Privacy strategy

Privacy policy

5GHome (hereinafter referred to as "5GHome" or "this product") is a software and hardware combination product provided by Shenzhen Tange Intelligent Technology Co., Ltd. (hereinafter referred to as "we", or "company" or "iCam"). Intelligent hardware equipment refers to 5GHome intelligent hardware equipment (hereinafter referred to as "camera"), 5GHome intelligent doorbell intelligent hardware equipment (hereinafter referred to as "doorbell"). Mobile phone client software refers to the APP (hereinafter referred to as "APP") that can manage the smart hardware device after being bound with the smart hardware device. You can view the real-time and historically recorded videos of smart hardware devices on the APP; at the same time, we also provide functions such as image and video event alarms, sound event alarms, and voice intercom through the APP. Thank you very much for your trust in us. We are well aware of the importance of personal information to users, and we also know that providing effective protection for users' personal information is the cornerstone of the healthy and sustainable development of our business. Thank you for using and trusting our products and services! We are well aware that this trust is hard-won, and we will take corresponding security protection measures to protect your personal information in accordance with the industry's mature security standards, and make this trust stronger. We hope to use this privacy policy (hereinafter referred to as "this policy") to explain to you how we collect, use, store, share and transfer your personal information and smart hardware device information when using 5GHomeAPP to manage smart hardware devices, and We provide you with ways to access, update, delete and protect this information. Please read and understand this policy carefully before using the APP, and use our products or services after confirming your full understanding and consent. Once you start using 5GHome's products and services, it means that you fully understand and agree to this policy, and agree that we collect, use, store and share your relevant information in accordance with this policy. If you have any questions, comments or suggestions about the content of this policy, you can contact us through the various contact methods provided in this policy.
 
This privacy policy will help you understand the following:
1. How we collect and use your personal information
2. How do we store your personal information
3. How do we share, transfer and publicly disclose your personal information
4. How do we protect your personal information
5. Your right to manage personal information
6. Protection of Personal Information of Minors
Seven, the scope of application of the privacy policy
8. Changes and revisions to the privacy policy
9. How to contact us
10. Effectiveness of the Privacy Policy
 
 
1. How we collect and use your personal information
We will collect and use your personal information in accordance with this policy, which contains your personal sensitive information, such as images and information of you and your family, location information, call records made through the camera, and camera purchase and consumption records, The purpose and purpose of collecting and using this sensitive information are detailed in the function description section below. Once the personal sensitive information is leaked, illegally provided, or misused, it may endanger the safety of people and property, and easily lead to personal reputation, physical and mental health damage, or discriminatory treatment. Therefore, we will adopt compliance technology to encrypt/secure the sensitive information that you explicitly agree to and actively provide to protect the security of your personal information. If we indirectly obtain personal information related to you through other channels such as sharing, transferring, collecting public information, we will clearly inform you, and only obtain the minimum amount of information necessary to realize the business functions of the product or service, and we will collect and Clearly inform you and seek your express consent before use. At the same time, we will ensure the legitimacy of the information source before collecting information, and understand the scope of authorization and consent for personal information processing that the personal information provider has obtained, including the purpose of use, authorization and consent for transfer, sharing, and public disclosure. If the personal information processing activities that we need to conduct business are beyond the scope of the authorization and consent, we will obtain your express consent within a reasonable period after obtaining the personal information or before processing the personal information. The details of the purpose and purpose of our collection and use of your information are as follows:
 
(1) Realize the main functions of the camera
Core functions refer to the basic functions that support the normal operation of the APP and provide services. If you do not agree that we must collect and use your personal information to provide you with services, you will not be able to use this product.
1. Information collected through registered accounts. After you install the camera app on your mobile phone, you need to register on the app or log in to your 5GHome account to use it. When you register an 5GHome account, you need to provide your mobile phone number and set the account password or use the WeChat login function to register and log in. Based on our cooperation with WeChat, when you use the "WeChat login" function, with your express consent, WeChat will send us your WeChat ID so that we can provide you with fast login services. If you refuse to provide the WeChat ID, you will not be able to use the "WeChat login" method to register and log in to your 5GHome account, but it will not affect your registration and login through other methods, nor will it affect the normal use of other functions. You can modify your avatar and password through "My -> Account Management". When you cancel your 5GHome account, we will stop using and delete the above information or anonymize your personal information, unless otherwise provided by laws and regulations.
2. Bind smart hardware devices. After you log in to the APP, you can connect and bind the APP and smart hardware devices through sound wave induction. In order to realize the binding of APP and smart hardware device, we need to obtain your location information (used to obtain WiFi list), WiFi network information, smart hardware device and mobile phone switch and connected network status, smart hardware device model, mobile phone operation Maker, mobile phone operating system and version, mobile phone model, mobile phone local storage space. The above information will be uploaded to the server of 5GHome to prevent other identities other than you from accessing and managing smart hardware devices, and to better protect the security of your information. You can unbind the smart hardware device and delete all your personal information related to the smart hardware device through "Settings->Unbind and delete this camera" and "Settings->Unbind and delete this doorbell".
3. View the video screen shot by the smart hardware device. After binding the smart hardware device, you can view the real-time video images and historical video recorded by the smart hardware device through the APP. You can also save the video locally or share it with friends through third-party applications. When you share a video with a friend through a third party, we will not obtain any information about your third-party application (including related account information). When your mobile phone is connected to the WiFi network and logged in on the APP and has purchased the "cloud recording" service or has a memory card inserted in the mobile phone, you can view and manage smart hardware through the "cloud recording" and "card recording" of the APP Historical video records taken by the device. When you use the "Cloud Recording" service, when the smart hardware device is turned on and connected to WiFi, we will encrypt all the videos recorded by the smart hardware device and upload it to the server of 5GHome to synchronize to different devices and pair Video files are protected, and such video files are only retained for 7 days; if you use the "card video" service, the video shot by the smart hardware device is only saved in your local area and will not be uploaded to the 5GHome server.
4. Manage and control smart hardware devices. After you bind the smart hardware device, you can control the camera's functions and services through the "Camera->Settings" in the APP, including camera naming, service scenarios, open stay alarm, forced demolition alarm, do not disturb at home, smart housekeeping , Family photo album, or through "Doorbell -> Settings" to control the doorbell functions, including doorbell monitoring range, open stay alarm, forced demolition alarm, do not disturb at home, and receive doorbell-related push messages. When you turn on the Do Not Disturb at home function of your smart hardware device, you need to authorize us to obtain the MAC address of your mobile phone to confirm that your mobile phone and the smart hardware device are in the same Wifi environment. The information you set and provide will be uploaded to our server as instructions for smart hardware devices to realize the management and control of smart hardware devices. 5. The phone call function of the doorbell. When you have not received or missed the doorbell call message in the software, the doorbell will inform you of the relevant doorbell information by sending a text message to your mobile phone number. The short message service is supported by related technical services provided by the telecom operator. In order to achieve this function, we need to share your bound mobile phone number with the telecom operator. In order to ensure timely detection of telephone calls and to ensure that you have received the doorbell-related notifications, the telecom operator will save the call records and recordings of the corresponding telephone calls. We will require telecom operators to strictly encrypt the upload and storage of such information to ensure the security of your information.
 
(2) Realize additional functions of 5GHome smart camera
Additional functions refer to service functions other than core functions and third-party functions, and you need to choose to enable them. We will not collect your personal information for functions that you have not turned on. At the same time, you can turn off additional functions through the shutdown path mentioned below; after closing, we will no longer collect and use your personal information, and will not affect your use of the core functions of the APP.
1. Take screenshots and video recordings. This function allows you to take a screenshot of the video when you view the video recorded by the camera. You can view the screenshots and photos in the local "album" of your phone. Your screenshots and videos will be uploaded to the server for simultaneous viewing on different devices. We will not use your screenshots and video recordings elsewhere, nor will we share them with third parties.
2. Change monitoring. We will recognize the pictures recorded by smart hardware devices, realize the change monitoring reminder and the safety protection of the family and the family. You can view the abnormal monitoring and related videos that appeared in front of smart hardware devices (especially doorbells) in the last two days. At the same time, you can choose whether to turn on or off notification and monitoring in the camera settings.
3. Share smart hardware devices. You can use WeChat to share smart hardware devices and invite friends to share smart hardware devices by inviting your mobile phone number. When you share the QR code of your smart hardware device with your friends via WeChat, we will not obtain any information about your WeChat account. When you choose to invite friends through your mobile phone number, we need you to authorize us to obtain "contact permissions", so that you can select the contacts you want to share your smart hardware device with through the address book list. We only read your address book list locally for you to choose to share contacts. Your address book information will not be uploaded to the server, nor will it be shared with third parties. If you refuse to authorize, you will not be able to select a contact through the address book, but it does not affect your manual input of the contact's mobile phone number. We will encrypt your family’s mobile phone number and upload it to the server, so that you can invite friends to share smart hardware devices with your mobile phone number. After the contact is invited, he can only view the real-time recording of the smart hardware device and all alarm message records at any time. You can manage the list of invited family members in "Settings -> Sharing".
4. Network speed monitoring. Ensure that your mobile phone and smart hardware device are connected to the same network, we will test the network speed of your mobile phone through the public interface of the mobile phone system, and feedback the test results to you, so that you can view and understand the network of the smart hardware device speed. In the process of implementing this function, we will not obtain any personal information about you, and you can choose to close the network and data in the camera settings.
5. Purchase cloud video. Cloud video provides you with the function of watching and saving historical videos shot by smart hardware devices through the APP at any time. In order to use this function, you need to purchase cloud recording. When you choose to purchase and pay for cloud recording package services for smart hardware devices, you can use third-party payment methods (including WeChat, Alipay, and Apple Pay) to achieve payment. We only obtain the name of your purchased product, order number, order amount, and payment status to provide you with relevant cloud recording services. We will not obtain any information about the third payment account.
 
(3)Device permission call
In the process of providing services, the 5GHome smart camera APP will call some device permissions of your mobile phone. The following are the business functions corresponding to the APP call permission, the purpose of the call permission, and the information you will be asked before the call permission. You can choose to turn off some or all of the permissions in the device's settings function to refuse the APP to collect the corresponding personal information. In different devices, the permission display method and closing method may be different. For details, please refer to the instructions or guidelines of the device and system developer. Please note that if you turn on any permission, you authorize us to collect and use relevant personal information to provide you with corresponding services. If you turn off any permission, you cancel the authorization. We will no longer continue to collect and use the corresponding permissions. The use of relevant personal information will also stop providing you with corresponding services. However, the operation of turning off your authority will not affect the collection and use of information previously based on your authorization.
Device permissions Corresponding business function Purpose of calling permissions Whether to ask Can users turn off permissions
Phone permissions core function Used for risk control and ensuring operational safety Yes Yes
Location permissions core function Get a list of WiFi networks in your location, and realize that smart hardware devices can connect to the WiFi network you choose Yes Yes
Storage permissions core function Local storage of videos and images recorded by smart hardware devices in mobile phones Yes Yes
Camera permissions Additional features Add a camera by scanning the QR code Yes Yes
Microphone permissions Additional features Intercom Yes Yes

 

(4)Improve our products and services

  1. Product improvement and optimization. In order to continuously improve our products, eliminate and reduce product crashes, and provide you with better product features and services, we will obtain the following information of your mobile phone and the bound smart hardware device through the public interface of the mobile phone system: Mobile Identity Code (IMEI), Network Device Address (MAC), Operator, Mobile Phone Model, Mobile Phone System Version Number, System Number, System ID Number, Screen Resolution, Internet Type, APP Name in Mobile Phone, Version Number, Package Name , APP use time and frequency, APP crash log information. It is used to count the number of users of our products, analyze the usage of the products, troubleshoot the causes of crashes, and optimize product functions. This information does not involve information related to your personal identity.
  2. 2. Feedback and information. You can give us feedback or inquire about the problems you encounter in using the APP through the "My -> Help and Feedback -> I Want to Feedback" of the APP. When you feedback a question or make an inquiry, you need to provide your contact information (QQ number, mobile phone number), select the problem type, hardware type, detailed description of the problem, and drawings. We will analyze the information mentioned in the previous paragraph to find the cause of the problem and try to solve the problem. The contact information you provide in your feedback will only be used by our customer service to communicate and feedback with you. We will not provide any third party with the contact information you provide, except with your explicit consent and clear regulations.

 

(5) Security

In order to improve the security of your use of the services provided by us and our affiliates and partners, protect your or other personal and property safety of you or the public from infringement, and better prevent phishing websites, fraud, network vulnerabilities, computer viruses, and network attacks , Network intrusion and other security risks, to more accurately identify violations of laws and regulations or 5GHome related agreement rules. We may use or integrate your account information, smart hardware information, APP usage information, and information that our affiliated companies and partners have obtained your authorization or shared in accordance with the law for identity verification, detection and prevention of security incidents, and take necessary actions in accordance with the law. Records, audits, analysis, and disposal measures.

 

(6)Exception with authorization and consent

1.Related to national security and national defense security;

2. Related to public safety, public health, and major public interests;

3. Related to criminal investigation, prosecution, trial, and execution of judgments;

4. For the purpose of protecting the life and property of the personal information subject or other individuals, but it is difficult to obtain your own consent;

5. The personal information collected is disclosed to the public by you yourself;

6. Collect personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels;

7. Necessary for signing a contract according to your requirements;

8. Necessary for maintaining the safe and stable operation of the provided products or services, such as discovering and disposing of product or service failures;

9. Necessary for legal news reports;

10. It is necessary for academic research institutions to conduct statistical or academic research based on public interests, and when they provide academic research or description results to the outside, they de-identify the personal information contained in the results;

11. Other circumstances stipulated by laws and regulations.

 

2.How we store your personal information

The personal information we collect and generate in various countries will be stored locally and does not involve cross-border transmission. In the future, if your relevant personal information undergoes cross-border data processing, if it is necessary to transmit relevant personal information collected in China to overseas institutions, we will implement it in accordance with laws, administrative regulations and relevant regulatory authorities. And before the cross-border data transmission, you will be asked for your consent and permission again, and then the data transmission will be carried out. At the same time, we ensure that the location and purpose of data transmission will be specified in the privacy policy, so that you can always know where your personal information is stored. At the same time, we will adopt corresponding encryption, anonymization and other technologies to ensure that your personal information is adequately protected during transmission. We only store your personal information within the minimum period required for the purpose of this policy and within the time limit required by laws and regulations. In order to provide you with cloud recording services, the maximum storage time of videos captured by smart hardware on the server is based on the period of the package you purchased "cloud recording". When you no longer use cloud recording, related video files will not be stored on the server . If you stop using the APP or unbind the smart hardware, we will immediately stop collecting your personal information and anonymize the personal information you have provided to us within a reasonable period of time. If we stop operating iCam’s products or services, we will promptly stop continuing to collect your personal information, notify you of the cessation of operations in the form of one-by-one delivery or announcement, and delete or anonymize the personal information we store handle.

 

3. How do we share, transfer and publicly disclose your personal information

(1) Sharing We will not share your personal information with any company, organization or individual, except in the following circumstances:
With your explicit consent, we will share your personal information with other parties. We may share your personal information externally in accordance with laws and regulations, the need for litigation and dispute resolution, or the requirements of administrative and judicial organs in accordance with the law. To the extent permitted by laws and regulations, it is necessary to share your personal information in order to protect the interests, property or safety of iCam, iCam's affiliates or partners, you or other iCam users, or the public from damage. Sharing between affiliated companies: We may share your personal information with our affiliated companies when our affiliates provide services to you or to us. However, we only share necessary personal information, and the processing of your information by related parties is governed by this policy. If the affiliated company wants to change the purpose of processing your personal information, it will again seek your authorization and consent. For companies, organizations and individuals with whom we share personal information, we will sign strict data protection agreements with them, requiring them to process personal information in accordance with our instructions, this policy and any other relevant confidentiality and security measures.

(2) Transfer
We will not transfer your personal information to any other companies, organizations and individuals, except in the following circumstances: With the development of the company’s business, we and our affiliated companies may conduct mergers, acquisitions, asset transfers or other similar transactions . If the relevant transaction involves the transfer of your personal information, we will require the new company, organization and individual that holds your personal information to continue to be bound by this policy, otherwise we will require the company, organization and individual to re-obtain your authorization and consent. Meet the requirements of laws, regulations, legal procedures, or mandatory government requirements or judicial rulings. In the case of obtaining your explicit consent to transfer, that is, after obtaining your explicit consent, we will transfer your personal information that we have obtained to other parties.

(3) Disclosure
We will only publicly disclose your personal information under the following circumstances: you have obtained your explicit consent. We may publicly disclose your personal information when required by law, legal procedures, litigation, or government authorities. To the extent permitted by laws and regulations, it is necessary to disclose your personal information in order to protect the interests, property or safety of iCam, iCam's affiliates or partners, you or other iCam users, or the public from damage. Other circumstances stipulated by laws and regulations. According to laws and regulations, sharing and transferring personal information that has been de-identified, and ensuring that the data recipient cannot restore and re-identify the subject of personal information does not belong to the external sharing, transfer, and public disclosure of personal information. Storage and processing will not need to notify you separately and obtain your consent.

 

4. How do we protect your personal information

We have adopted industry-standard security protection measures to protect the personal information you provide to prevent unauthorized access, public disclosure, use, modification, damage or loss of data. We will take all reasonable and feasible measures to protect your personal information.
1. We attach great importance to the security of your personal information and will strive to take reasonable security measures to protect your personal information. At present, iCam has passed the information system security level test of the Ministry of Public Security and has been approved and issued by the public security department. The national information security level protection level three certification", at the same time, iCam has also passed the internationally authoritative ISO 27001 information security management system certification.
2. We deploy an access control mechanism on the server side, adopt the principle of minimum sufficient authorization for staff who may have access to your personal information, and regularly check the list of visitors and access records.
3. The server systems where we store your personal information are all security-reinforced operating systems. We will conduct account auditing and monitoring of server operations. If an externally announced server operating system with security issues is found, iCam will update the server security as soon as possible to ensure the security of all iCam server systems and applications.
4. We organize regular trainings on personal information protection related laws and regulations for our staff to strengthen the staff's awareness of your personal privacy protection.
5. In the unfortunate event that our physical, technical or management protection measures are damaged, we will promptly activate emergency plans to prevent the expansion of security incidents, report to the national competent authority in accordance with the requirements of laws and regulations, and promptly adopt reasonable pushes, announcements, etc. , Effective ways to inform you of the basic situation, possible impact, measures that have been taken or measures to be taken, etc. of the security incident.

 

5. Your right to manage personal information

During your use of the APP, you can access and manage your personal information in the following ways:
(1) Access and correct your personal information You can change your account name and account password in the App account settings.
(2) Delete your personal information You have the right to request iCam to delete your personal information when the following situations occur:
1. We have collected your personal information without asking for your explicit consent.
2. Our processing of your personal information violates the requirements of laws and regulations.
3. We have violated our agreement with you to use and process your personal information.
4. You have cancelled your iCam account, uninstalled, or no longer use our products (or services).
5. We stop providing services to you. You can contact us to request the deletion of your personal information through the methods provided in section 9 of this privacy policy, and we will reply within 15 working days. When we delete your personal information from the server, we may not delete the corresponding data from the backup system immediately, but will delete this information when the system updates the backup information.
(3) Logout of your personal account You can log in to the App and enter account settings -> other account settings -> logout account. Log out of your iCam account. Please note that if you choose to log out of your iCam account, your iCam account will be unavailable and the related account information will be cleared. You will no longer be able to log in through your iCam account and use iCam product features and services (but it will not affect you Use services and functions that can be used without account login). After you cancel your account, we will stop providing you with the corresponding products (or services), and delete or anonymize your personal information within 10 working days, except in cases where laws and regulations require us to save relevant information.

 

(4) Withdraw your consent or authorization

In the APP, you can withdraw your consent and authorization to us in the following ways.
(1) You can enter the authorization management interface of your 5GHome smart camera authorization through the local "Settings->Application Settings->5GHome->Permission Management" of your mobile phone, and withdraw your authorization and consent to the iCam smart camera APP.
(2) Through the specific closing path and method in the function description of the module of "1. How do we collect and use your personal information" of this policy, close related functions or unbind smart hardware devices. Closing means withdrawing the authorization corresponding to the function. Please understand that each business function requires some basic personal information to be completed (see the first section of this policy). After you withdraw your consent or authorization, we cannot continue to provide you with services corresponding to the withdrawal of your consent or authorization. The corresponding personal information will no longer be processed. However, your decision to withdraw your consent will not affect the previous processing of personal information based on your authorization.

 

(5) Responding to your above request
To ensure safety, you may need to provide a written request or prove your identity in other ways. We may ask you to verify your identity before processing your request. However, please understand that some of your information may not be accessible, modified, or deleted due to legal and regulatory requirements, information security, technical restrictions, and other reasons.

 

6. Protection of Personal Information of Minors

This product is not specifically designed for minors. Minors under the age of 18 need the consent and authorization of the minors themselves or their guardians when using this product. When children under the age of 14 use this product, their parents and other guardians need to read this policy, and children should seek the consent and guidance of their parents and other guardians before submitting personal information. If you are the parent or guardian of a child, when you have any questions about the personal information of the child under your supervision, you can contact us through the contact information in Section 9 of this policy.

 

7. the scope of application of the privacy policy

This privacy policy only applies to 5GHome App. Other products and services of 5GHome will use the privacy policies of related products or services. In particular, it should be noted that this privacy policy does not apply to the following situations:
1. Embed 5GHome products (or services) into third-party products (or services), and information collected by third-party products (or services).
2. Information collected by third-party services, advertisements, or other companies, organizations, or individuals connected to 5GHome products (or services).
We hereby remind you that when you use third-party products and/or services, please carefully read the relevant user agreements and privacy policies shown to you by the third party, and keep and provide your personal information carefully.

 

8. Changes and revisions to the privacy policy

Our privacy policy may change. Without your explicit consent, we will not restrict your rights in accordance with this privacy policy. For major changes to this privacy policy, we will also provide noticeable notifications (for example, when the APP is revised or upgraded, or you log in again, we will promptly notify you in the form of a pop-up window). The major changes referred to in this policy include but are not limited to:
1. Our service model has undergone major changes. Such as the purpose of processing personal information, the type of personal information processed, the way of using personal information, etc.;
2. Significant changes have taken place in our control and other aspects. Such as owner changes caused by mergers and acquisitions, etc.;
3. Changes in the main objects of personal information sharing, transfer or public disclosure;
4. Your right to participate in the processing of personal information and how to exercise it has undergone major changes;
5. When our responsible department, contact information and complaint channels for handling personal information security change;
6. When the personal information security impact assessment report shows that there is a high risk.

 

9. How to contact us

If you have any questions, comments, suggestions or complaints about our privacy policy and the handling of your personal information, please contact us in the following ways.
Contact email: service@tange.ai, under normal circumstances, we will respond to your request within 15 working days.

 

10. Effectiveness of Privacy Policy

The update date of this policy version is January 4, 2021, and will officially take effect on July 30, 2021.