauthorized use or suspected unauthorized use that may violate the law. We will not be liable for the losses caused by your failure to comply with the above requirements. 2. End User Agreement 2.1 License According to the provisions of this agreement, you will be granted the right to download, install and use the software on all your network communication equipment, computer equipment and mobile communication equipment. This license is a non-transferable and non-exclusive license. 2.2 Restrictive clauses Your authorization will be subject to the following restrictions: 2.2.1 You must not license, sell, lease, transfer, distribute or other commercial purposes of this software in any form; 2.2.2 Unless such restrictions are prohibited by law, you may not modify, translate, adapt, merge, decompose, transform, reverse compile, reverse engineer any part or derivative of the software; 2.2.3 You must not use this software for the purpose of creating identical or competing services; 2.2.4 You must not delete or destroy any copyright notices or other proprietary marks contained in this software. 2.3 Ownership of rights The relevant intellectual property rights in this software (including all copyrights, patent rights, trademark rights, etc. of this software) belong to. 3. User content 3.1 User content 3.1.1 User content refers to all content generated when the user downloads, publishes or uses the software in other ways, including but not limited to your account number, email address, picture, gender, birth date and other information. 3.1.2 You are the only person responsible for your user content, and you will bear the risk that you or any third party will be identified due to the disclosure of your user content. 3.1.3 You have agreed that your user content will be restricted by Article 4. 3.2 Feedback Your suggestion (or "feedback") is deemed to be a transfer of all your rights to "feedback" and you agree that you will not provide any information that you consider confidential and proprietary, and you can use this feedback and its related information in any reasonable way information. 4. Right restriction 4.1 In the process of using this software, you will bear all legal responsibilities arising from the risks caused by the following actions: 4.1.1 Undermine the basic principles confirmed by the Constitution; 4.1.2 Endangering national security, leaking state secrets, subverting state power, or undermining national unity; 4.1.3 Damage to national honor and interests; 4.1.4 Inciting ethnic hatred, ethnic discrimination, and undermining ethnic unity; 4.1.5 Undermine national religious policies and promote cults and feudal superstition; 4.1.6 Spread rumors, disrupt social order, and undermine social stability; 4.1.7 Spread obscenity, pornography, gambling, violence, murder, terror or instigate crime; 4.1.8 Insult or slander others, infringe on the legal rights of others; 4.1.9 Contains other content prohibited by laws and administrative regulations. 4.2 You have agreed not to engage in the following behaviors in this software: 4.2.1 Publish or share computer viruses, worms, malicious code, any software that deliberately destroys or alters computer systems or data; 4.2.2 Collect other users' information or data, such as e-mail addresses, without authorization; 4.2.3 Use this software maliciously in an automated way, causing excessive burden on the server or otherwise interfering with or damaging the website server and network connection; 4.2.4 Try to access the server data or communication data of the software without authorization; 4.2.5 Interfere with and disrupt the use of other users of this software. 5. Modification and termination 5.1 Modification 5.1.1 This agreement allows for changes. Reserve the right to modify, reserve, interrupt or close any service of this software at any time without notice. 5.1.2 You have agreed that you do not need to be liable to you or a third party for modifying, retaining or closing any service of this software. 5.2 Termination 5.2.1 This agreement is effective from the date you accept it, and will continue to be effective during your use of the software, until it is naturally terminated according to the change of the version of this agreement; 5.2.2 Once this agreement is terminated, your right to use the software will terminate. You will not be liable for any termination of this agreement, including terminating your account and deleting your user content. 5.2.3 If the user violates the usage rules stipulated in this agreement, he has the right to suspend or terminate the provision of network services under this agreement to the user at any time without any responsibility for the user or any third party. 6. Third party 6.1 In order to facilitate your operation and enrich your experience, this software may contain some information or services of third parties. 6.1.1 Does not control and is not responsible for the information and services of third parties. You need to bear legal responsibility for the risks arising from the use of third party information or content. 6.1.2 When you access third party information and services, the third party's terms and policies apply. 6.2 Other users 6.2.1 This software contains user content provided by other users. It does not control and assumes no legal responsibility for its user content. Obligations to inspect, monitor, approve, approve, promise and guarantee user content. You must bear legal responsibility for the risks arising from the use of user content and interaction with other users. 6.2.2 The interaction between users and other users is only the behavior between you and other users, and no legal responsibility is assumed for such behavior. You have agreed not to assume legal responsibility for the results of such interactions. 7. Compensation 7.1 You have agreed to use the software harmlessly to avoid any complaints, lawsuits, losses, damages, liabilities, costs and expenses (including but not limited to attorney fees) from third parties due to your related actions. 7.2 Reserve the exclusive right of defense and the right to request compensation. 7.3 You have agreed that, unless you have obtained written consent, you shall not unilaterally settle a lawsuit filed by you and against a third party. 7.4 will make reasonable efforts to notify you of such litigation, litigation behavior or progress. 7.5 Under no circumstances will this software be liable for any indirect, consequential, punitive, incidental, special or punitive damages arising from this agreement by you or any third party. The risk of damage to the computer system or mobile communication device database caused by accessing and using this software will be borne by you. 8. Disclaimer 8.1 In the event of the following circumstances, no legal responsibility shall be assumed: 8.1.1 Provide your personal information in accordance with legal regulations or the requirements of relevant government departments; 8.1.2 Any personal information leakage due to your improper use; 8.1.3 Service interruption or obstruction caused by any hacker attack, computer virus intrusion, illegal content information, harassing information shielding, government control, and any other network, technology, communication line, information security management measures, etc., cannot meet user requirements Situation 8.1.4 User due to third party such as operator’s communication line failure, technical problem, network, computer failure, system instability and other loss caused by force majeure. 8.2 The software is provided as it is, and you shall bear the damages and risks that may occur when using the software. It is expressly stated that the timeliness, safety and accuracy of the software and its partner companies’ services are not guaranteed, expressly or implicitly, and in any form. 8.3 This software has the function of physical equipment control. During the process of adding and using equipment or third-party equipment supported by this software, it indicates that you have fully understood the results and risks of the operation, and any risks and The loss is borne by you, without any responsibility. 8.4 The relevant user data of this software is the data generated through your access to intelligent hardware or your own input. Although we will do our best to ensure the accuracy of user data collection, transmission and processing, the information provided by this software is only for Reference use. It is not responsible for the accuracy, authenticity and completeness of the above data. 9. Privacy Policy "Privacy Policy" is part of this agreement. Please read carefully and understand all the contents of the privacy agreement. 10. Modification of the agreement The right to modify the terms of this agreement from time to time, once the modified agreement is posted on the official website, it will replace the original agreement and take effect immediately. If the user continues to use the provided service, it is deemed to have agreed to the updated agreement; if the user does not agree to the updated agreement, he can and should immediately stop accepting the provided service. Users can log in to view the latest agreement at any time, and are obliged to follow and read the latest version of the agreement and website announcements from time to time. 11. Applicable laws This agreement is governed by the laws of the People's Republic of China. If there is a dispute between the two parties, they should be resolved through friendly negotiation; if the negotiation fails, they should file a lawsuit in the local court. 12. Independence Some terms in this agreement cannot be applied for some reason, other terms of this agreement continue to apply and the unapplicable terms will be modified so that they can be applied in accordance with the law. 13. Completeness 13.1 This agreement is the final, complete and exclusive agreement between you and you on matters related to this software, and replaces and merges the discussions and agreements of the parties on such matters before the merger. 13.2 Unless agreed in writing, you shall not assign the rights and obligations stipulated in this agreement. Any attempt to transfer in violation of the above regulations is invalid. Privacy Policy 1. How to collect and use information In the process of using products and services, we need/may need to collect and use your personal information including: 1. Account registration information: For services that need to be used through a platform account, you need to provide your name, email address, phone number, verification code, and account password to create a platform account. When using the client application, fill in the above information that needs to be provided, and we will verify your identity based on the information you provide to ensure that we are providing services to you. 2. Non-account registration information: If you choose to provide personal information necessary for non-registered accounts, such as nicknames and avatars, we will provide you with more humane services. Your nickname and avatar are only used as supplementary information for your personal information and will not be displayed publicly. 3. User feedback information: When you use the feedback and suggestion functions in our products, we will collect your email address, mobile phone number and feedback content in order to deal with your problems and equipment failures in a timely manner. 4. Mobile device information: In the process of using our service, in order to identify the abnormal status of the account, understand the suitability of the product, and provide timely warning message push and advertisement push notification, we may automatically collect your personal information, including: 1) Basic information: We will receive and record the device-related information you use (including device model, operating system version, device settings, unique device identifiers, device environment, etc.) based on your specific operations during software installation and/or use. Software and hardware feature information), device location related information (including your authorized GPS location and sensor information such as WLAN access points, Bluetooth, and base stations). 2) Service log information: When you use the products or services provided by our website or client, we will automatically collect your business data about our services and save it as a service log, including browsing, click to view, search queries, transactions, Share information, as well as IP address, browser type, telecom operator, language used, date and time of visit. 3) Authorization information: In order to provide more user-friendly services, we may need to collect and use your personal information when we use the following functions when you enable the client application. If you do not provide this information, you will not be able to enable related functions, but it will not affect the normal use of the account. . Permission based on camera/camera: When enabling the client application to remotely control the smart device function, we need to obtain the permission to use the camera/camera on your mobile device to provide the function of scanning the QR code to add a smart device. . Access permissions based on albums (picture library/video library): You can enable the access permissions of albums to realize real-time capture of videos and pictures from smart devices. We will store the captured video files and pictures on the mobile device for your subsequent viewing and use. . Microphone-based permissions: You can enable microphone permissions to implement voice functions, that is, one-way voice or two-way voice calls with smart devices. . Speaker-based permissions: You can enable speaker usage permissions to implement voice playback to monitor the sound of smart devices. . Permission based on system storage: We will obtain the system storage space and permission information of your mobile device when you install and enable the client application, so as to ensure the normal operation of the application and the space required for the storage of pictures/video materials . . Permission based on location information: We will obtain the location permission of your mobile device when you install and enable the client application, so as to provide security-compliant services for your geographic location. . Based on the permission to get notifications: You can enable the permission to get notifications to ensure that you receive alarm notification messages from the smart device. 5. Smart device information: In order to achieve remote control of smart devices through client applications, we will collect basic information about smart devices, including device name, device ID, device password, online status, network access information, firmware version, and upgrade Information in order to provide you with online services. You understand and agree that the above functions may require you to enable access to your location information (geographic location), camera (camera), photo album (picture library), microphone (voice), speakers, and system storage space information in your mobile device , In order to achieve the collection and use of the information involved in these permissions. You can check the status of the above permissions item by item in the system settings of your mobile device, and you can decide whether to turn on or off these permissions at any time. Please note that if you enable any permission, you authorize us to collect and use relevant personal information to provide you with corresponding services. Once you close any permission, you cancel the authorization, and we will no longer continue to collect based on the corresponding permissions And the use of related personal information can not provide you with the services corresponding to this authority. However, your decision to close the authority will not affect the previous collection and use of information based on your authorization. 2. How to use cookies and similar technologies 1. Cookie In order to make your visit experience easier, we will store cookies, Flash cookies, or other browsers (or associated applications) provided by your browser (or associated applications) that usually contain identifiers, site names, and some numbers and characters on your computer or mobile device. Local storage (collectively referred to as "Cookies"). With the help of cookies, websites can store your login information and other data. If your browser or browser additional services allow, you can modify your acceptance of cookies or reject our cookies. But if you do this, in some cases it may affect your safe access to our website, and you may need to change your user settings every time you visit our website. 2. Cookie similar technology In addition to cookies, we also use web beacons, pixel tags, ETags and other similar technologies on our website. For example, the email we send you may contain an address link that links to the content of our website. If you click the link, we will track the click to help us understand your product or service preferences so that we can actively improve our customers Service experience. A web beacon is usually a transparent image embedded in a website or email. With the help of pixel tags in the email, we can know whether the email has been opened. If you do not want your activities to be tracked in this way, you can unsubscribe from our mailing list at any time. ETag (Entity Tag) is an HTTP protocol header transmitted behind the Internet browser and Internet server, which can replace Cookie. ETag can help us avoid unnecessary server load, improve service efficiency, save resources and energy. At the same time, we may use ETag to record your identity so that we can understand and improve our products or services more deeply. Most browsers provide users with the function of clearing the browser cache data. You can perform the corresponding data clearing operation in the browser settings function. However, please note that if you disable ETag, you may not be able to enjoy a relatively better product or service experience. 3. How to share, transfer and disclose information 1. Sharing information We will not share your personal information with companies, organizations and individuals other than service providers, except in the following cases: 1) Sharing under statutory circumstances: We may share your personal information externally in accordance with laws and regulations, litigation, dispute resolution needs, or requirements of administrative and judicial organs in accordance with the law. 2) Sharing with explicit consent: After obtaining your explicit consent, we will share your personal information with other parties. 3) Sharing when you actively choose: When you enable the sharing of smart devices through the client application, we will share the smart terminal information you added with your designated end users according to your choice. 2. Transfer information We will not transfer your personal information to any company, organization or individual, except in the following cases: 1) Transfer with explicit consent: After obtaining your explicit consent, we will transfer your personal information to other parties; 2) In the event of a merger, acquisition or bankruptcy liquidation of service providers, or other situations involving mergers, acquisitions or bankruptcy liquidation, if the transfer of personal information is involved, we will require new companies and organizations that hold your personal information to continue to receive Restricted by this policy, otherwise we will require the company, organization and individual to seek authorization and consent from you again. 3. Disclosure of information We will only disclose your personal information under the following circumstances: 1) With your explicit consent or based on your active choice, we may publicly disclose your personal information; 2) If we determine that you have violated laws and regulations or seriously violated platform-related agreements and rules, or to protect the personal and property safety of platform users or the public from infringement, we may disclose in accordance with laws and regulations or with your consent Regarding your personal information, including relevant violations and the measures the platform has taken against you. 4. Exceptions to information sharing, transfer, and disclosure In the following situations, sharing, transferring, and publicly disclosing your personal information does not require your prior authorization: 1) Related to national security and national defense security; 2) Related to public safety, public health, and major public interests; 3) Related to judicial or administrative law enforcement such as criminal investigation, prosecution, trial, and judgment execution; 4) In order to protect your or other individuals' life, property and other major legal rights and interests, but it is difficult to obtain their consent; 5) Your personal information disclosed to the public by yourself; 6) Collect personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels. Please be aware that, according to applicable laws, if we take technical measures and other necessary measures to process personal information so that the data recipient cannot re-identify specific individuals and cannot be restored, there is no need to share, transfer, and publicly disclose such processed data. We will notify you separately and get your consent. 4. How to protect and manage your information 1. We have adopted reasonable and feasible safety protection measures that comply with industry standards to protect your information and prevent unauthorized access, public disclosure, use, modification, damage or loss of personal information. E.g: 1) We use HTTPS encrypted transmission protocol to transfer device data to the cloud; 2) Data between devices is transmitted in 128/256-bit AES, XTEA encryption mode; 3) Automatically generate AES encryption key through ECDH; 4) Use ECDSA digital signature to verify identity; 5) Use scrambling to transmit image data. 2. We have an industry-leading data security management system centered on data and around the data life cycle, which improves the security of the entire system in multiple dimensions from organizational construction, system design, personnel management, and product technology. At present, our important information system complies with GDPR and has obtained ISO27001 certification. 3. Continue to adjust the existing work guidelines and procedures to ensure the confidentiality, integrity and availability of information, and after notification of personal privacy infringements, the authorities and users can be notified within 72 hours as required by laws and regulations: 1) Import ISO 27001 / ISMS information security management system; 2) Revise the data protection and company privacy policy; 3) Data collection and use consent/declaration content adjustment; 4) Update the data leakage handling procedures; 5) Develop emergency response procedures for personal information accidents. 5. How to manage your information You can manage your information in the following ways: 1. Query and change your information: You have the right to query and change your personal information, through the client application or log in to the website, click on the account settings to query and modify the account information. 2. Change the scope of your authorization and consent: When you enable some functions of the client application, you need to obtain the corresponding authorization on your mobile device. You can go to the relevant system settings of the mobile device to modify the authorization and consent again. When you withdraw your authorization, we will no longer process the corresponding personal information, and the corresponding functions may not be enabled normally. However, your decision to withdraw your consent will not affect the previous processing of personal information based on your authorization. 3. Responding to your feedback request: In order to ensure safety, we may require you to verify your identity before processing your request, so you need to provide written proof or other relevant information that can prove your identity. In the following situations, we will not be able to respond to your request in accordance with laws and regulations: 1) Related to national security and national defense security; 2) Related to public safety, public health, and major public interests; 3) Related to criminal investigation, prosecution, trial and execution of judgments; 4) There is sufficient evidence to show that the subject of personal information has subjective malice or abuse of rights; 5) Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations; 6) Involving trade secrets. 6. How to realize the global transfer of information In accordance with the applicable data security protection laws and regulations of different countries, the measures for the global transfer of information are as follows: Personal information collected and generated during domestic operations is stored in China, except in the following circumstances: 1) Applicable laws have clear regulations; 2) Obtain your explicit authorization; 3) You conduct personal active actions such as cross-border transactions through the Internet. In response to the above circumstances, we will ensure that your personal information is adequately protected in accordance with this privacy policy. 7. How to update this privacy policy 1. We may revise the content of this policy in due course to meet the requirements of the latest laws and regulations. 2. Before the change takes effect, we will announce on the official website or notify you in other ways so that you can read the updated and complete content. 3. In this case, if you still choose to continue using our services, you agree to the first revised policy constraints. Thank you for taking the time to read our user agreement and privacy policy! Shenzhenhuangwei Technology Co., Ltd. Update date: 2020.12