Please take a moment to familiarize yourself with our privacy policy. If you have any questions, please contact us.
The SCIFTO application is a product provided by Guoqi Pujin Intelligent Technology (Anqing) Co., Ltd. (hereinafter referred to as “Pujin Intelligent” or “we”) for recording and displaying sports data related to electric wheelchairs, as well as for setting up and providing services for mobility scooters.
Your trust is of great importance to us. We understand the significance of personal information to you. We will comply with laws and regulations, take appropriate security protection measures, and make every effort to ensure the security and controllability of your personal information. In view of this, Guoqi Pujin Intelligent Technology (Anqing) Co., Ltd. has formulated this “Privacy Policy” (hereinafter referred to as “this policy / this privacy policy”) and reminds you:
Our product is developed based on DCloud uni-app (5+ App/Wap2App). During the operation of the application, we need to collect your device’s unique identification code (IMEI/android ID/DEVICE_ID/IDFA, SIM card IMSI information, OAID) to provide statistical analysis services, and improve performance and user experience through analysis of application startup data and abnormal error logs, so as to provide you with better services. For details, please visit the “DCloud User Service Terms” (the hyperlink to the DCloud User Service Terms is: https://ask.dcloud.net.cn/protocol.html).
It should be specially noted that this policy only applies to Pujin Intelligent’s products and services, and does not apply to services provided to you by other third parties, nor to products or services of Pujin Intelligent for which separate privacy policies have been independently established.
Before using any of Pujin Intelligent’s products or services, please carefully read and thoroughly understand this policy, especially the clauses marked in bold / bold underlined. You should focus on reading these clauses and confirm that you fully understand and agree before starting to use. If you have any questions, comments or suggestions about the content of this policy, you can contact us through various contact methods provided by Pujin Intelligent.
The formulation and implementation of this privacy policy will adopt the following principles: the principle of consistency of rights and responsibilities, the principle of clear purpose, the principle of choice and consent, the principle of minimum necessity, the principle of ensuring security, the principle of subject participation, and the principle of openness and transparency.
• Pujin Intelligent: Refers to the Pujin Intelligent mobile client (including but not limited to APP, mini-program, etc.).
• Pujin Intelligent Service Provider: Refers to Guoqi Pujin Intelligent Technology (Anqing) Co., Ltd., the provider of the Pujin Intelligent mobile client and software technical services, with its registered address in Anqing City, Anhui Province, China.
• Affiliated Companies: Refers to other companies that have a direct or indirect controlling relationship or equity relationship with Pujin Intelligent.
This part of the privacy policy will help you understand the following contents:
How we collect and use your information
How we use Cookies and similar technologies
How we share, transfer, and publicly disclose your information
How we protect your information
How you can manage your information
How we handle the information of minors
How your personal information is transferred globally
How this privacy policy is updated
How to contact us
When you use our products and/or services, the scenarios in which we need/may need to collect and use your personal information include the following three types:
Necessary information that you must authorize us to collect and use in order to realize the basic functions of our products and/or services provided to you. If you refuse to provide the corresponding information, you will not be able to use our products and/or services normally.
Information that you can choose to authorize us to collect and use in order to realize the additional functions of our products and/or services provided to you. If you refuse to provide it, you will not be able to use the relevant additional functions normally or achieve the functional effects we intend to achieve, but it will not affect your normal use of the basic functions of our products and/or services.
To identify your device, prevent malicious programs and anti-cheating, improve service security, and ensure operational quality and efficiency, we will collect your device information (including IMEI, device serial number, OAID, MEID, Android ID, IMSI, GUID, MAC address, SIM card serial number), information about installed apps or running processes.
You understand and agree that:
We are committed to creating a variety of products and services to meet your needs. Since we provide you with a wide range of products and services, and different users choose to use different specific product/service scopes, accordingly, the basic/additional functions and the types and scopes of personal information collected and used will be different. Please refer to the specific product/service functions.
In order to bring you a better product and service experience, we are constantly working to improve our technology. As a result, we may from time to time launch new or optimized functions, which may require the collection and use of new personal information or changes in the purpose or method of using personal information. In this regard, we will inform you of the collection purpose, scope and use method of the corresponding information through updating this policy, pop-up windows, page prompts and other methods, and provide you with a way to choose to agree independently, and collect and use it only after obtaining your express consent.
We attach great importance to the security of your personal information. Therefore, we will adopt industry-mature security standards and protection measures to protect your personal information. We will only collect and use your personal information for the following purposes stated in this policy, and store it within the territory of the People’s Republic of China. If cross-border transmission is required, we will separately obtain your authorization or express consent. If your legitimate rights and interests are damaged due to a security incident, we will assume corresponding responsibilities in accordance with the provisions of laws and regulations.
If you explicitly refuse to provide the necessary information required for our core business functions, it may result in your inability to use our products or services normally.
During this process, if you have any questions, comments or suggestions, you can contact us through various contact methods provided by Pujin Intelligent, and we will provide you with answers as soon as possible.
We will apply for location permission from you in the APP. After you enable the location permission, we will access and obtain your location information (including approximate location information based on base stations and precise location information based on GPS) to search for nearby Bluetooth devices and enjoy device function services by connecting to Bluetooth devices, such as viewing device status information, setting device parameters, etc. Please note that you can disable this permission in the mobile device system settings.
You understand and agree that the above services may require you to enable your location information on your device to realize the collection and use of information involved in these permissions. You can view the status of the above permissions item by item in your device settings, and can independently decide to enable or disable these permissions at any time.
If the information you provide contains the personal information of other users, before providing this personal information to Pujin Intelligent, you must ensure that you have obtained legal authorization.
If we use the information for other purposes not stated in this policy, or use the information collected for a specific purpose for other purposes, or we actively obtain your personal information from a third party, we will obtain your consent in advance.
Our professional security team will carry out security reinforcement (including sensitive information reporting, encrypted storage of sensitive information, access permission control, etc.) on your personal information (including information obtained directly or indirectly). At the same time, for personal information obtained indirectly, we will confirm the legality of its source.
You fully understand and agree that we do not need your authorization and consent to collect and use your personal information in the following situations, and we may not respond to your requests for correction/modification, deletion, cancellation, withdrawal of consent, or request for information:
Related to national security and national defense security;
Related to public security, public health, and major public interests;
Related to criminal investigation, prosecution, trial, and judgment execution and other judicial or administrative law enforcement activities;
For the purpose of safeguarding the major legitimate rights and interests of you or other individuals, such as life and property, but it is difficult to obtain the consent of the individual;
Personal information that you have voluntarily disclosed to the public;
Collecting personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels;
Necessary for signing and performing relevant agreements or other written documents with you;
Necessary for maintaining the safe and stable operation of the products and/or services provided, such as discovering and handling faults of the products and/or services;
Necessary for legitimate news reporting;
Academic research institutions carry out statistics or academic research based on public interests, and when providing the results of academic research or description to the outside world, the personal information contained in the results is de-identified;
Other circumstances stipulated by laws and regulations.
We will use the collected personal information in accordance with the provisions of this privacy policy and to realize the functions of our products and/or services.
Please note that according to applicable laws, if we take technical measures and other necessary measures to process personal information so that the data recipient cannot re-identify a specific individual and cannot restore it, or we may de-identify the collected information for research, statistical analysis and prediction to improve the content and layout of Pujin Intelligent, provide product or service support for business decisions, and improve our products and services (including using anonymous data for machine learning or model algorithm training), then the use of such processed data does not need to be separately notified to you and obtain your consent.
We may also share the above statistical analysis information with the public or third parties to show the overall usage trends of our services, but these statistical information do not contain your identity identification information.
The information you voluntarily provide or authorize us to collect will continue to be authorized for us to use during your use of our products or services, unless you delete it or refuse to collect it from us through system settings. After you cancel your account, we will delete your personal information or anonymize it in a timely manner. However, for personal information that needs to be retained according to the provisions of laws and regulations, we will properly keep it in accordance with the provisions of laws and regulations.
If we stop operating Pujin Intelligent’s products or services, we will immediately stop collecting your personal information, notify you of the stop operation by means of individual delivery or announcement, and delete or anonymize the personal information we hold related to the closed business.
Pujin Intelligent may set up a website to provide you with products and services in the future. To ensure the normal operation of the website and provide you with a more convenient access experience, we will store local storage such as Cookies, Flash Cookies or other local storage provided by browsers or associated applications on your computer or mobile device, which usually contain identifiers, site names, and some numbers and characters (collectively referred to as “Cookies”). With the help of Cookies, the website can store data such as your preferences or items in the shopping cart.
If your browser or browser add-on services allow, you can modify the acceptance of Cookies or reject our Cookies. For details, please see AboutCookies.org. However, if you do this, in some cases it may affect your secure access to our website, and you may need to change your user settings every time you visit our website.
In addition to Cookies, we also use other similar technologies such as web beacons, pixel tags, and ETag on the website.
For example, the emails we send to you may contain address links to the content of our website. If you click on the link, we will track this click to help us understand your product or service preferences, so that we can proactively improve the customer service experience. Web beacons are usually transparent images embedded in websites or emails. With the help of pixel tags in emails, we can know whether the email has been opened. If you do not want your activities to be tracked in this way, you can unsubscribe from our mailing list at any time.
ETag (Entity Tag) is an HTTP protocol header transmitted between the Internet browser and the Internet server, which can replace Cookies. ETag can help us avoid unnecessary server load, improve service efficiency, save resources and energy. At the same time, we may use ETag to record your identity so that we can better understand and improve our products or services. Most browsers provide users with the function to clear browser cache data. You can perform corresponding data clearing operations in the browser settings. However, please note that if you disable ETag, you may not be able to enjoy a relatively better product or service experience.
Our product is developed based on DCloud uni-app (5+ App/Wap2App). During the operation of the application, we need to collect your device’s unique identification code (IMEI/android ID/DEVICE_ID/IDFA, SIM card IMSI information, OAID) to provide statistical analysis services, and improve performance and user experience through analysis of application startup data and abnormal error logs, so as to provide you with better services.
We will not share your personal information with companies, organizations or individuals other than the Pujin Intelligent service provider. However, under the premise of taking sufficient security measures, we can share it in the following situations:
Sharing under statutory circumstances: We may share your personal information with external parties in accordance with the provisions of laws and regulations, the needs of litigation and dispute resolution, or the requirements put forward by administrative and judicial organs in accordance with the law.
Sharing with your express consent: We will share your personal information with other parties after obtaining your express consent.
Sharing when you actively choose: When you purchase goods or services through Pujin Intelligent, we will share the necessary information related to the transaction in your order information with the provider of the relevant goods or services according to your choice to meet your transaction and after-sales service needs.
Sharing with affiliated companies: To facilitate you to obtain information that may be of interest to you, identify abnormal member accounts, and protect the personal and property safety of the users of Pujin Intelligent’s affiliated companies or other users or the public from being infringed, your personal information may be shared with our affiliated companies and/or their designated service providers. We will only share the necessary personal information, and it will be bound by the purposes stated in this privacy policy. If we share your personal sensitive information or the affiliated companies change the purpose of using and processing personal information, we will seek your authorization again.
Sharing with authorized partners: We may authorize partners to provide you with certain services or perform functions on our behalf. Otherwise, you will not be able to use the relevant services well. We will only share your information for the legal, legitimate, necessary, specific and clear purposes stated in this privacy policy. Authorized partners can only access the information necessary for them to perform their duties, and shall not use this information for any other purposes.
At present, our authorized partners include the following types:
Authorized partners in advertising and analysis services: Unless we obtain your permission, we will not share your personal identity information with partners that provide advertising and analysis services. We will entrust these partners to process information related to the coverage and effectiveness of advertisements, but will not provide your personal identity information, or we will de-identify this information so that it will not identify you personally. Such partners may combine the above information with other data they have legally obtained to perform the advertising services or decision-making recommendations entrusted by us.
Suppliers, service providers and other partners: We send information to suppliers, service providers and other partners that support our business. These supports include technical infrastructure services entrusted by us, analyzing the use of our services, measuring the effectiveness of advertisements and services, providing customer service, payment convenience, logistics distribution, or conducting academic research and surveys.
Based on agreement provisions: It is necessary to share with third parties according to the relevant agreements signed with you (including electronic agreements signed online and platform rules) or legal documents.
Based on reasonable business practices: For example, sharing the winning information in joint marketing activities with third parties so that the third party can distribute prizes to you in a timely manner; or we accept due diligence under the premise of ensuring confidentiality and security when conducting capital market activities.
Based on academic research: For example, it is necessary for scientific research institutions to carry out statistics or academic research.
Based on the social public interests stipulated by laws and regulations.
We will not transfer your personal information to any company, organization or individual. However, under the premise of taking sufficient security measures, we will transfer it in the following situations:
Transfer with your express consent: We will transfer your personal information to other parties after obtaining your express consent.
In the event of merger, acquisition or bankruptcy liquidation of the Pujin Intelligent service provider, or other situations involving merger, acquisition or bankruptcy liquidation: If personal information transfer is involved, we will require the new company or organization that holds your personal information to continue to be bound by this policy. Otherwise, we will require the company, organization or individual to seek your authorization again. At the same time, the subject of the personal information controller will also change accordingly.
We will only publicly disclose your personal information in the following situations:
With your express consent or based on your active choice, we may publicly disclose your personal information;
If we determine that you have violated laws and regulations or seriously violated the relevant agreements and rules of Pujin Intelligent, or to protect the personal and property safety of the users of Pujin Intelligent and its affiliated companies or the public from being infringed, we may disclose your personal information, including relevant violations and the measures taken by Pujin Intelligent against you, in accordance with laws and regulations or the relevant agreements and rules of Pujin Intelligent with your consent.
Before public disclosure, we will take security protection measures for your personal information in accordance with the requirements of laws and regulations. At the same time, we will also require the other party to issue corresponding legal documents, such as investigation letters, assistance letters, investigation orders, etc., when we receive a request for public disclosure of information in accordance with the requirements of laws and regulations.
In the following situations, we do not need to obtain your authorization and consent in advance to share, transfer, or publicly disclose your personal information:
Related to national security and national defense security;
Related to public security, public health, and major public interests;
Related to criminal investigation, prosecution, trial, and judgment execution and other judicial or administrative law enforcement activities;
For the purpose of safeguarding the major legitimate rights and interests of you or other individuals, such as life and property, but it is difficult to obtain the consent of the individual;
Personal information that you have voluntarily disclosed to the public;
Collecting personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels.
Please note that according to applicable laws, if we take technical measures and other necessary measures to process personal information so that the data recipient cannot re-identify a specific individual and cannot restore it, then the sharing, transfer, and public disclosure of such processed data does not need to be separately notified to you and obtain your consent.
We have adopted industry-standard, reasonable and feasible security protection measures to protect your personal information from unauthorized access, public disclosure, use, modification, damage or loss. We will use encryption technology to improve the security of personal information; we will use trusted protection mechanisms to prevent personal information from being maliciously attacked; we will deploy access control mechanisms to ensure that only authorized personnel can access personal information; we will use SSL encryption protection during data exchange; we will also use https secure browsing for the corresponding website; and we will hold security and privacy protection training courses to enhance employees’ awareness of the importance of protecting personal information.
We have completed the evaluation requirements in accordance with the requirements of the third level of network security level protection and obtained the record.
We have an industry-leading data security management system with data as the core, which improves the security of the entire system from multiple dimensions such as organizational construction, system design, personnel management, and product technology.
We will take reasonable and feasible measures to try to avoid collecting irrelevant personal information. We will only retain your personal information for the period necessary to achieve the purposes stated in this policy, unless there are mandatory retention requirements by law. For example, the “E-Commerce Law of the People’s Republic of China” requires that commodity and service information and transaction information be retained for three years from the date of transaction completion. The “Cybersecurity Law of the People’s Republic of China” requires that relevant network logs be retained for no less than six months.
After your personal information exceeds the retention period, we will delete your personal information or anonymize it in accordance with the requirements of applicable laws. 5. The Internet is not an absolutely secure environment. When using Pujin Intelligent’s services, we strongly recommend that you do not use non-Pujin Intelligent communication methods to send personal information. You can establish connections and share with each other through our services. When you create exchanges, transactions or shares through our services, you can independently choose the objects of communication, transaction or sharing, as third parties who can see your transaction content, contact information, communication information or shared content and other relevant information.
When using Pujin Intelligent’s services for online transactions, you will inevitably disclose your personal information, such as contact information or contact address, to the transaction counterparty or potential transaction counterparty. Please properly protect your personal information and only provide it to others when necessary. If you find that your personal information, especially your account or password, has been leaked, please contact Pujin Intelligent immediately so that we can take corresponding measures according to your application.
Please note that the information you voluntarily share or even publicly share when using our services may involve your or others’ personal information or even personal sensitive information. Please be more cautious when considering whether to share or even publicly share relevant information when using our services.
Please use complex passwords to help us ensure the security of your account. We will do our best to ensure the security of any information you send to us. If our physical, technical or management protection facilities are damaged, resulting in unauthorized access, public disclosure, tampering or destruction of information, and damage to your legitimate rights and interests, we will assume corresponding legal responsibilities. 6. We will regularly update and publicly disclose relevant contents such as security risks and personal information security impact assessment reports. You can obtain them through the announcement of Pujin Intelligent. 7. In the unfortunate event of a personal information security incident, we will inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the emergency plans we have adopted or will adopt (such as information leakage emergency plan, information damage or loss emergency plan, etc.), suggestions for you to independently prevent and reduce risks, and remedial measures for you. We will inform you of the relevant situation of the incident by means of email, letter, telephone, push notification, etc. If it is difficult to inform each individual information subject one by one, we will take reasonable and effective ways to issue an announcement.
At the same time, we will also report the handling of the personal information security incident in accordance with the requirements of the regulatory authorities.
Please understand that due to technical limitations and limitations of risk prevention, even if we have tried our best to strengthen security measures, we cannot always guarantee 100% security of information. You need to understand that the system and communication network you use to access and use our services may have problems due to reasons beyond our control.
In accordance with the provisions of laws and regulations, you can access and manage your personal information through the following methods:
You have the right to query your information, except for exceptions stipulated by laws and regulations. You can access your personal information by yourself through the following methods:
• Account information: If you want to access or edit the basic personal information in your account, you can log in to your account through the Pujin Intelligent mobile client to perform such operations. The specific method is to open the Pujin Intelligent APP, click “My”, and click the account information to enter the personal information page.
• For other personal information generated during your use of our products or services, we will provide you with it in accordance with the relevant arrangements in “Responding to your above requests” in item (7) of this article.
When you find that there is an error in the personal information about you that we process, you have the right to request us to make corrections or supplements. You can submit a correction or supplement application through the methods listed in “(1) Access your personal information”.
You can delete some of your personal information through the methods listed in “(1) Access your personal information”.
You can request us to delete your personal information in the following situations:
If our processing of personal information violates laws and regulations;
If we collect and use your personal information without obtaining your express consent;
If our processing of personal information seriously violates the agreement with you;
If you no longer use our products or services;
If we no longer provide you with products or services.
If we decide to respond to your deletion request, we will also notify the entities that have obtained your personal information from us to delete it in a timely manner, unless laws and regulations provide otherwise, or these entities have obtained your independent authorization.
After you or we assist you in deleting the relevant information, due to applicable laws and security technologies, we may not be able to delete the corresponding information from the backup system immediately. We will securely store your personal information and isolate it from any further processing until the backup can be cleared or anonymized.
Each business function may require some basic personal information to be completed (see “Part 2, Article 1” of this privacy policy). In addition, for the collection and use of additional personal information, you can contact us to give or withdraw your authorization and consent. You can also operate by yourself by deleting personal information or disabling device permissions through device settings. If you want to enable or disable permission authorization, you need to open the mobile phone settings, find our application in the application list, click to enter and view or modify the permission settings.
Please note that enabling any permission means that you authorize us to collect and use the relevant personal information to provide you with the corresponding service. Once you disable any permission, it means that you have withdrawn your authorization, and we will no longer collect and use personal information based on the corresponding permission, and will not be able to provide you with the service corresponding to that permission. However, your decision to withdraw your consent will not affect the processing of personal information based on your authorization before.
You have the right to obtain a copy of your personal information. You can contact us through the contact information provided in this policy. We will respond to your request within 15 working days.
In some business functions, we may make decisions only based on non-manual automatic decision-making mechanisms including information systems and algorithms. If these decisions significantly affect your legitimate rights and interests, you have the right to request us to provide an explanation, and we will also provide an appeal method without infringing on Pujin Intelligent’s commercial secrets or other users’ rights and interests, or social public interests.
To ensure security, you may need to submit a written request or prove your identity in other ways. We may first ask you to verify your identity before processing your request.
We will respond within 15 days. If you are not satisfied, you can also file a complaint through Pujin Intelligent’s customer service.
In principle, we will not charge fees for your reasonable requests, but for repeated and excessive requests beyond a reasonable limit, we may charge a certain fee depending on the situation. We may reject requests for information that is not directly related to your identity, repeated information without reason, or requests that require excessive technical means (such as developing new systems or fundamentally changing current practices), pose risks to the legitimate rights and interests of others, or are unrealistic.
In the following situations, in accordance with the requirements of laws and regulations, we will not be able to respond to your request:
Related to national security and national defense security;
Related to public security, public health, and major public interests;
Related to criminal investigation, prosecution, trial, and judgment execution and other judicial or administrative law enforcement activities;
There is sufficient evidence to show that the personal information subject has subjective malice or abuses rights;
Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations;
Involving commercial secrets.
In e-commerce activities, we presume that you have corresponding civil capacity. If you are a minor, we require you to ask your parents or guardians to carefully read this privacy policy and use our services or provide information to us only with the consent of your parents or guardians, otherwise you cannot create your own user account.
For the collection of minors’ personal information with the consent of their parents or guardians, we will only use, share, transfer or disclose this information when permitted by laws and regulations, with the explicit consent of parents or guardians, or when necessary to protect minors. At the same time, we will also adopt stricter protection measures to protect the personal information of minors.
The personal information we collect and generate during our operation within the territory of the People’s Republic of China is stored within China, except in the following situations:
There are clear provisions in applicable laws;
Obtain your express authorization;
Your personal active behavior such as cross-border transactions through the Internet.
For the above situations, we will, with your authorization or express consent, clearly inform you of the type of personal information to be provided, the recipient and the storage time of the recipient, and ensure that sufficient protection is provided for your personal information in accordance with this privacy policy.
Our privacy policy may change.
Without your explicit consent, we will not restrict your rights in accordance with this privacy policy. We will post any changes to the privacy policy on a dedicated page.
For major changes, we will also provide more prominent notifications (including notifications through the Pujin Intelligent client’s public announcement, and even pop-up prompts to you).
Major changes referred to in this policy include but are not limited to:
Significant changes in our service model. Such as the purpose of processing personal information, the type of personal information processed, the method of using personal information, etc.;
Significant changes in control rights and other aspects. Such as changes in information controllers caused by mergers and acquisitions, etc.;
Significant changes in the main objects of personal information sharing, transfer or public disclosure;
Significant changes in your rights and the way of exercising them in participating in personal information processing;
Changes in the responsible department, contact information and complaint channels responsible for personal information security;
The personal information security impact assessment report indicates that there is a high risk.
You can contact us through the following methods, and we will respond to your request within 15 days:
If you have any questions, comments or suggestions about the content of this policy, you can contact us at 18022772336@163.com.
The following is the list of obtained permissions:
• Location permission: To provide you with the ability to search for nearby Bluetooth devices.
• Install application: For app updates.
• Camera permission: For scanning QR codes to bind vehicles.
• Flashlight permission: To improve the brightness in dark environments when scanning and binding vehicles.
| SDK Name | Package Name Information | Purpose of Use | Permissions Used | Involved Personal Information | Privacy Policy Link / Official Website |
|---|---|---|---|---|---|
| Mobile Security Alliance OAID | com.bun.miitmdid, com.zui.opendeviceidlibrary, com.netease.nis, com.samsung.android, com.huawei.hms | Obtain OAID | None | Device information | http://www.msa-alliance.cn/col.jsp?id=122 |
| Bluetooth | io.dcloud.feature.bluetooth | Access Bluetooth devices, including searching and connecting. | android.permission.ACCESS_FINE_LOCATION, android.permission.ACCESS_COARSE_LOCATION, android.permission.BLUETOOTH, android.permission.BLUETOOTH_ADMIN | Access to Bluetooth devices, location information. |