Privacy policy

Privacy policy

1、 How to collect and use information

In the process of using BTC Rich Miner products and services, we need / may need to collect and use your personal information, including:

1. Account registration information: for services that can only be used through BTC Rich Miner platform account, you need to provide name, email address, telephone number, verification code, account number and password to create BTC Rich Miner platform account.

Fill in the above information required during the use of the client application, and we will verify your identity according to the information you provide to ensure that we are providing services for you.

2. Non account registration information: if you choose to provide the necessary personal data for non registered accounts such as nicknames and avatars, we will provide you with more humanized services. Your nickname and avatar are only used as supplementary information to your personal data and will not be displayed publicly.

3. User feedback information: when you use the feedback and suggestion function in our products, we will collect your email address, mobile phone number and feedback content, so as to deal with your problems and equipment failures in time.

4. Mobile device information: in the process of using our services, we may automatically collect your personal information, including:

1) Basic information: we will receive and record the device related information (including device model, operating system version, device settings, unique device identifier, device environment and other software and hardware feature information) and the device location related information (including your authorized GPS location and sensor information such as WLAN access point, Bluetooth and base station) according to your specific operations in software installation and / or use.

2) Service log information: when you use the products or services provided by our website or client, we will automatically collect your business data on our services and save it as a service log, including browsing, click view, search query, transaction, sharing information, as well as IP address, browser type, telecom operator, language, access date and time.

3) Authorization information: in order to provide more user-friendly services, we may need to collect and use your personal information by using the following functions when you enable the client application. If you do not provide this information, you will not be able to enable relevant functions, but it will not affect the normal use of the account.

Camera / camera based permission: when enabling the client application to remotely control the smart device function, we need to obtain the permission of your camera / camera on the mobile device, so as to provide the function of scanning QR code to add smart device.

Access rights based on photo album (picture library / Video Library): you can open the access rights of photo album to realize the functions of capturing videos and pictures of intelligent devices in real time. We will store the captured video files and pictures on the mobile device for you to view and use later.

. microphone based permission: you can turn on the microphone permission to realize the voice function, that is, make one-way voice or two-way voice calls with the intelligent device.

. speaker based permission: you can turn on the speaker permission to realize the voice playback function, so as to monitor the sound of the intelligent device.

Permission based on System Storage: we will obtain the system storage space and permission information of your mobile device when you install and enable the client application, so as to ensure the normal operation of the application and meet the space required for the storage of picture / video materials.

. location based permission: we will obtain the location permission of your mobile device when you install and enable the client application, so as to provide security related services for your geographical location.

. based on the permission to obtain the notification: you can turn on the permission to obtain the notification to ensure that you receive the alarm notification message sent by the intelligent device.

5. Intelligent device information: in order to realize remote control of intelligent devices through client applications, we will collect basic information of intelligent devices, including device name, device ID, device password, online status, network access information, firmware version and upgrade information, so as to provide you with connection services.

You understand and agree that the above functions may require you to turn on your location information (geographical location), camera (camera), photo album (Picture Library), microphone (voice), speaker and system storage space information access rights in your mobile device to realize the collection and use of the information involved in these rights. You can check the status of the above permissions one by one in the system settings of your mobile device, and you can decide whether these permissions can be turned on or off at any time.

Please note that when you open any permission, you authorize us to collect and use relevant personal information to provide you with corresponding services. Once you close any permission, you cancel the authorization. We will no longer continue to collect and use relevant personal information based on the corresponding permission, nor can we provide you with the services corresponding to the permission. However, your decision to close the permission will not affect the previous information collection and use based on your authorization.

2、 How to use cookies and similar technologies

1、Cookie

In order to make your access experience easier, we will store cookies, flash cookies on your computer or mobile device, or other local storage provided by the browser (or associated application) that usually contains identifiers, site names, and some numbers and characters (collectively referred to as "cookies"). With the help of cookies, the website can store your login information and other data.

If your browser or browser add-on service allows, you can modify the acceptance of cookies or reject our cookies. However, if you do so, it may affect your safe access to our website in some cases, and you may need to change user settings every time you visit our website.

2. Cookie Technology

In addition to cookies, we will also use website beacons, pixel tags, Etag and other similar technologies on the website.

For example, the email we send you may contain an address link linked to the content of our website. If you click the link, we will track this click to help us understand your product or service preferences, so that we can actively improve the customer service experience.

A website beacon is usually a transparent image embedded in a website or email. With the help of pixel labels in e-mail, we can know whether the e-mail is opened or not. If you don't want your activities to be tracked in this way, you can unsubscribe from our mailing list at any time.

Etag (entity tag) is the HTTP protocol header transmitted behind the Internet browser and Internet server, which can replace cookies. Etag can help us avoid unnecessary server load, improve service efficiency and save resources and energy. At the same time, we may record your identity through Etag so that we can have a deeper understanding and improve our products or services. Most browsers provide users with the function of clearing browser cache data. You can clear the corresponding data in the browser setting function. However, please note that if Etag is disabled, you may not enjoy a relatively better product or service experience.

3、 How to share, transfer and disclose information

1. Share information

We will not share your personal information with companies, organizations and individuals other than BTC Rich Miner service providers, except in the following cases:

1) Sharing under legal circumstances: we may share your personal information according to laws and regulations, litigation and dispute resolution needs, or according to the requirements of administrative and judicial organs according to law.

2) Share with explicit consent: after obtaining your explicit consent, we will share your personal information with other parties.

3) Share when you actively choose: when you enable the function of sharing intelligent devices through the client application, we will share the intelligent terminal information you added to your designated end users according to your choice.

2. Transfer information

We will not transfer your personal information to any company, organization or individual, except for the following circumstances:

1) Transfer with explicit consent: after obtaining your explicit consent, we will transfer your personal information to other parties;

2) In BTC Rich Miner service provider's merger, acquisition or bankruptcy liquidation, or other situations involving merger, acquisition or bankruptcy liquidation, if personal information transfer is involved, we will require the new company and organization holding your personal information to continue to be bound by this policy. Otherwise, we will require the company, organization and individual to ask you for authorization and consent again.

3. Disclosure of information

We will only disclose your personal information under the following circumstances:

1) With your explicit consent or based on your active choice, we may publicly disclose your personal information;

2) If we determine that you have violated laws and regulations or seriously violated BTC Rich Miner platform related agreements and rules, or to protect the personal and property safety of BTC Rich Miner platform users or the public from infringement, we may disclose your personal information in accordance with laws and regulations or with your consent, including relevant violations and the measures taken by BTC Rich Miner platform against you.

4. Exceptions to information sharing, transfer and disclosure

In the following cases, you do not need to obtain your authorization and consent in advance to share, transfer and publicly disclose your personal information:

1) Related to national security and national defense security;

2) Related to public safety, public health and major public interests;

3) Related to judicial or administrative law enforcement such as criminal investigation, prosecution, trial and judgment execution;

4) For the purpose of safeguarding your or other personal life, property and other major legitimate rights and interests, but it is difficult to obtain my consent;

5) Your personal information disclosed to the public by yourself;

6) Collecting personal information from legally disclosed information, such as legal news reports, government information disclosure and other channels.

Please be aware that according to applicable laws, if we take technical measures and other necessary measures to process personal information, so that the data receiver cannot re identify specific individuals and cannot recover, the sharing, transfer and public disclosure of such processed data do not need to be notified to you and obtain your consent.

4、 How to protect and manage your information

1. We have taken reasonable and feasible security measures in line with industry standards to protect your information and prevent unauthorized access, public disclosure, use, modification, damage or loss of personal information. For example:

1) We use HTTPS encryption transmission protocol to transmit device data to the cloud;

2) Data between devices is transmitted by 128 / 256 bit AES and xtea encryption;

3) Automatically generate AES encryption key through ecdh;

4) Use ECDSA digital signature to verify identity;

5) Image data is transmitted by scrambling.

2. We have an industry-advanced data security management system with data as the core and around the data life cycle to improve the security of the whole system from the aspects of organization construction, system design, personnel management, product technology and so on. At present, our important information system complies with gdpr specification and has obtained ISO27001 certification.

3. BTC Rich Miner continuously adjusts the existing working standards and processes to ensure the confidentiality, integrity and availability of data, and can quickly notify the authorities and users within 72 hours in accordance with the requirements of laws and regulations after the notification of personal privacy violations:

1) Import ISO 27001 / isms information security management system;

2) Revise the data protection and company privacy policy;

3) Data collection and use consent / statement content adjustment;

4) Update data leakage handling procedures;

5) Develop emergency response procedures for individual asset accidents.

5、 How to manage your information

You can manage your information in the following ways:

1. Query and change your information: you have the right to query and change your personal information. You can query and modify your account information through the client application or log in to the website and click account settings.

2. Change the scope of your authorization consent: when enabling some functions of the client application, you need to obtain your corresponding authorization on the mobile device. You can modify the authorization consent in the relevant system settings of the mobile device. When you withdraw your authorization consent, we will no longer process the corresponding personal information, and the corresponding functions may not be enabled normally. However, your decision to withdraw your consent will not affect the previous personal information processing based on your authorization.

3. Response to your feedback request: in order to ensure security, we may require you to verify your identity before processing your request, so you need to provide written proof or other relevant materials that can prove your identity.

Under the following circumstances, we will not be able to respond to your request in accordance with the requirements of laws and regulations:

1) Related to national security and national defense security;

2) Related to public safety, public health and major public interests;

3) Related to criminal investigation, prosecution, trial and execution of judgment;

4) There is sufficient evidence to show that the subject of personal information has subjective malice or abuse of rights;

5) Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals and organizations;

6) Involving trade secrets.

6、 How to realize the global transfer of information

According to the applicable data security protection laws and regulations of different countries, the measures for the global transfer of information are as follows:

Personal information collected and generated during domestic operation shall be stored in China, except for the following circumstances:

1) The applicable laws have clear provisions;

2) Obtain your explicit authorization;

3) You conduct cross-border transactions and other personal initiatives through the Internet.

In view of the above circumstances, we will ensure that your personal information is adequately protected in accordance with this privacy policy.

7、 How to update this Privacy Policy

1. We may revise this policy from time to time to meet the requirements of the latest laws and regulations.

2. Before the change takes effect, we will make an announcement on the BTC Rich Miner official website or notify you in other ways so that you can read the updated full content.

3. In this case, if you still choose to continue using our services, you agree to the first revised policy.

8、 How to contact us

If you have any questions, comments or suggestions on this policy or other related matters, you can send e-mail to #mail# feedback your questions.

We will review your questions as soon as possible and reply in time after verifying your identity.