Privacy Policy
The policy is only applicable to CAMMUS products or services of Shenzhen CAMMUS Electronic Technology Co., Ltd. Last updated: May 24, 2024

The policy will help you understand the following:
1、How Do We Collect and Use Your User Information
2、How Do We Use Cookie and Similar Technologies
3、How Do We Share, Transfer and Publicly Disclose Your User Information
4、How Do We Protect Your User Information
5、Your Rights
6、How Do We Handle Children’s Personal Information
7、How Is Your User Information Stored and Transferred Globally
8、How Is This Policy Updated
9、How to Contact Us

We are well aware of the importance of user information to you and will do our best to protect the security and reliability of your user information.We are committed to maintaining your trust in us and abide by the following principles, protecting your user information: the principle of consistent rights and responsibilities, the principle of clear purpose, the principle of choice and consent, the principle of minimum adequacy, the principle of ensuring security, the principle of subject participation, the principle of openness and transparency, etc. At the same time, we promise that we will take corresponding security measures to protect your user information according to the mature security standards in the industry.
Please read and understand this Privacy Policy carefully before using our products (or services).

1、How Do We Collect and Use Your User Information
(1)The information we collect and use when you use our products or services
We will only collect and use your user information for the business functions described in this policy. The purpose of collecting user information is to provide you with products or services. You have the right to choose whether to provide this information. However, in most cases, if you do not provide it, we may not be able to provide you with corresponding services or respond to your problems:

When you use our services, allow us to collect the information you provide to us or necessary to provide services to you, including mobile phone number information, e-mail information,
The user information we collect will be used to provide you with authentication, customer service, security, device binding, device usage record and other functions.

1.We Collect the Information We Need

1.1When you register for CAMMUS service, in order to provide you with account registration and login functions, we may collect your mobile phone number or e-mail address, password and registered SMS content to register your account and assist you in logging in and using relevant services. If you do not provide the above information, we will not be able to provide you with account registration and login services. After you complete the account registration, you can also choose whether to provide us with user name, head sculpture, gender and other information to further improve your account; For the purpose of research or promotion, we may need to contact you through the above information; Please note that we will give priority to providing local number registration service. If you register with your local number, your device will automatically send us a verification message to verify the authenticity of your number, and the tariff will be charged by the operator.

1.2When you use CAMMUS service, in order to ensure your normal use of our service, maintain the normal operation of our service, improve and optimize our service experience and ensure the security of your account, we will collect and the following information.
Permission classification Permission name Permission description
Camera Take photo android.permission.CAMERA Permission definition:
Allow apps to use cameras

Typical Scenario Examples:
1、Take photo and upload picture
2、Scan QR code and bar code;
store Read the contents of your SD card android.permission.READ_EXTERNAL_STORAGE
android.permission.WRITE_EXTERNAL_STORAGE Permission definition:
Authorize the application to read/modify or delete the contents of the SD card.

Typical Scenario Examples:
1、Download the file scenario, download the updated apk from the server to mobile phone.
2、Photo scene,need to store picture or turn on photo.

Bluetooth Turn on Bluetooth android.permission.BLUETOOTH Permission definition:
Authorize Bluetooth
Typical Scenario Examples:
1、Connect CAMMUS device,turn on CAMMUS device,debugging CAMMUS device
Location Precise(GPS) location android.permission.ACCESS_FINE_LOCATION Permission definition:
1、android.permission.ACCESS_FINE_LOCATION:Get accurate (GPS) location
2、android.permission.ACCESS_COARSE_LOCATION:Get (based on the network) approximate location

Typical Scenario Examples:
1.CAMMUS applications need to connect and communicate with Bluetooth devices. Applications for Android Q or higher must have ACCESS_FINE_LOCATION permission to search for Bluetooth devices. Therefore, CAMMUS applications need your permission to enable location permission to search for CAMMUS Bluetooth devices.

(2)Exceptions With Authorized Consent
Hope you understand that according to laws, regulations and relevant national standards, we do not need your authorization to collect and use your user information under the following circumstances:
1、Directly related to national security and national defense security;
2、Directly related to public safety, public health and major public interests;
3、Directly related to criminal investigation, prosecution, trial and judgment execution;
4、For the purpose of safeguarding your or other personal life, property and other major legitimate rights and interests, but it is difficult to obtain your consent;
5、Your user information collected is disclosed to the public by yourself;
6、Your user information collected from legally publicly disclosed information, such as legal news reports, government information disclosure and other ways;
7、Necessary for signing or performing the contract according to your requirements;
8、Necessary for maintaining the safe and stable operation of software and related services, such as finding and handling faults of software and related services;
9、 The personal information controller is a news unit and is necessary for carrying out legal news reporting;
10、When it is necessary for an academic research institution to carry out statistics or academic research based on the public interest and provide the results of academic research or description to the outside, it de-identifies the personal information contained in the results.
11、Other circumstances stipulated by laws and regulations.

2、How Do We Use Cookie and Similar Technologies
(1)Cookie
To ensure the normal operation of the website, we will store a small data file named Cookie on your computer or mobile device. Cookie usually contains an identifier, a site name, some numbers and characters. With Cookie, website can store your access preference data.
We will not use cookies for any purpose other than those stated in this policy. You can manage or delete cookies according to your preferences. You can clear all cookies saved on your computer. Most web browsers have the function of blocking cookies. However, if you do, you will need to change the user settings each time you visit our website.

(2)Website Beacons and Pixel Tags
In addition to Cookies, we will also use other similar technologies such as website beacons and pixel labels on the website. For example, the email we send you may contain a click URL that links to the content of our website.
If you click this link, we will track this click to help us understand your product or service preferences and improve customer service. Website beacon is usually a transparent image embedded in a website or e-mail. With the help of pixel labels in e-mail, we can know whether the e-mail is opened or not. If you don’t want your activities to be tracked in this way, you can unsubscribe from our mailing list at any time.

(3)Do Not Track
Many web browsers are equipped with Do Not Track function, which can publish Do Not Track requests to websites. At present, the major Internet standards organizations have not established relevant policies to specify how websites should respond to such requests. However, if your browser enables Do Not Track, all our websites will respect your choice.

3、How Do We Share, Transfer and Publicly Disclose Your User Information
(1)Share
3.1.1 Sharing principle
a. Principle of Authorization and Consent: Without your consent, we will not share your personal information unless the shared personal information is deidentified and the third party cannot re identify the natural person subject of such information. If the purpose of third-party use of information exceeds the scope of the original authorization, they need to obtain your consent again.
b. The principle of legality and minimum necessity: The shared data must have a legitimate and legitimate purpose, and the shared data must be limited to the extent necessary to achieve the purpose.
c. The principle of safety and prudence: We will carefully evaluate the purpose of third-party use of shared information, comprehensively evaluate the security capabilities of these partners, and require them to comply with cooperation legal agreements. We will strictly monitor the security of the software tool development kits (SDKs) and application program interfaces (APIs) used by our partners to obtain information, in order to protect data security, and specify them in detail in the agreement.
3.1.2 Implementation of shared information for functions or services
a. When you choose to publish information that can be synchronized to products or services on other third-party platforms (such as Moments), CAMMUS may use SDKs or related technologies to share the published content, comments, and likes with the providers of these products or services.
b. Geographic Location Services: When you use location-related services, we will share GPS information with location service providers through SDK or related technologies so that we can return location results to you. GPS information is personal sensitive information. Refusal to provide it will only affect the geographic location service function, but will not affect the normal use of other functions.
c. To adapt the message push function to the terminal model you are using, we may share phone models, versions, and related device information with terminal device manufacturers (Huawei, Xiaomi, OPPO, VIVO, Honor, etc.) through SDK and other technologies.

d.Usage of third-party SDKs
SDK
Collect data
Application scenarios
Official Connection

Gaode Open Platform Positioning SDK

Third party name: Gaode Software Co., Ltd

Purpose of use: To accurately locate user locations and provide services based on geographic location information:

Collect personal information such as longitude and latitude, device information, etc

Permission usage: Android: location, always allow access to location, network access

Information collection method: SDK native collection

Third party privacy policy: https://lbs.amap.com/pages/privacy/

Aurora Push
Application installation address

MAC address
ANDROID ID, network connection information

Push messages to users
https://www.jiguang.cn/license/privacy

Tencent Cloud instant messaging
Device information, network information
Instant messaging
https://web.sdk.qcloud.com/document/Tencent-IM-Privacy-Protection-Guidelines.html

OPPO Push Privacy Policy
https://open.oppomobile.com/new/developmentDoc/info?id=10288

Xiaomi pushes privacy policy
https://dev.mi.com/distribute/doc/details?pId=1819

vivo pushes privacy policy
https://dev.vivo.com.cn/documentCenter/doc/652

Huawei pushes SDK privacy statement
https://developer.huawei.com/consumer/cn/doc/HMSCore-Guides/sdk-data-security-0000001050042177

Honor push SDK Privacy statement
https://developer.honor.com/cn/docs/11002/guides/sdk-data-security

(2)Transfer
We will not transfer your user information to any company, organization or individual, except for the following circumstances:
1、Transfer with explicit consent: after obtaining your explicit consent, we will transfer your user information to other parties;
2、In case of merger, acquisition or bankruptcy liquidation, if the transfer of user information is involved, we will require the new company and organization holding your user information to continue to be bound by this privacy policy, otherwise we will require the company and organization to ask you for authorization and consent again.

(3)Publicly Disclose
We will only publicly disclose your user information under the following circumstances:
1、With your express consent;
2、Law based disclosure: we may publicly disclose your user information under the mandatory requirements of laws, legal procedures, litigation or government authorities.

(4)Exceptions to Prior Authorization and Consent for Information Sharing, Transfer and Public Disclosure
Hope you understand that according to laws, regulations and relevant national standards, we do not need your authorization to share, transfer and publicly disclose your user information under the following circumstances:
1、Directly related to national security and national defense security;
2、Directly related to public safety, public health and major public interests;
3、Directly related to criminal investigation, prosecution, trial and judgment execution;
4、For the purpose of safeguarding your or other personal life, property and other major legitimate rights and interests, but it is difficult to obtain your consent;
5、Information you disclose to the public;
6、Collected from legally publicly disclosed information, such as legal news reports, government information disclosure and other ways.

4、How Do We Protect Your User Information
(1)We have used industry standard security measures to protect the user information provided by you from unauthorized access, public disclosure, use, modification, damage or loss. We will take all reasonable and feasible measures to protect your user information. For example, it is protected by SSL encryption when exchanging data between your browser and the service; We also provide https safe browsing for the website; We will use encryption technology to ensure the confidentiality of data; We will use trusted protection mechanisms to prevent malicious attacks on data; We will deploy an access control mechanism to ensure that only authorized personnel can access user information; And we will hold security and privacy protection training courses to enhance employees’ awareness of the importance of protecting users’ information.
(2)We will take all reasonable and feasible measures to ensure that irrelevant user information is not collected. We will only retain your user information for the period required to achieve the purpose stated in the cost policy, unless the retention period needs to be extended or permitted by law.
(3)Internet is not an absolutely secure environment, and e-mail, instant messaging and communication with other users are not encrypted. We strongly recommend that you do not send user information through such methods.
(4)We will regularly update and disclose the relevant contents of security risk, user information security impact assessment and other reports.
(5)Internet environment is not a hundred percent secure. We will try our best to ensure the security of any information you send us. Even if we have made great efforts and taken all reasonable and necessary measures, it may still be impossible to prevent your user information from being illegally accessed, illegally stolen, illegally tampered with or destroyed, resulting in damage to your legitimate rights and interests. Hope you understand the above risks of the information network and voluntarily bear them.
(6)After the unfortunate user information security incident, we will timely inform you of the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, the suggestions you can independently prevent and reduce the risk, and the remedial measures for you in accordance with the requirements of laws and regulations. We will timely inform you of the relevant information of the event by e-mail, letter, telephone, push notification, etc. when it is difficult to inform the user information subject one by one, we will take a reasonable and effective way to publish the announcement. At the same time, we will also actively report the disposal of user information security events in accordance with the requirements of regulatory authorities.

5、Your Rights
In accordance with the relevant laws, regulations and standards of China and the common practices of other countries and regions, we guarantee that you perform the following rights to your user information:
(1)Access, Supplement and Correct Your Personal Information
After you complete the registration, login and necessary authentication of CAMMUS account, you have the right to access, supplement and correct your personal information by yourself in the following ways:
Click your head sculpture in the client application, and then click “personal information” on the page to view your name, user ID, gender, birthday, constellation, location, personal introduction and other account information at any time; Under the same path, you can add and correct your name at any time (for security reasons, it can only be set once), gender, birthday, location, personal introduction and other account information;
If you need to correct the mobile phone number provided during registration, you can click your mobile phone number in ‘my’ ‘personal center’ ‘modify mobile phone number’ in the client application, and replace it according to the system prompt.
(2)Delete Your User Information
You can request us to delete user information in the following cases:
1、If our handling of user information violates laws and regulations;
2、If we collect and use your user information without your consent;
3、If our handling of user information violates the agreement with you;
4、If you no longer use our products or services, or you cancel your account;
5、If we no longer provide you with products or services.
Information you can directly clear or delete on our product or service page, including account information such as birthday, location and personal introduction. Click your head sculpture in the client application and then click “personal information” on the page to delete the account information such as birthday, location and personal introduction at any time,
We will evaluate your deletion request. If the corresponding provisions are met, we will take corresponding steps to deal with it. When you make a deletion request to us, we may require you to authenticate to ensure the security of your account. After you delete information from our service, due to applicable laws and security technologies, we may not immediately delete the corresponding information from the backup system. We will safely store your information until the backup can be cleared or anonymous.

(3)Change the Scope of Your Authorization and Consent
Each business function requires some basic user information to be completed (see ‘part I’ of this policy).For the collection and use of user information, you can give or withdraw your authorization and consent at any time. When you withdraw your consent, we will no longer process the corresponding user information. At the same time, please note that your revocation of your authorization consent may lead to some consequences. For example, we may not be able to continue to provide you with corresponding services or specific functions, but your decision to withdraw your consent will not affect the user information processing previously carried out based on your authorization.

(4)User Information Subject Cancels Account
You can contact us directly through the way disclosed in this personal information protection policy and apply for cancellation of your account.We will record your account cancellation application and manually review your application to confirm that you meet the account cancellation conditions. We will assist you in completing the account cancellation within 15 working days after you submit your application.
You can cancel the previously registered account at any time. After canceling the account, we will stop providing you with products or services and delete or anonymize your information according to your requirements, unless otherwise stipulated by laws and regulations. This may also cause you to lose access to the data in your account. Please be careful when you do that.

(5)User Information Subject Obtains Duplicate
You have the right to obtain your user information duplicate. On the premise of technical feasibility, such as data interface matching, we can also directly transmit your user information duplicate to the third party you specify according to your requirements.

(6)Automatic Decision Making of Constraint Information System
In certain business functions, we may only make decisions based on non-manual automatic decision-making mechanisms such as information systems and algorithms. If these decisions significantly affect your legitimate rights and interests, you have the right to ask us for explanation, and we will also provide appropriate remedies.

(7)In Response To Your Above Request
For security, you may need to provide a written request or otherwise prove your identity. We may ask you to verify your identity before processing your request.
We will reply within 30 days. In principle, we will not charge for your reasonable request, but we will charge a certain cost for repeated requests that exceed the reasonable limit according to the situation.For those unprovoked repetitions、too many technical means are needed (for example,need to develop new systems or fundamentally change existing practices), pose risks to the legitimate rights and interests of others or are very impractical, we may refuse. hope you understand that we may not be able to respond to some of your requests due to security considerations, requirements of relevant laws and regulations or technical restrictions, such as the following situations:
1、Related to the user information controller’s performance of obligations stipulated by laws and regulations;
2、Directly related to national security and national defense security;
3、Directly related to public safety, public health and major public interests;
4、Directly related to criminal investigation, prosecution, trial and execution of judgment;
5、The user information controller has sufficient evidence to show that the user information subject has subjective malice or abuse of rights;
6、For the purpose of safeguarding the life, property and other major legitimate rights and interests of the user information subject or other individuals, but it is difficult to obtain your consent;
7、Responding to the request of the user information subject will cause serious damage to the legitimate rights and interests of the user information subject or other individuals and organizations;
8、Involving trade secrets.

6、How Do We Handle Children’s Personal Information
We attach great importance to the protection of children’s personal information. Our products, websites and services are mainly for adults. Children should not create their own user accounts without the consent of their parents or guardians.Although local laws and customs define children’s age differently, we regard anyone under the age of 14 as a child.
For the collection of child user information with the consent of parents or guardians, we will only store, use or publicly disclose this information when permitted by law, explicitly agreed by parents or guardians or necessary to protect children, otherwise we will try to delete relevant data as soon as possible.
In view of the limitations of the existing technology and business model, it is difficult for us to actively identify the children’s personal information. If you find that we have collected the children’s personal information without our knowledge or without the prior consent of a verifiable guardian, you can contact us in time, and we will try to delete it in time after discovery. If we find the above situation ourselves, We will also delete it in time, except for what the law requires us to keep.

7、How Is Your User Information Stored and Transferred Globally
User information collected and generated in the People’s Republic of China will be stored in domestic. We will only retain your user information within the period required for the purpose and purpose described in this policy and the shortest period specified by laws and regulations. After exceeding the above retention period, we will delete your user information or anonymize it according to the requirements of applicable laws and regulations. Other provisions of laws and regulations, or for the purpose of public interest, scientific and historical research, or otherwise authorized and agreed by you, we may need to retain relevant data for quite a while.
As a result of we provide products or services through global resources and servers, it means that after obtaining your authorization and consent, your user information may be transferred to or accessed from overseas jurisdictions in the countries / regions where you use the products or services.
Such jurisdictions may have different data protection laws or even no relevant laws. In such cases, we will ensure that your user information is adequately and equally protected in the People’s Republic of China. For example, we will request your consent to the cross-border transfer of user information, or implement security measures such as data De identification before cross-border data transfer.

8、How Is This Policy Updated
Our Privacy Policy may change. Without your express consent, we will not reduce your rights under this privacy policy. We will post any changes to this policy on this page.
For major changes, we will also provide more significant notice. Major changes referred to in this policy include but are not limited to:
1、Significant changes have taken place in our service model, such as the purpose of processing user information, the type of user information processed, the use mode of user information, etc;
2、We have undergone significant changes in ownership structure, organizational structure, etc. Such as owner change caused by business adjustment, bankruptcy, M & A, etc;
3、The main objects of user information sharing, transfer or public disclosure have changed;
4、Significant changes have taken place in your right to participate in user information processing and how you perform it;
5、We are responsible for handling changes in the responsible department, contact information and complaint channels of user information security;
6、When the user information security impact assessment report indicates that there is a high risk.
We will also archive older versions of this policy for your reference.

9、How to Contact Us
If you have any question, comment or suggestion about this Privacy Policy, please contact us:
E-mail:contact@cammus.com
Tel:0755-86259940
Fax:0755-86259940
Normally, we will reply within 15 days.
If you are not satisfied with our reply, especially our user information processing behavior has damaged your legitimate rights and interests, you can also seek solutions through other external channels.