Update Date: June, 20th, 2023
Effective Date: June, 20th, 2023
You are welcomed to use our products and services!
The Privacy Policy applies to the services of AMACE IOT (hereinafter referred to as "Service") provided by ShenZhen Ampower New Energy Co., Ltd (hereinafter referred to as "Ampower" or "we"), including App, mini programs and various products and services provided to you in new forms with the development of technology. If a platform has a separate privacy policy, the separate privacy policy shall be applied preferentially. For the parts not covered by the separate privacy policy, the content of this Privacy Policy shall prevail. This policy helps you fully understand what data is collected, why it is collected, how it is used and how it is protected when you use our products and services.
Your trust is of great importance to us, and we know how important the personal information is to you. We will collect your personal information within a reasonable and necessary scope as required by laws and regulations. We make every effort to protect your information from disclosure, destruction or loss through reasonable and effective information security technology and management process as well as appropriate security measures.
Please read this Policy carefully and thoroughly understand it before using our products and services, especially the bold and underlined terms. By agreeing to this Privacy Policy, you indicate that you have known the features provided by the application and the necessary personal information required for the operation of the features, and you have given the authorization to collect and use the personal information. If you have any questions about this Policy, please contact us in the way provided in Article 8. If you are a minor under the age of 14, please read this Policy accompanied by a legal guardian and pay special attention to the Terms of Use for minors.
The Policy contains the following content:
1. How we collect and use your information
2. How we share and publicly disclose your information
3. How we store your information
4. How we protect your information
5. Your rights
6. Data transfer
7. How we protect the information of minors
8. Contact us
1. How We Collect and Use Your Information
Our legal basis for collecting and using your information will depend on the information concerned and the specific context in which we collect it. However, we will normally collect information from you only where we have your consent to do so, where we need the information to perform a contract with you, or where the processing is in our legitimate interests.
What calls for special attention is that the separate device information or service log information cannot be used to identify a particular natural person. If we combine such non-personal information with other information to identify a particular natural person or use the non-personal information in combination with personal information, such non-personal information will be considered as personal information during the period of combination and we will anonymize and de-identify such information, unless otherwise authorized by you or required by law or regulation.
If you have questions about or need further information concerning the legal basis on which we collect and use your information, please contact us in the way provided in Article 8 of this Policy.
1.1 Circumstances which require you to authorize us to collect and use your personal information.
In order to provide our services to you, we will ask you to provide personal information necessary for providing those services. If you do not provide your personal information, we may not be able to provide you with our products or services.
1.1.1. When you start to register and try to log in, we will need you to provide us with your phone number, and enter the SMS verification code, so that we can verify your identity. And when you are interacting with our product, we will collect your language preference from your account.
1.2 Circumstances which may require you to authorize us to collect and use your personal information.
In order to enable you to better enjoy the control and management of smart devices provided by the platform, we may collect and use your personal information in the following additional features. If you do not provide this personal information, you can still use the basic services, but may not use the additional features that will bring you convenience. The additional features include:online repair application, feedback, equipment sharing.
1.2.1 When you are applying for online repair or feedback, we may need you to provide your personal information for us to service better. Including your device’s name, your name, your phone number, camera photos and your location. If you choose to update your log information when applying for online repair, we will collect your recently record of APP operations.
1.2.2 When you want to share the device, we may need you to provide the third user’s phone number for a more convenient authorizing.
1.2.3 In order to provide you with a more convenient and better product service, and to improve your using experience, you may finish your personal profile as much as possible, including your nickname and portrait.
1.3 Information automatically collected by us
In order to provide our products and services, we must necessarily collect certain information automatically. This also helps us to ensure that our products and services are operating correctly.
1.3.1. The information we collect about you when you use our services, when you download or use the APP, we will read information related to your mobile device, including hardware model, IMEI number or other unique device identifiers, MAC address, IP address, operating system version, and settings of the device used to access the service. At the same time, we will also read the relevant information about the device you use through the AMACE IOT APP, including the device model, device operating status, and device usage frequency,Use of cameras built into some devices.
1.3.2. Information collected during the connection to a smart device. Based on the type of the smart device you need to connect to, we may collect: device name, device model, device ID, on-line status, activation time, hardware version and update information. And during your connecting to smart devices, we may collect:
1.3.2.1 Smart devices that are linked through WIFI: WIFI information(SSD, WIFI Password), MAC address.
1.3.2.2 Smart devices that are connected through Bluetooth, and linked through WIFI: WIFI information(SSD, WIFI Password), MAC address.
1.3.2.3 Smart devices that are linked through Bluetooth: MAC address.
1.3.3 Information collected when binding and controlling a device. We will collect your device model, IP address, location information, device status information, device SN, device MAC address, device SIM card information, device and personal GPS precise location information, latitude and longitude, as well as transactions and consumption within the APP record information.
1.3.4. In order to help us understand how the app is performing, we may record relevant information. Includes your usage frequency, crash data, overall usage, performance data.
1.3.5 When you use products or services, we will automatically receive and record your APP client information, including your IP address, language used, access date and time, software and hardware feature information data; when you use electronic fence, equipment car search, Cycling navigation, and after-sales service, we will also collect the mobile phone number and GPS information location you provide.
1.3.6 In order to provide you with recommendation services, send software updates or alarm failures, system notifications, you agree that we collect information about your device (such as IMEI or OAID, Serial Number, IMSI, User ID, Android ID, Google Advertising ID, mobile phone Region settings, device model, mobile phone battery, mobile operating system version and language), application information ( Such as APP package name and version number, running status), network-related information(such as IP or domain name connection result, current network type), message sending result, notification bar status (such as notification bar permission, user click behavior), lock screen status (such as whether to lock screen, whether to allow lock screen notifications).
1.4. Information we receive from third parties
When permitted by law, we will collect information about you from third-party sources. For example: when log in through one-click button or log through your device phone number, we may collect your phone number to finish register by make use of China Mobile’s platform.
1.5. Request device permission
Please note that if you enable any permission, you authorize us to collect and use relevant personal information to provide corresponding services for you. Once you disable any permission and cancel your authorization, we will not continue to collect and use relevant personal information based on the corresponding permission, nor can we provide you with the corresponding services. However, your decision to disable your permissions will not affect any information previously collected and used based on your authorization.
1.5.1 Read and write external storage space (Android version): Used to read and write photos and files on the device in functions such as scanning and user feedback.
1.5.2 Album storage read and write permissions (Android and iOS versions): used for user feedback image extraction and image saving functions.
1.5.3 Location permission (Android, iOS version): used to determine the region, discover nearby smart devices, and discover the list of accessory WLANs.
1.5.4 Camera permission (Android, iOS version): used to scan QR codes for device binding and other functions.
1.5.5 Enable Bluetooth permission (Android, iOS version): used for Bluetooth signal sent by connected device and device communication when quickly connecting device.
1.5.6 Enable WLAN permission (Android, iOS version): Used to configure Wi-Fi for the device to communicate with the device.
1.6. Self-starting and associated startup
1.6.1 When you finished using and quit from APP, in order to keep you informed with any important APP message, such as device abnormal reminder, device sharing invitation, device low power reminder, etc, the APP will start automatically. And it might act a little differently according to the device brands and versions, but won’t self-start that often. Self-starting is necessary when the functions and services need to be done, and if you want to cancel it, please go to your mobile phones Settings, Privacy, Permission manage.
1.6.2 When you open content-based recommend messages or device sharing, after obtaining your explicit consent, you will be redirected to open relevant content. There will be no self-initiation or associated activation without your consent.
We may from time to time send you service-related announcements when we consider it necessary to do so (such as when we temporarily suspend service for maintenance, or security, privacy or administrative-related communications). You may not opt-out of these service-related announcements, which are not promotional in nature.
1.7. If the information you provide contains personal information from other users, you need to ensure that you have obtained legal authorization before providing us with such personal information. If any personal information about a minor is involved, you must obtain the consent from the minor's guardian prior to publication, in which case the guardian has the right to contact us in the way provided in Article 8 of this Policy to request correction or deletion of the content relating to the minor's personal information.
We will obtain your consent in advance if we intend to use the information for other purposes not specified in this statement, or we intend to use the information collected for a specific purpose for other purposes, or if we actively obtain your information from third parties.
2. How We Share and Publicly Disclose Your Information
2.1. We do not sell any personal information to third parties. To provide you with the products and services described in this Privacy Policy, we may share your personal information with our third-party service providers and business partners when necessary. Ampower will conduct due diligence and enter into contracts to ensure that the third-party service provider complies with the applicable privacy protection laws in your jurisdiction. For details, you can read the Ampower AMACE IOT Third-party Information Sharing and SDK List to view how we share your personal information.
2.2. Note that some of the features in AMACE IOT are provided by the third-party we cooperate with (hereinafter referred to as "SDK Provider") in the form of SDK plug-ins. The SDK Provider will obtain corresponding permissions and information based on the requirements for providing features or services to you. For details, you can read Ampower AMACE IOT Third-party Information Sharing and SDK List to know how the third-party SDK processes your personal information.
2.3. Share with our affiliates: In order to provide you with better services or protect the personal and property safety of Ampower affiliates, other users or the public from infringement, your information may be shared among Ampower affiliates. We will only share your personal information among our affiliates for specific, explicit and legal purposes stated in this Policy, and will only share the information necessary to provide the services. However, for the information shared with the affiliates, we will require the affiliates to take protective measures no less than the effect of this policy and strictly abide by the relevant laws, regulations and regulatory requirements. If the affiliates want to change the purpose of processing personal information, they need to request your authorization and consent again.
2.4. Share with manufacturers that directly or indirectly provide you with smart devices.
2.5. Law enforcement agencies, public bodies or other judicial bodies and organizations. We will disclose the information if we are required by law or if we believe in good faith that the disclosure is reasonable and necessary to address the following:
l Comply with a legal obligation, process, or requirement;
l Enforce the terms of service and other agreements, policies, and standards, including investigating any possible violation of these documents;
l Discover, prevent, or otherwise solve problems of security, fraud, or technology;
l Protect the rights, property, or safety of us, our users, third parties, or the public (including exchanging information with other enterprises and institutions for the purpose of preventing fraud and reducing credit risk), whenever required or permitted by law.
2.6 Third parties that acquire us or all/most of our business.
If we sell, purchase or merge with other enterprises, we will disclose information to the third parties, in which case we will disclose your data to the potential buyers of the enterprises We will also disclose information to the third parties if we buy, sell, merge or cooperate with other companies or enterprises, or if we sell some or all of our assets. In such transactions, user information may be included in the transferred assets.
3. How We Store Your Information
We retain personal information for the period necessary for the purposes of information collection described in this Privacy Policy, or to comply with applicable legal requirements. We will store the personal information collected in China in China in accordance with laws and regulations. If the storage location of your personal information is transferred from China to overseas, we will strictly follow the law. After the purpose of collecting personal information is completed, or after we confirm your application for information deletion and account cancellation or after a product or service terminates its operation, we will stop retaining personal information and delete or anonymize it. If the personal information collection is for the purposes of public interest, scientific, historical research or statistics, we will continue to retain the relevant data based on the applicable law, even if further data processing is not related to the original purpose of collection.
4. How We Protect Your Information
4.1 We have taken reasonable and feasible security measures to protect your information from unauthorized access, public disclosure, use, modification, damage or loss in accordance with industry standards. For example, we adopt SSL protocol to encrypt and protect your data exchanged between your browser and server; meanwhile we provide secure browsing to Ampower platforms over HTTPS;we use encryption technology to improve the security of personal information; we use the trusted protection mechanisms to protect personal information from malicious attacks; we deploy access control mechanisms to ensure that only the authorized personnel can access your personal information, and we conduct security and privacy training courses to strengthen the employee’s awareness of the importance of personal information protection.
4.2 The Internet is not absolutely secure and we strongly recommend you not to send your information by using the communication methods not recommended by Ampower when using a product or service of Ampower. You can connect and share information with each other through our services. When you create communications, conduct transactions or share information through our services, you can choose who you communicate with, trade with or share with as a third-party that can view your transaction information, contact details, exchanged information or shared content.
4.3 Once a user information security incident occurs, we will inform you in accordance with the requirements of laws and regulations of the basic situation and possible impact of the security incident, the measures we have taken or are about to take, the advice you can choose on preventing and reducing risks, remedies for you and so on.We will inform you of the event by emails, letters, phone calls, push notifications or other means.If it is difficult to notify each Data Subject of the incidents, we will take a reasonable and effective way to make announcements.At the same time, we will also report the handling user information security incidents in accordance with the requirements of relevant regulatory authorities.
4.4 Our information security policies and procedures are designed with reference to international standards, and regularly pass third-party audits to verify the effectiveness of security measures.We has obtained ISO/IEC 27001:2013 certification for information security management systems (ISMS) and ISO/IEC 27701:2019 certification for personal information management systems (PIMS).
5.Your Rights
In accordance with the applicable national or regional laws and regulations, you have the right to request access, correction and deletion of any personal information held by us related to you (hereinafter referred to as the Request). Specific information is as follows.
5.1 Access your personal information
5.1.1 Account information: If you want to access or edit your profile information in your account, update your password and more, you can access your information by visiting the settings after you log in to your account.
5.1.2 For the personal information generated during your use of our products or services, if you need it, you can contact us in the way stated in Article 8.
5.2 Correct your personal information
You have the right to request us to correct or supplement your personal information if you find that we have made mistakes in handling your personal information. You can make corrections or supplements by visiting the Personal Information Settings page or contacting us directly.
5.3 Delete your personal information
In the following cases, you can contact us to request the deletion of your personal information.
5.3.1 If our behaviors in handling personal information violate laws and regulations;
5.3.2 If we collect and use personal information without your explicit consent;
5.3.3 If our behaviors in handling personal information have seriously violated our agreement with you;
5.3.4 If you do not need to use our products and services, or you voluntarily cancel your account;
5.3.5 If you do not need our products or services permanently.
If we decide to respond to your deletion request, we will stop providing you with products or services and delete your personal information as required by the applicable laws.
5.4 Right to data portability
The right to data portability requires us to provide you with your data and, where possible, to transmit it directly to the data controller.If you need, you can contact us in the way stated in Article 8.
5.5 Cancel account
The account cancellation is permanent. Please operate with caution. If you need, you can delete/cancel your account via the following paths:
5.5.1 You can cancel your account through the following steps: [Me] - [Personal Information] - [Cancel Account]
5.5.2 If you need our assistance in canceling your account, you can contact us in the way provided in Article 8.
5.5.3 After you cancel your account, we will stop providing you with products or services, and delete your personal information according to your request.
5.6 Withdraw consent
As far as our processing is based on a consent you may withdraw your consent at any time.The withdrawal of consent does not affect the lawfulness of processing based on the consent before its withdrawal.
We will protect your right to withdraw your consent in the following ways:
5.6.1 As mentioned above, you can withdraw your consent in Mobile phone system settings change device permissions. The permissions include location permission, camera permission, album (picture library/video library) permission, microphone permission and Bluetooth permission.
5.6.2 You can turn off the push of notifications, alerts and messages which you have agreed to in phone system settings. In the notifications, alarms, and push messages you agree to, you can turn off your choice through the phone system settings.
In different devices, the permission display method and closing method may be different. For details, please refer to the instructions or guidelines of the device and system developer.
6.Data Transfer
Ampower is a global organization with legal entities, business processes and technical systems that operate across national borders. The information we collect is stored and processed on cloud servers in Europe and other parts of the world. We protect personal data in accordance with this Privacy Policy, and no matter where the information is processed, we will take appropriate steps to protect personal data according to the contract or other applicable laws.
Note that personal information collected and generated during our operations in the mainland of the People's Republic of China will be stored in our data centers in the mainland of China, except which is permitted to be transmitted across borders.
7. How We Protect the Information of Minors
Our service is primarily intended for adults. But for the children who use our services, we have additional procedures and measures in place to keep children's personal data secure.We consider minors under the age of 14 (or the age specified by local law) as children. In the case of collecting personal data of children with parental consent, we will only use or disclose the information of minors that we collect legally to the public if permitted by law, with the express consent of the parents or the legal guardian or necessary for protecting the minors.If we find that we have collected personal information from children without prior and verifiable guardian consent, we will seek to remove the content as soon as possible.
8. Contact Us
8.1 If you have any questions, comments or suggestions about the content of this Privacy Policy, or you want to exercise your rights, or if you have any request to discuss with us, you can contact us in the following way:
Email: service.am@highpowertech.com
8.2 To ensure security, you may need to provide a written request or otherwise proving your identity. Generally, we will reply within 15 days. Given the complexity and number of requirements, this period may be extended for an additional 45 days if necessary. In the case of delay in providing information, we will notify the personal information subject of the circumstances and the reason for the delay. If the time limit set in this paragraph conflicts with the law of your location, the law of the place where you are located shall prevail. If you disagree with our behaviors in handling your personal information, you may submit a mediation request or other claim to your local data protection regulator.
We reserve the right to change this Privacy Policy in accordance with updates of our APP. Please visit the APP regularly and check our current Privacy Policy.
Thank you for taking the time to read our Privacy Policy!