UTOUR GO User Privacy Policy

Preface

"UTOUR GO" software (hereinafter referred to as "the software") and related services (hereinafter referred to as "the service") refer to the software provided by UTOUR and its related parties (hereinafter referred to as "UTOUR "or" We ") owns and operates under the name" UTOUR "client applications and related websites provide you with products and services. Thank you very much for your trust in us. While providing users with privacy protection, we have put forward higher standards for ourselves to ensure that products (or services) use your personal information in accordance with the seven "four no three musts", namely:

Ⅰ、 Don't look what you shouldn't.

Ⅱ、 What should not be passed on should not be passed on.

Ⅲ、 What should not be saved is not saved.

Ⅳ、 Don't use what you shouldn't.

Ⅴ、 All actions must be made explicit, and users' right to know and choice must be respected.

Ⅵ、 It must be approved by the user.

Ⅶ、 Be responsible for the collected user privacy information.


This privacy policy will help you understand the following:

Ⅰ、 How we collect and use your personal information

Ⅱ、 How we store your personal information

Ⅲ、 How do we share, transfer and publicly disclose your personal information

Ⅳ、 How we protect your personal information

Ⅴ、 Your right to manage personal information

Ⅵ、 Protection of minors' personal information

Ⅶ、 Scope of application of privacy policy

Ⅷ、 Changes and amendments to the privacy policy

Ⅸ、 Related third-party SDK and its use purpose

Ⅹ、 How to contact us

Ⅺ、 Effectiveness of privacy policy

We hope to explain to you through this privacy policy how we collect, use, store, share and transfer your personal information when using this software, as well as the ways we provide you with to delete and protect these information.Please carefully read and understand this privacy policy before using this software, and use our products or services after confirming that you fully understand and agree. Once you begin to use the software, it means that you have fully understood and agreed to this policy, and agreed that we should collect, use, store and share your relevant information in accordance with this privacy policy.If you have any questions, comments or suggestions about the content of this policy, you can contact us through the various contact methods provided in this privacy policy.


Ⅰ、 How we collect and use your personal information

This software is mainly used to manage UTOUR hardware equipment. During the use of this software, we will collect and use your personal information for the following purposes described in this privacy policy:

(1) Wireless LAN based functions

After you install the software, you can select whether to allow the software to connect to the Internet through the wireless LAN through the pop-up window. As UTOUR products need to be connected through wireless LAN, refusing to connect through wireless LAN will make you unable to access the device through this software. We will not use the above permissions for other purposes than realizing the above functions.

(2) Media file transfer

This software includes the function of transferring images and video files from the UTOUR device to the connected mobile device. Depending on the operating system of the mobile device installed with this software, this software needs to access external storage or system photo album in this function. Denying access to external storage or system album will prevent you from transferring media files from UTOUR device to mobile device without affecting other functions of this product. We will not use the above permissions for other purposes than realizing the above functions.

(3) How we use cookies and similar technologies

We or our third-party partners may collect your information, including your device information, browsing information, and click information, through cookies or similar technologies, and store such information as log information to ensure service security. We will not use cookies for any purpose other than those stated in this privacy policy. You can manage or clear all cookies saved in this website according to your own preferences.

In addition to cookies, we may also use Beacon and other similar technologies in our website to calculate user traffic and other behaviors of using our services. Beacon technology refers to the inclusion of a 1 pixel * 1 pixel transparent image in the web page design. The user's access to the current page is counted through the parameters carried when requesting this image, so that website developers can understand the use of their own websites. Beacon technology is only used to simplify the tedious process of website developers using server logs for analysis, and cannot obtain other information about you except for this website.

(4) Improve our products and services

Improved user experience. When you link to UTOUR hardware devices through this software, we may collect the international mobile device identification code (IMEI) and network device address (MAC) desensitized by MD5 algorithm, device model, system version number, operating system version number, system number, system ID number, screen resolution, Internet access type, version number of this product, click time and frequency of a button, option values of some key configurations Software crash logs are used to count the number of users of our products, analyze the use of our products, investigate the causes of crashes, reduce crashes, and constantly improve our products. This information does not involve your personal identity and other private information.

(5) Security

In order to improve the security of your use of services provided by us, our affiliated companies and partners, protect your or other users' or the public's personal and property security from infringement, better prevent security risks such as phishing websites, fraud, network vulnerabilities, computer viruses, network attacks, network intrusion, and more accurately identify violations of laws and regulations or our relevant agreements and rules. We may use or integrate your equipment information, software use information and the information that our affiliated companies and partners have obtained your authorization or shared according to law for identity verification, detection and prevention of security incidents, and take necessary record, audit, analysis and disposal measures according to law.

(6) Exceptions to obtaining authorization

According to relevant laws and regulations, it is not necessary to obtain your authorization to collect your personal information under the following circumstances:

1. Related to national security and national defense security;

2. Related to public safety, public health and major public interests;

3. Those related to criminal investigation, prosecution, trial and execution of judgments;

4. It is difficult to obtain your own consent in order to protect the life, property and other major legitimate rights and interests of the personal information subject or other individuals;

5. The personal information collected is disclosed to the public by yourself;

6. Collect personal information from legally disclosed information, such as legal news reports, government information disclosure and other channels;

7. Necessary for signing the contract according to your requirements;

8. It is necessary to maintain the safe and stable operation of the products or services provided, such as finding and handling the failures of products or services;

9. Necessary for legal news reporting;

10. Academic research institutions are necessary to carry out statistics or academic research based on the public interest, and conduct de identification of the personal information contained in the results when providing academic research or described results;

11. Other circumstances stipulated by laws and regulations.


Ⅱ、 How we store your personal information

The personal information we collect and generate in the People's Republic of China will be stored in the People's Republic of China.

If it is really necessary to transmit relevant personal information collected in China to overseas institutions in order to handle cross-border business, we will follow the laws, administrative regulations and relevant regulatory authorities. We will ensure that your personal information is adequately protected, such as anonymization and encrypted storage.

We only store your personal information within the necessary period for the purpose of this policy and the time limit required by laws and regulations.

If we stop operating this product or this service, we will stop collecting your personal information in a timely manner, notify you of the notice of stopping operation in the form of delivery or announcement one by one, and delete or anonymize the personal information stored by us.


Ⅲ、 How do we share, transfer and publicly disclose your personal information

(1)Share

We will not share your personal information with any company, organization or individual, except for the following circumstances:

1. With your explicit consent, we will share your personal information with other parties.

2. We may share your personal information according to laws and regulations, litigation dispute resolution needs, or requirements of administrative and judicial authorities.

3. To the extent permitted by laws and regulations, it is necessary to share your personal information in order to protect the interests, property or security of related parties or partners, you or other BRZH users or the public from damage.

4. When our affiliates provide services to you or us, we may share your personal information with our affiliates. However, we only share necessary personal information, and the processing of your information by related parties is subject to this privacy policy. If the affiliated company wants to change the purpose of processing your personal information, it will ask for your authorization and consent again.

5. For the purposes stated in this privacy policy only, we may share your personal information with our suppliers, service providers, consultants or agents to provide better customer service and user experience. These suppliers, service providers, consultants and agents may provide us with technical infrastructure services, analyze the use of our services, measure the effectiveness of our services, provide customer services and payment services, conduct academic research and investigation, or provide legal, financial and technical advisory services. For example, we may occasionally invite registered users to participate in a lottery. If you are lucky enough to win the prize, we need to provide your personal information to the logistics service provider in order to send you our prize.

For companies, organizations and individuals with whom we share personal information, we will sign strict data protection agreements with them, requiring them to handle personal information in accordance with our instructions, this privacy policy and any other relevant confidentiality and security measures.

(2)Transfer

We will not transfer your personal information to any other company, organization or individual, except for the following circumstances:

1. With the development of our business, we and our affiliated companies may conduct merger, acquisition, asset transfer or other similar transactions. If the relevant transaction involves the transfer of your personal information, we will require the company, organization and individual who holds your personal information to continue to be bound by this policy, otherwise we will require the company, organization and individual to obtain your authorization and consent again.

2. Transfer with your explicit consent, that is, we will transfer your personal information we have obtained to other parties after obtaining your explicit consent.

(3)Disclosure

We will only publicly disclose your personal information under the following circumstances:

1. Your explicit consent has been obtained.

2. We may publicly disclose your personal information under the mandatory requirements of laws, legal procedures, lawsuits or government authorities.

3. Other circumstances stipulated by laws and regulations.


Ⅳ、 How we protect your personal information

We have taken security measures that comply with industry standards to protect the personal information you provide from unauthorized access, public disclosure, use, modification, damage or loss. We will take all reasonable and feasible measures to protect your personal information.

1. For the data exchange between your mobile phone and our client, we have adopted our customized encryption scheme and https double encryption to ensure the security of data transmission.

2. We deploy an access control mechanism on the server side, adopt the principle of least sufficient authorization for staff who may have access to your personal information, and regularly check the list of visitors and access records.

3. Our server systems for storing users' personal information are all security hardened operating systems. We will audit and monitor the server operation. If we find the server operating system with security problems announced externally, we will immediately upgrade the server security to ensure the security of all our server systems and applications.

4. We regularly hold training on laws and regulations related to personal information protection for staff to enhance their awareness of personal privacy protection.


Ⅴ、 Your right to manage personal information

During your use of the software, you can manage your personal information in the following ways:

(1)Delete your personal information

You have the right to ask us to delete your personal information when:

1. We collected your personal information without your explicit consent

2. Our processing of your personal information violates the requirements of laws and regulations

3. We violated the agreement with you to use and process your personal information

4. You uninstall the software or no longer use our products (or services)

5. We stop providing services to you

You can contact us to delete your personal information in the way provided in Section 9 of this privacy policy, and we will reply within 15 working days. When we delete your personal information from the server, we may not delete the corresponding data from the backup system immediately, but we will delete the information when the backup is updated.

(2)Withdraw your consent or authorization

You can withdraw your consent to the collection and use of your personal information by turning off the device function.

Please understand that each business function requires some basic personal information to complete (see Section 1 of this Privacy Policy). When you withdraw your consent or authorization, we cannot continue to provide you with the services corresponding to the withdrawal of your consent or authorization, and will not process the corresponding personal information. However, your decision to withdraw your consent will not affect the previous personal information processing based on your authorization.


Ⅵ、 Protection of minors' personal information

When minors use this product (or service), they need the consent and authorization of the guardian. We suggest that minor parents or guardians read this privacy policy for them, and suggest that minors seek the consent and guidance of parents or guardians before submitting personal information. If you are the guardian of a minor, when you have questions about the personal information of the minor under your guardianship, you can contact us through the contact information in Section 9 of this privacy policy.


Ⅶ、 Scope of application of privacy policy

This privacy policy only applies to the software. Other products and services of BRZH will use the privacy policy of relevant products or services. In particular, this privacy policy does not apply to the following situations:

1. Embed BRZH products (or services) into third-party products (or services), and the information collected by third-party products (or services).

2. Information collected by other companies, organizations or individuals who access the third party services in BRZH products (or services).


Ⅷ、 Changes and amendments to the privacy policy

Our privacy policy may change. Without your explicit consent, we will not limit your rights under this privacy policy.

For major changes to this privacy policy, we will also provide significant notifications (for example, when the software is revised or upgraded, or you log in again, we will promptly notify you in the form of pop-up windows).

Major changes referred to in this policy include but are not limited to:

1. Our service model has undergone significant changes. For example, the purpose of processing personal information, the type of personal information processed, and the use mode of personal information;

2. The main objects of personal information sharing, transfer or public disclosure have changed;

3. Your right to participate in personal information processing and the way you exercise it have changed significantly;

4. When the responsible department, contact information and complaint channel for handling personal information security change;

5. When the personal information security impact assessment report indicates that there is a high risk.


Ⅸ、 Related third-party SDK and its use purpose

(1) Statistics of Tencent Bugly

Type of personal information collected: log information (including third-party developers' customized logs, Logcat logs, and APP crash stack information), device information (including mobile phone model, mobile phone brand, Android system version, Android system API level, manufacturer's system version, CPU architecture type, whether the device is root, disk space information, memory space information), network information, etc.

Purpose: Analyze the cause of APP crash from the collected information.

Official website link:https://static.bugly.qq.com/bugly-sdk-privacy-statement.pdf


Ⅹ、 How to contact us

If you have any questions, comments, suggestions or complaints about our privacy policy and the handling of your personal information, please contact us

In general, we will reply to your request within 15 working days


Ⅺ、 Effectiveness of privacy policy

This privacy policy version is updated in May 2023 and will take effect in May 2023.