Privacy Policy

Dear users:

This policy is only applicable to the product or service of hopeCloud, which is developed by Shenzhen Hope Technology Co. (hereinafter referred to as "Hopewind Technology "), which is a wholly-owned subsidiary of Shenzhen Hopewind Electric Co., Ltd (hereinafter referred to as "Hopewind  Electric"), has authorized Hopewind  Electric to use Hopewind Technology's software copyright of Hopewind Cloud and to operate and maintain Hopewind Electric on various application marketplaces (open platforms). Last update date: 2023.03.31.

  This policy will help you understand the following:

  We understand the importance of your information to you and will do our best to protect the security and reliability of your user information. We are committed to maintain your trust in us and adhere to the following principles to protect your user information: the principle of unity of rights and responsibilities, the principle of clear purpose, the principle of choice of consent, the principle of least sufficient, the principle of ensuring security, the principle of subject participation, the principle of openness and transparency. At the same time, we promise that we will take appropriate security measures to protect your user information in accordance with the mature security standards in the industry.

  Please read and understand this privacy policy carefully before using our products (or services).

  

I. How we collect and use your user information

1. How do we collect your information?

We may collect, store and use the following information when providing our services:

1.1 Information you provide

(1) Relevant personal information that you provide to us when you register for an account or use our services, such as your electronic phone number and other information. If you want to make full use of the various sharing features we offer, you may also need to create a publicly displayed profile, which may contain your name and photo.

(2) Information that you share with other parties through our Services and that you upload, submit, store, send or receive when you use our Services.

1.2 Information We Obtain in the Course of Your Use of the Services

We may collect information about the Services you use and how you use them, such information includes

① Device information: We collect device-specific information, such as your hardware model, MAC address, operating system information, mobile device version, device identification code IMSI, screen resolution, and other information.

②Software installation list

③Address book and SMS

④Log information

    A. Device or software information, such as configuration information provided by your mobile device, web browser or other programs used to access our services, your IP address and the version and device identification number used by your mobile device;

    B. information searched or viewed while using our Services, such as the web search terms you use, the URL addresses of the social media pages you visit, and other information and content details that you view or request while using our Services;

(3) IP Addresses

    A. information about the mobile applications (apps) and other software you have used, and information about how you have used such mobile apps and software;

    B. Information (metadata) contained in content you share through our Services, such as the date, time or location of shared photos or videos taken or uploaded.

(4) List of third party SDKs accessed by Harvest Cloud App:

A.mPass

SDK operating entity name: Ali Cloud Computing Co.

Function: applet container, UC graphic image preview

Collection of personal information type: device identifiers (device model, operating system version, device settings, MAC address and information on hardware and software features such as IMEI, IDFA, OAID and other device identifiers), device location (IP address, GPS location and sensor information such as Wi-Fi access points, Bluetooth and base stations that can provide relevant information)

Third party privacy policy link: click to view


B. Ali cloud, Ali cloud object storage OSS

SDK operating entity name: Ali Cloud Computing Co.

Function: Provide payment collection, pick-up call online voice synthesis function, Ali cloud object storage service, file upload; provide real person authentication function

Collect personal information type: device identifier (device model, operating system version, device settings, MAC address and IMEI, IDFA, OAID and other device identifiers and other hardware and software characteristics information), device location (IP address, GPS location and sensor information such as Wi-Fi access points, Bluetooth and base stations that can provide relevant information) device identifier, access to the network, access camera, storage, file reading and writing

Third party privacy policy link: click to view


C.Gaode

SDK operating entity name: Gaode Software Co.

Function: Navigation, positioning, place name search, path planning, track collection

Type of personal information collected: mobile device country code MCC + mobile device network code MNC, IMSI, running process, packagename, base station information (base station number, location area, signal), external file storage directory information, network device hardware MAC address, RSSI (signal strength), location information (GPS information), precise geographic location information Approximate geolocation information, BSSID,SSID, location latitude and longitude, WiFi list, stored files, directory, space status, device serial code, device information

Third party privacy policy link: click to view


D. WeChat sharing, payment, small program jumping

SDK operator name: Shenzhen Tencent Computer System Co., Ltd. and CaiPay Payment Technology Co.

Function: Can help users to complete payment, provide security authentication services, APP jump to small programs

Type of personal information collected: device information (BSSID, SSID, IMSI, IMEI, SIM card serial number, AndroidID, MAC address, device serial code), external file storage directory, storage file, directory, space status

Third party privacy policy link: click to view


E. Register to listen to system broadcasts for self-starting DownloadReceiver 

SDK operator name: Dcloud Digital Paradise (Beijing) Network Technology Co.

Function: DCloud uni-app development software version of the reason for the detection of the SDK official registration to listen to the broadcast, broadcast action: android.intent.action.PACKAGE_ADDED. the actual WoW cloud APP did not actually produce frequent self-start phenomenon, hereby declare. If it really exists, the possible scenarios are: when switching between multiple languages, and when downloading firmware packages, it may generate download acceptance response.

Type of personal information collected: Our product is developed based on DCloud uni-app (5+ App/Wap2App), and your unique device identifier (IMEI/android ID/DEVICE_ID/IDFA, SIM card IMSI information) needs to be collected during application operation to provide statistical analysis services, and to improve performance and user experience through application launch data and abnormal We can improve performance and user experience through application startup data and error log analysis to provide better services to users. For details, please visit the DCloud User Service Terms.

Third party privacy policy link: click to view


F. User's personal image collection and upload

Name of SDK operator: Dcloud Digital Paradise (Beijing) Network Technology Co.

Type of personal information collection: Our products are developed based on DCloud uni-app (5+ App/Wap2App), during the operation of the application users will upload pictures to https://stream.dcloud.net.cn when they have the need to upload pictures in their personal center or during the process of creating power stations. Hereby disclosed, for details please visit the DCloud User Terms of Service.

Third party privacy policy link: click to view


(5) Description of device permission call

A. Camera permissions: When you use shooting or scanning related functions, we need to call your camera permissions.

B. External storage permissions (read and write): In order to store the necessary application configuration files and the content you choose to download and update, or read the content you need to upload and synchronize, your storage permissions need to be invoked.

C. Location permission (access to coarse and precise location and backgroun location): You will be asked for this permission in order to get the current location information when you create a power station.

D. Phone access (dialing and getting call status): When you need to give feedback to after-sales personnel about equipment failure alarm information, you need to call your phone access to get this information, but otherwise will not be called based on other purposes.

2. How we use your information

    We may use the information we collect above for the following purposes:

(1) To provide the Services to you;

(2) For identification, customer service, security precautions, archival and backup purposes in connection with the provision of our services and to ensure the security of the products and services we provide to you;

(3) To help us design new services and improve our existing services;

(4) To enable us to better understand how you access and use our services so that we can target our responses to your needs, such as language settings, location settings, help services and instructions, or otherwise respond to you and other users;

(5) To provide you with advertising that is more relevant to you as an alternative to commonly placed advertising;

(6) To perform software validation, upgrade services;

(7) Providing specific services in response to specific requests from users that require information to be provided to our affiliates, third parties or other users;

(8) Other situations that benefit the interests of users and App operators and do not violate any mandatory laws and regulations;

(9) To involve you in surveys about our products and services.

  (ii) Exceptions to authorized consent

Please understand that, according to laws and regulations and relevant national standards, we do not need to obtain your authorized consent to collect and use your user information in the following cases:

1. directly related to national security and national defense security

2、 Directly related to public safety, public health, and significant public interest

3, directly related to crime investigation, prosecution, trial and execution of judgments, etc;

4、 For the protection of your or other individuals' life, property and other significant legitimate rights and interests but it is difficult to get my consent;

5、 The collected information of your user is disclosed by you to the public on your own;

6、 The information collected about your users from legitimate public disclosures, such as legitimate news reports, government information disclosure and other channels;

7、 Necessary for the conclusion or performance of a contract at your request;

8、 Necessary for maintaining the safe and stable operation of the software and related services, such as the discovery and disposal of software and related services failures;

9. necessary for the controller of personal information to be a news organization and for it to conduct legitimate news reporting;

10、 Where it is necessary for academic research institutions to conduct statistical or academic research in the public interest and where the results of the academic research or description are provided to the public, and where the personal information contained in the results is de-identified.

11、 Other circumstances specified in laws and regulations.


II. How we use cookies and similar technologies

  (i) Cookies

  Cookies are small data files called cookies that are stored on your computer or mobile device to ensure that the site works properly. cookies typically contain an identifier, the name of the site, and some numbers and characters. Cookies enable a website to store data about your access preferences.

  We do not use cookies for any purpose other than those described in this policy. You can clear all cookies stored on your computer, and most web browsers have the ability to block cookies. However, if you do so, you will need to personally change your user settings each time you visit our site.

  

  (ii) Web beacons and pixel tags

  In addition to cookies, we use other similar technologies such as web beacons and pixel tags on our website. For example, the email we send you may contain a clickable URL that links to content on our site.

  If you click on that link, we track that click to help us understand your product or service preferences and improve customer service. A web beacon is typically a transparent image embedded in a website or email. With the help of pixel tags in emails, we can tell if an email has been opened. If you do not want your activity to be tracked in this way, you can unsubscribe from our mailing list at any time.

  

  (iii) Do Not Track

  Many web browsers have a Do Not Track feature, which issues Do Not Track requests to websites. Currently, the major Internet standards organizations have not established policies that govern how websites should respond to such requests. However, if your browser has Do Not Track enabled, then all of our websites will respect your choice.

  

Ⅲ. How We Share, Transfer, and Publicly Disclose Your User Information

  (i) Sharing

  We will not share your user information with any other companies, organizations or individuals, except for the following:

  1. Sharing with explicit consent: We will share your User Information with other parties after obtaining your explicit consent.

  2. We may share your User Information with external parties in accordance with laws and regulations, or in accordance with mandatory requirements of government authorities.

  3. Sharing with our affiliated companies: Your User Information may be shared with our affiliated companies. We will only share as much User Information as is necessary and is subject to the purposes stated in this Privacy Policy. Affiliates who wish to change the purposes for which user information is processed will again seek your authorized consent.

  4. Sharing with Authorized Partners: Some of our services will be provided by authorized partners only to fulfill the purposes stated in this policy. We may share some of your User Information with our partners in order to provide better customer service and user experience. We will only share your User Information for purposes that are legal, legitimate, necessary, specific, and explicit, and only as much User Information as is necessary to provide the Services. In order to better operate and improve our technology and services, you agree that we and our authorized partners may use the collected information for other services and purposes, subject to applicable laws and regulations.

  The following lists specific authorized partners and provides a link to the privacy policy of that third party, which we recommend you read:

  (1) Push service providers: Push technology services are provided by Zhejiang Daily Interactive Network Technology Co., Ltd. We may provide your device platform, device manufacturer, device brand, device identification code and other device information, application list information, network information and location-related information to Zhejiang Daily Interactive Network Technology Co. For more details, please visit "Personal Push User Privacy Policy".

  (2) Advertising and Media: We may share the information we collect with advertising, media and our other authorized partners for commercial purposes, including optimizing ad placement and improving marketing effectiveness.

  For companies, organizations and individuals with whom we share user information, we will enter into strict confidentiality agreements with them, requiring them to handle user information in accordance with our instructions, this Privacy Policy and any other relevant confidentiality and security measures.

  

  (ii) Transfers

  We will not transfer your User Information to any company, organization or individual, except for the following:

  1、Transfer with express consent: after obtaining your express consent, we will transfer your user information to other parties;

  2、In the event of a merger, acquisition or bankruptcy and liquidation involving the transfer of user information, we will then require the new company or organization holding your user information to continue to be bound by this privacy policy, or we will require the company or organization to seek your authorized consent again.

  

  (iii) Public Disclosure

  We will disclose your user information publicly only under the following circumstances:

  1、After obtaining your express consent;

  2、Disclosure based on law: We may disclose your user information publicly if compelled to do so by law, legal process, litigation or government authorities.

  

IV. How we protect your user information

  (a) We have used industry-standard security measures to protect the user information you provide against unauthorized access, public disclosure, use, modification, damage or loss of data. We will take all reasonably practicable steps to protect your User Information. For example, the exchange of data between your browser and the Service is protected by SSL encryption; we also provide https secure browsing of our websites; we use encryption to ensure the confidentiality of data; we use trusted protection mechanisms to prevent malicious attacks on data; and we deploy access control mechanisms to ensure that only authorized personnel have access to user information. We will deploy access control mechanisms to ensure that only authorized personnel have access to user information; and we will conduct security and privacy training sessions to enhance employee awareness of the importance of protecting user information.

  (b) We will take all reasonably practicable steps to ensure that no unrelated user information is collected. We will retain your User Information only for as long as necessary to achieve the purposes described in this Policy, unless an extended retention period is required or permitted by law.

  (c) The Internet is not an absolutely secure environment, and e-mail, instant messaging, and communication with other users are not encrypted, and we strongly recommend that you do not send User Information through such means.

  (d) We will regularly update and make public the relevant contents of reports on security risks, user information security impact assessment, etc. You can get it by the following ways: Supplementary security risk disclosure channels

  (e) The Internet environment is not 100% secure, and we will do our best to ensure the security of any information you send us. Even if we make great efforts and take all reasonable and necessary measures, it may still be impossible to prevent your user information from being illegally accessed, illegally stolen, illegally tampered with or destroyed, resulting in damage to your legitimate rights and interests, please understand the above-mentioned risks of information networks and voluntarily assume them.

  (f) After the unfortunate occurrence of user information security events, we will inform you in a timely manner in accordance with the requirements of laws and regulations: the basic situation of the security event and the possible impact, the disposal measures we have taken or will take, the suggestions you can independently prevent and reduce the risk, the remedial measures for you, etc. We will promptly inform you of the event-related situation by email, letter, telephone, push notification, etc. When it is difficult to inform the user information subjects one by one, we will take reasonable and effective ways to issue announcements. At the same time, we will also take the initiative to report the disposition of user information security events in accordance with the requirements of the regulatory authorities.

    

V. Your rights

  In accordance with the relevant laws, regulations and standards of China, as well as the common practices of other countries and regions, we protect your right to exercise the following rights to your user information:

  (A) Access to your user information

  You have the right to access your user information, except for the exceptions provided by laws and regulations. If you wish to exercise your right of data access, you can access your personal information data by logging into your account and then in Personal Information.

  If you are unable to access this user information through the link above, you may contact us at any time using our Web form at 或发送电子邮件至hopecloud@hopewind.com. We will respond to your request for access within 30 days.

  For other user information generated in the course of your use of our products or services, we will make it available to you as long as we do not require excessive input. If you wish to exercise your right to data access, 请发送电子邮件至hopecloud@hopewind.com.

  

  (ii) Correction of your user information

  When you discover an error in the user information we process about you, you have the right to request that we make a correction. You can request corrections by using the methods listed under "(a) Access to your user information". If you are unable to correct such User Information through the link above, you may contact us at any time using our Web form at 或发送电子邮件至hopecloud@hopewind.com. We will respond to your request for correction within 30 days.

  

  (iii) Deletion of your user information

  You may make a request to us to delete your User Information in the following circumstances:

1、 If our handling of user information violates laws and regulations;

2、 If we collect and use your user information without your consent;

3、 If our handling of user information violates the agreement with you;

4、 If you no longer use our products or services, or if you cancel your account;

5、 If we no longer provide products or services to you.

  We will evaluate your request for deletion and take the appropriate steps to process it if it meets the appropriate requirements. When you make a deletion request to us, we may require you to verify your identity to safeguard your account. When you delete information from our Services, because of applicable laws and security technology, we may not immediately delete the corresponding information from our backup systems, and we will store your information securely until the backup can be erased or anonymized.

  

  (iv) Change the scope of your authorized consent

  Each business function requires some basic user information to complete (see "Section I" of this policy). You may give or withdraw your consent to the collection and use of user information at any time. You may do this yourself by: 1. contacting your distributor; 2. contacting our customer service.

  When you withdraw your consent, we will no longer process the corresponding user information. Please also note that your withdrawal of authorized consent may lead to certain consequences, such as we may not be able to continue to provide you with the corresponding services or specific functions, but your decision to withdraw your consent will not affect the processing of user information previously carried out based on your authorization.

  

  (E) Cancellation of accounts by user information subjects

  You may cancel your previously registered account at any time, and you may cancel your personal account by contacting the reseller administrator.

  Upon cancellation of your account, we will cease to provide you with products or services and, at your request, delete or anonymize your information, except as otherwise provided by law or regulation. This may also result in you losing access to the data in your account, so please proceed with caution.

  

  (F) Access to copies of user information by the subject of user information

  You have the right to obtain a copy of your User Information, which you can do by accessing or editing the profile information in your account.

  Subject to technical feasibility, such as data interface matching, we may also transfer a copy of your User Information directly to a third party designated by you at your request.

  

  (vii) Constrained Information System Automated Decision Making

  In some business functions, we may make decisions based solely on non-manual automated decision-making mechanisms, including information systems and algorithms. If these decisions significantly affect your legal rights, you have the right to request an explanation from us and we will provide appropriate remedies.

  

  (viii) Responding to your request above

  For security purposes, you may be required to provide a written request or otherwise prove your identity. We may ask you to verify your identity before processing your request.

  We will respond within thirty days. If you are not satisfied, you may also initiate a complaint through the customer service contact information set forth in Article 8.

  In principle, we do not charge a fee for your reasonable requests, but for requests that are repeated several times and exceed reasonable limits, we will charge a cost fee depending on the circumstances. We may reject requests that are unwarrantedly repetitive, require excessive technical means (for example, requiring the development of new systems or fundamental changes to current practices), pose a risk to the legal rights of others, or are highly impractical. Please also understand that we may not be able to respond to some of your requests due to safety and security concerns, requirements of relevant laws and regulations, or technical limitations, such as the following:

1. related to the fulfillment of obligations under laws and regulations by the controller of user information

2. directly related to national security or national defense security

3. directly related to public safety, public health, and significant public interests

4, directly related to crime investigation, prosecution, trial and execution of judgments, etc;

5, the user information controller has sufficient evidence that the subject of user information has subjective malice or abuse of rights

6、 Out of the need to protect the life, property and other significant legitimate rights and interests of the user information subject or other individuals but it is difficult to obtain his or her consent

7、 Responding to the request of the user information subject will lead to serious damage to the legitimate rights and interests of the user information subject or other individuals or organizations

8、 Involving commercial secrets.


VI. How your user information is stored and how it is transferred globally

  In principle, the user information we collect and generate in the People's Republic of China will be stored in the People's Republic of China. We will only retain your User Information for the period necessary for the purposes and uses described in this Policy and for the minimum period required by law and regulation, after which we will delete or anonymize your User Information as required by applicable laws and regulations. Unless otherwise required by law or regulation, or for purposes of public interest, scientific-historical research, etc., or if you have otherwise authorized your consent, we may need to retain the relevant data for a longer period of time.

  Because we provide our products or services through resources and servers located around the world, this means that, with your authorized consent, your User Information may be transferred to, or accessed from, jurisdictions outside the country in which you use the product or service.

  Such jurisdictions may have different data protection laws or even no such laws. In such cases, we will ensure that your information is adequately protected to the same extent as it is in the People's Republic of China. For example, we may ask for your consent to transfer user information across borders or implement security measures such as data de-identification prior to cross-border data transfers.

  

VII. how this policy is updated

  Our privacy policy is subject to change. We will not reduce your rights under this Privacy Policy without your express consent. We will post any changes to this policy on this page.

  For material changes, we will also provide more prominent notice. Material changes within the meaning of this policy include, but are not limited to:

1. a material change in our service model. such as the purposes for which user information is processed, the types of user information processed, and how user information is used;

2. Significant changes in our ownership structure, organizational structure, etc. such as change of ownership caused by business restructuring, bankruptcy and merger, etc;

3、 Changes in the main recipients of user information sharing, transfer or public disclosure;

4、 Significant changes in your rights to participate in the processing of user information and the manner in which they are exercised;

5、 When there is a change in the department responsible for handling user information security, contact information and complaint channels of us

6、 When the user information security impact assessment report indicates that there is a high risk.

  We will also archive the old version of this policy for your review.

  

VIII. How to contact us

  If you have any questions, comments or suggestions about this privacy policy, contact us by

  E-mail: hopecloud@hopewind.com

  Telephone: 0755-86026786

  Fax: 0755-86114545

  In general, we will reply within thirty days.

  If you are not satisfied with our reply, especially if our user information processing behavior has damaged your legitimate rights and interests, you can also seek a solution by filing a lawsuit to the court with jurisdiction in the defendant's domicile.