KALOS Privacy
Policy
• Updated Date: February 1, 2024
• Effective Date: March 18, 2024
Thank you for choosing products or services provided by Beijing ZhiJian Software Co., Ltd. (hereinafter referred to as "we" or "ZhiJian"). This policy explains the collection, use, storage, and sharing of your personal information when using our products or services, as well as the related rights you have.
If you have any questions, opinions, or suggestions, please contact us via email: product@zjinnova.com
This policy will help you understand the following:
1. How we collect and use your personal information
2. How we use Cookies and similar technologies
3. How we share, transfer, and disclose your personal information
4. How we protect your personal information
5. Your rights
6. How we handle personal information of minors
7. Global transfer of your personal information
8. Updates to this privacy policy
9. How to contact us
At ZhiJian, we recognize the importance of personal information to you and will do our utmost to ensure the security and reliability of your personal information. We are committed to maintaining your trust in us and adhere to principles such as consistency of rights and responsibilities, clear purpose, choice and consent, minimum necessity, security assurance, user participation, and transparency. Additionally, we promise to adopt appropriate security measures to protect your personal information according to mature industry standards. Please carefully read and understand this Privacy Policy before using our products or services.
I. How We Collect and Use Your Personal Information
(A) How We Collect Your Information
We collect and use your personal information for the following purposes outlined in this policy:
1. Providing Products or Services to You
◦ Information provided by you
▪ When using the "Connect" feature, you need to authorize "location" permissions. Upon your authorization, we will access your precise location and coordinates to provide navigation services based on your needs.
◦ Information collected during your service usage
▪ We collect information about your use of products, services, and usage patterns to enhance our services. This includes:
2. Providing Security Protection for You
◦ To prevent, detect, and investigate fraud, infringement, and activities that may harm security or violate our agreements, policies, or rules, we may collect or integrate your user information, service usage information, device information, log information, and information obtained with your authorization or as per legal requirements.
3. Other Purposes
◦ When collecting your information for specific purposes not mentioned in this policy, we will seek your consent in advance.
(B) How We Use Your Information
We collect your information to provide services to you and improve service quality. For this purpose, we use your information for the following:
1. Providing the products or services you use and maintaining, improving, and optimizing these services and service experiences.
2. Preventing, detecting, and investigating fraud, infringement, and activities that may harm security, protecting your, other users', or public interests and our legitimate rights. We may use or integrate your user information, service usage information, device information, log information, and information obtained with your authorization or as per legal requirements to comprehensively detect and prevent security incidents and take necessary record-keeping, auditing, analysis, and disposal measures according to law.
3. Other purposes permitted by you.
II. How We Use Cookies and Similar Technologies
We do not use cookies or similar technologies in the products or services we provide.
III. How We Share, Transfer, and Disclose Your Information
(A) Sharing
We will not share your personal information with companies, organizations, or individuals outside of our service providers, except in the following cases:
1. Sharing with explicit consent: After obtaining your explicit consent, we will share your personal information with others.
2. Legal requirements for sharing: We may share your personal information externally based on legal and regulatory requirements, litigation dispute resolution needs, or requests from administrative or judicial authorities according to law.
3. Disclosure to complainants in case of intellectual property infringement: When you are complained about by others for infringing on intellectual property or other legitimate rights, we need to disclose your necessary information to the complainant for complaint handling.
4. Sharing with authorized partners: For the purposes stated in this privacy policy, some of our services will be jointly provided by us and authorized partners. We may share some of your personal information with partners to provide better customer service and user experience. For statistical analysis and other purposes, our products may integrate third-party SDKs or similar applications. To ensure the security of your information, we have signed strict data security confidentiality agreements with third-party SDK service providers, who will strictly comply with our data privacy and security requirements. We will not share your personal identity information with them unless we obtain your consent.
(B) Transfer
We will not transfer your personal information to any company, organization, or individual, except in the following cases:
1. Transfer with explicit consent: After obtaining your explicit consent, we will transfer your personal information to others.
2. In cases of merger, acquisition, or bankruptcy liquidation, or other situations involving merger, acquisition, or bankruptcy liquidation, if it involves the transfer of personal information, we will require the new holder of your personal information to continue to be bound by this policy. Otherwise, we will require the company, organization, or individual to re-obtain your authorization and consent.
(C) Public Disclosure
We will only publicly disclose your personal information in the following cases:
1. After obtaining your explicit consent.
2. If we determine that you have violated laws, regulations, or seriously violated relevant agreements or rules of our services or products, or to protect ZhiJian or public safety and prevent harm to personal and property, we may disclose your personal information based on laws, regulations, or relevant agreements or rules after obtaining your consent, including relevant violations and measures taken by ZhiJian against you.
(The translation continues in the next message due to length constraints.)
(III) Deleting Your Personal Information
In the following situations, you can request us to delete your personal information:
1. If our processing of personal information violates laws and regulations.
2. If we collect or use your personal information without obtaining your consent.
3. If our processing of personal information violates the agreement with you.
4. If you no longer use our products or services, or if you cancel your account.
5. If we no longer provide products or services to you.
If we decide to respond to your deletion request, we will also notify the
entities from which we obtained your personal information to promptly delete
it, unless otherwise provided by laws and regulations, or these entities have
obtained your independent authorization.
After you delete information from our service, we may not immediately delete
the corresponding information in the backup system or anonymize this
information.
(IV) Changing the Scope of Your Authorized Consent
Each business function requires some basic
personal information to be completed. For additional collection and use of
personal information, you can give or withdraw your authorized consent at any
time.
After you withdraw your consent, we will no longer process the corresponding
personal information. However, your decision to withdraw consent will not
affect the processing of personal information based on your previous
authorization.
(V) Constraints on Information System Automated Decision-making
In certain business functions, we may make decisions solely based on non-human automatic decision-making mechanisms such as information systems and algorithms. If these decisions significantly affect your legitimate rights and interests, you have the right to request an explanation from us, and we will also provide appropriate remedies.
(VI) Responding to Your Requests
To ensure security, you may need to provide
a written request or other means to prove your identity. We may first ask you
to verify your identity before processing your request. We will respond within
thirty days.
For your reasonable requests, we generally do not charge a fee, but for
multiple repeated requests exceeding reasonable limits, we will consider
charging a certain cost. For those requests that are unreasonably repetitive,
require excessive technical means (such as the need to develop new systems or
fundamentally change current practices), pose risks to the legitimate rights
and interests of others, or are highly impractical (such as involving
information stored on backup tapes), we may refuse them.
In the following circumstances, as required by laws and regulations, we will be unable to respond to your request:
1. Matters directly related to national security and national defense security;
2. Matters directly related to public safety, public health, and significant public interests;
3. Matters directly related to criminal investigation, prosecution, trial, and execution of judgments;
4. Substantial evidence demonstrating malicious subjective intentions or abuse of rights on your part;
5. Responding to your request would result in severe damage to your or other individuals' or organizations' legitimate rights and interests;
6. Matters involving trade secrets.
Protection of Minors
Our products, websites, and services are primarily directed towards adults. Without the consent of parents or guardians, minors may not create their own user accounts. Although definitions of minors may vary according to local laws and customs, we consider anyone under 18 years of age as a minor. If we discover that we have collected personal information of a minor without verifiable parental consent, we will make efforts to promptly delete the relevant data.
Transfer of Your Personal Information Globally
Principally, personal information collected and generated within the People's Republic of China will be stored within its borders. Due to our provision of products or services through globally distributed resources and servers, with your authorized consent, your personal information may be transferred to overseas jurisdictions where you use the product or service, or accessed from these jurisdictions. Such jurisdictions may have different data protection laws, and in some cases, may lack relevant laws. In such instances, we will ensure that your personal information receives protection equivalent to that within the People's Republic of China. For example, we may request your consent for the cross-border transfer of personal information, or implement secure measures such as de-identification of data before transferring it across borders.
How This Policy Is Updated
Our privacy policy may change. Without your explicit consent, we will not reduce the rights you are entitled to under this privacy policy. We will publish any changes made to this policy on this page. For significant changes, we will also provide more prominent notifications (including, for certain services, sending notifications via email explaining the specific changes to the privacy policy). Significant changes referred to in this policy include but are not limited to:
1. Major changes in our service mode, such as the purpose of processing personal information, types of processed personal information, and ways of using personal information.
2. Major changes in ownership structure, organizational structure, etc., such as owner changes caused by business adjustments, bankruptcy, or mergers and acquisitions.
3. Major changes in the main objects of personal information sharing, transfer, or public disclosure.
4. Significant changes in your rights to participate in the processing of personal information and how they are exercised.
5. Changes in the department responsible for the security of personal information, contact methods, and complaint channels.
6. When the personal information security impact assessment report indicates a high risk.
How to Contact Us
If you have any questions, comments, or suggestions regarding this privacy policy, please contact us via the following means:
Email: product@zjinnova.com
In general, we will respond within thirty days.