Privacy Statement

Issuance/Effective Date: January 1, 2026

Overview

Thank you for trusting and using our product. We fully respect your right to privacy, so we hereby formulate this "App Privacy Statement" (hereinafter referred to as "this Statement") to help you understand how we collect, use, disclose, protect, store, and transmit your personal data. Please read this Statement carefully. If you have any questions, please let us know.

Personal information refers to various information recorded electronically or by other means that can identify a natural person alone or in combination with other information. This Statement explains how we process your personal information, and the processing methods for specific products or services will be detailed in the corresponding privacy notices or supplementary statements.

This Statement will help you understand the following:

  1. How we collect and use your personal information
  2. How we use Cookies and similar technologies
  3. How we entrust the processing, share, transfer, and publicly disclose your personal information
  4. How we protect your personal information
  5. How you can manage your personal information
  6. How we handle minors' personal information
  7. Third-party links and their services
  8. How your personal information is transferred globally
  9. Providing you with other additional services
  10. Image Push Encryption
  11. Third-party products and services
  12. How to contact us

 

I. How We Collect and Use Your Personal Information

  1. Registration, login, and account management services
  1. Device management services
  1. Cloud services
  1. To implement the message push function, we will collect event notification information (such as the SN number of the alarm device, alarm pictures, personnel/vehicle identification information related to face database management and license plate database management, etc.) and store it on the cloud server, and the relevant personal information will be encrypted. If you refuse to provide this information, you will not be able to use the message push function, but it will not affect your normal use of other functions.
  1. To improve your user experience, you can choose to enable the "User Experience Program". We will collect your mobile terminal device information (model, system version, APP version, APPID, number of CPU cores, operator number, current memory used by the APP, APP name, APP bundleID/package name, operating system language), account (email address/phone number), username (nickname or real name), and information about the relevant devices you manage (device SN number, device model, device name).
  1. Site services
  1. We need to collect the orientation sensor of your mobile device for automatic switching between horizontal and vertical screens and fisheye VR scenes; we collect the light intensity sensor of your mobile device for the code scanning function and face addition light sensing. If you refuse to provide this information, you will not be able to use this function, but it will not affect your normal use of other functions.

Please note:

Our product services are diversified, and the types and scopes of personal information collected and used for different services will vary. We will only collect personal information corresponding to the service functions you purchase or use. If you do not use or purchase any of the above functions, we will never and cannot collect personal information related to that function.

II. How We Use Cookies and Similar Technologies

Devices, mobile applications, and Windows applications may use local storage technologies such as Cookies, pixel tags, and web beacons. We treat information collected through Cookies and similar technologies as non-personal information. However, if local laws regard IP addresses or similar identification marks as personal information, we will also treat such identification marks as personal information.

  1. Cookies

A Cookie is a plain text file stored by a web server on a computer or mobile device. The content of a Cookie can only be retrieved or read by the server that created it. Each Cookie is unique to your web browser or mobile application. Cookies usually contain an identifier, site name, and some numbers and characters.

We sometimes store Cookies on computers or mobile devices. The purpose of enabling Cookies is to improve the user experience, including:

We will not use Cookies for any purposes other than those described in this Statement. You can manage or delete Cookies according to your preferences. For details, please see AboutCookies.org . You can clear all Cookies stored on your computer, and most web browsers have functions to block Cookies.

If you clear Cookies, you will need to change user settings yourself each time you visit our website. Please also note that some of our services may must use Cookies, and disabling Cookies may affect your use of all or part of the functions of these services.

  1. Web beacons/pixel tags

In addition to Cookies, we and some third parties will use web beacons and pixel tags on websites. A web beacon is usually an electronic image embedded in a website or email, which can be used to identify Cookies on your device when you view a web page or email. Pixel tags allow us to send emails in a format you can read and enable us to know whether the email has been opened.

We and some third parties use such technologies for various purposes, including analyzing service usage (in conjunction with Cookies) and providing content and advertisements that better meet your needs. For example, emails we send to you may contain click URLs linked to website content. If you click the link, we will track the click to help us understand your preferences and improve customer service. If you do not want your activities to be tracked in this way, you can unsubscribe from our mailing list at any time.

  1. Other local storage

We and some third parties may use other local storage technologies in some services, such as local shared objects (also known as "Flash Cookies") and HTML5 local storage. These technologies are similar to the aforementioned Cookies. They are also stored on your device and can be used to record certain information about your activities and preferences. However, these technologies may use different devices from standard Cookies, so you may not be able to control them using standard browser tools and settings. For instructions on disabling or deleting information contained in Flash Cookies, please click here.

  1. Do Not Track

Many web browsers have a Do Not Track function, which can send Do Not Track requests to websites. Currently, major internet standards organizations have not established relevant policies to regulate how websites should respond to such requests. If your browser enables Do Not Track, all our websites will respect your choice.

III. How We Entrust the Processing, Share, Transfer, and Publicly Disclose Your Personal Information

  1. Entrusted processing

In some cases, we will entrust other companies to process your personal information on our behalf. For example, companies that process hotlines, send emails, and provide technical support on our behalf. These companies can only use your personal information to provide services to you on our behalf.

We will sign strict confidentiality agreements or personal information processing clauses with the entrusted parties, requiring them to process personal information in accordance with this Statement and take relevant confidentiality and security measures.

  1. Sharing

Sharing refers to the process in which we provide personal information to other personal information controllers, and both parties have independent control over the personal information. We will not share your personal information with external parties except in the following cases:

Under 3-4 above, we will sign strict confidentiality agreements with companies, organizations, and individuals with whom we share personal information, requiring them to process personal information in accordance with this Statement and take relevant confidentiality and security measures.

  1. Transfer

Transfer refers to the process of transferring the control of personal information from us to another personal information controller. We will not transfer your personal information to any company, organization, or individual except in the following cases:

  1. Public disclosure

We will only publicly disclose your personal information in the following cases:

  1. Exceptions to obtaining authorization and consent in advance for sharing, transferring, and publicly disclosing personal information

In the following circumstances, sharing, transferring, or publicly disclosing your personal information does not require your prior authorization and consent:

According to legal provisions, sharing or transferring anonymized personal information, and ensuring that the data recipient cannot restore or re-identify the personal information subject, is not considered as external sharing, transfer, or public disclosure of personal information. The storage and processing of such data will not require additional notification to you and obtaining your consent.

IV.  How We Protect Your Personal Information

We attach great importance to the security of personal information and take industry-standard practices to protect your personal information from unauthorized access, disclosure, use, modification, damage, or loss. To this end, we have specially taken the following measures:

  1. We take all reasonably feasible measures to ensure the minimization of personal information collection and do not collect personal information irrelevant to the purpose. We will only retain your personal information for the period necessary to achieve the purposes stated in this Statement, unless an extension of the retention period is required or permitted by law;
  2. We will use encryption technology to ensure the confidentiality of data transmission and storage. We will use trusted protection mechanisms to prevent malicious attacks on data and servers storing data;
  3. We will deploy access control mechanisms to ensure that only authorized personnel can access personal information; and according to business needs and personnel levels, control the number of authorized personnel and implement hierarchical permission management for authorized personnel; access to personal data will be logged, and regularly audited by administrators.
  4. We will strictly select business partners and service providers and implement requirements for personal information protection in business contracts, audits, assessments, and other activities.
  5. We will hold security and privacy protection training courses, tests, and publicity activities to enhance employees' awareness of the importance of protecting personal information.

In short, we will do our best to protect your personal information. However, no measure is impenetrable, and no product or service, website, data transmission, computer system, or network connection is absolutely secure.

To cope with possible risks such as personal information leakage, damage, and loss, we have formulated a number of systems and control measures, clarified the classification and grading standards for security incidents and vulnerabilities and corresponding processing procedures, and established special security notification and security early warning pages. We have also established a special emergency response team for security incidents. In accordance with the requirements of security incident disposal specifications, we activate security plans for different security incidents, stop losses, analyze, locate, formulate remedial measures, and collaborate with relevant departments to trace back and crack down.

If a personal information security incident unfortunately occurs, we will inform you in accordance with legal requirements: the basic situation of the security incident and possible impacts, the disposal measures we have taken or will take, suggestions for you to independently prevent and reduce risks, and remedial measures for you. We will inform you of the relevant situation of the incident by email, SMS, push notification, etc. If it is difficult to inform each personal information subject one by one, we will issue an announcement in a reasonable and effective manner. At the same time, we will report the disposal of personal information security incidents in accordance with the requirements of regulatory authorities.

V.  How You Can Manage Your Personal Information

  1. Access, rectification, deletion

In many countries or regions where we provide products and services, the legislation in some countries or regions stipulates that personal information subjects have the right to access, rectify, and delete relevant personal information retained by us. In the aforementioned countries or regions, personal information subjects or their agents can request us to access, rectify, and delete relevant personal information retained by us (hereinafter collectively referred to as "requests").

  1. Withdrawing consent

You can change the scope of your authorization for us to continue collecting personal information or withdraw your authorization by deleting information, turning off device functions, setting privacy in our terminal devices or Apps, etc. In our account-related services, you can also withdraw all authorizations for us to continue collecting your personal information through account-related services by canceling your account.

Please understand that each business function requires some basic personal information to be completed. When you withdraw your consent or authorization, we will not be able to continue to provide you with the services corresponding to the withdrawn consent or authorization, nor will we process your corresponding personal information. However, your decision to withdraw consent or authorization will not affect the personal information processing carried out based on your authorization before.

How to withdraw consent in specific services will be published by us in special privacy notices or supplementary statements.

VI. How We Handle Minors' Personal Information

Our personal and household devices are mainly for adults, but for minors using the devices and services, we are well aware of the importance of taking additional precautions to protect their privacy and security. We regard anyone under the age of 18 (or the age specified by local laws) as a minor.

For minors' personal information collected with the guardian's consent, we will only use or disclose it when permitted by law, explicitly agreed by the guardian, or necessary to protect the minor. If at any time the guardian needs to access, modify, or delete personal information related to the ward, please contact us in the manner described in "4. How we protect your personal information".

If we find that we have collected minors' personal information without first obtaining verifiable guardian consent, we will try to delete the relevant content as soon as possible.

VII. Third-Party Links and Their Services

Our applications and product services may contain links to third-party websites. Our products and services may also use or provide services from third parties, such as third-party Apps listed in our app market.

All links to third-party websites and services are provided only for the convenience of users. We have no control over such third parties, cannot provide any express or implied guarantees for the linked content, and such links are not considered as our recommendation or authorization of the linked content; we also cannot control the privacy or data protection policies of third parties, and such third parties are not bound by this Statement.

You need to independently judge your interaction with such links. Before submitting personal information to a third party, please read and refer to the privacy policies of these third parties, and we shall not be liable for this.

VIII. How Your Personal Information Is Transferred Globally

We provide services through global resources and servers. This means that your personal information may be transferred to other jurisdictions outside the country/region where you use our services, or accessed from these jurisdictions. Such jurisdictions may have different data protection laws or even no relevant laws. In such cases, we will ensure that your data is adequately and equally protected as required by all applicable laws and regulations. For example, we will request your consent to the cross-border transfer of personal information or implement security measures such as data anonymization before cross-border transfer.

Major changes referred to in this policy include, but are not limited to:

  1. Major changes in our service model. Such as the purpose of processing personal information, the type of personal information processed, the way of using personal information, etc.;
  2. Major changes in our ownership structure, organizational structure, etc. Such as changes in ownership caused by business adjustments, bankruptcy and mergers, etc.;
  3. Major changes in the main objects of personal information sharing, transfer, or public disclosure;
  4. Major changes in your rights in participating in personal information processing and the way of exercising them;
  5. Changes in the responsible department, contact information, and complaint channels for personal information security;
  6. When the personal information security impact assessment report indicates high risks.

IX. Providing You with Other Additional Services

To provide you with more convenient, high-quality, and personalized products and/or services and to strive to improve your experience, we will collect your device model, operating system, unique device identifier, operation log, MAC address, and application list information. We may collect and use your personal information in the following additional services provided to you. If you do not provide this information, it will not affect your use of basic services such as browsing, searching, and purchasing on our platform, but you may not be able to obtain the user experience brought by these additional services. These additional services include:

  1. Additional services based on the camera: You can use this function after enabling the camera permission. We access your camera to enable you to use the camera to take images and photos for users to directly shoot and upload videos and pictures to participate in UGC-related functions, display corresponding content on our platform, participate in authorized activities in specific scenarios, and other scenarios you clearly know.
  2. Additional services for accessing and uploading pictures/videos from the album (picture library/video library): You can use this function to upload your photos/pictures/videos and locally cached audio and video files after enabling the album permission, facilitating you to change avatars, post and share comments, save activity sharing QR codes, or prove the problems you encounter when communicating with customer service.
  3. Access to App installation list: If you share, you need to access the App installation list to determine whether clients such as WeChat/QQ have been installed.
  4. MAC address: To ensure the security of your account and usage, you need to authorize us to read the device identifier of your machine.
  5. Additional services related to voice technology based on the microphone: You can realize the audio recording function after enabling the microphone permission; please note that even if you have agreed to enable the microphone permission, we will only obtain voice information through the microphone when you actively click the microphone icon in the client or record audio.
  6. Storage permission: You can save user configuration information after enabling the storage permission.
  7. Acquire and monitor gyroscope sensors, photosensitive sensors and other equipment sensors: when viewing the video, the sensor information of the user's mobile phone will be used (only collecting sensor data without personal information) to identify the user's actions and provide the user with video rotation, video brightness adjustment and other functions.

You understand and agree that the above additional services may require you to enable the camera, album (picture library), microphone (voice), App installation list, and MAC address access permissions on your device to collect and use the information involved in these permissions. Please note that your enabling of any permission means that you authorize us to collect and use relevant personal information to provide you with the corresponding services. Once you disable any permission, it means that you cancel the authorization, and we will no longer continue to collect and use relevant personal information based on the corresponding permission, nor can we provide you with the services corresponding to that permission. However, your decision to disable the permission will not affect the information collection and use carried out based on your authorization before.

X. Image Push Encryption

To ensure the security and integrity of image data during transmission and storage, this image push service employs an encryption mechanism that complies with industry security standards. The specific encryption logic is as follows:

  1. Link Transmission Encryption Mechanism: Throughout the entire process of transmitting image data from the data source to the user client, a high-strength transmission encryption protocol is employed for real-time encryption. This effectively mitigates network security risks such as data eavesdropping, man-in-the-middle attacks, and data tampering.
  2. Object Encryption Storage Mechanism: After image data is uploaded to OSS, object-level encryption is automatically enabled to provide static encryption protection for stored image files. This mechanism is equipped with strict access authorization controls, fundamentally preventing storage security risks such as unauthorized access and data leaks, thereby ensuring the security of image data during the static storage phase.

The aforementioned encryption mode has covered the core security requirements for image push, complies with industry security standards for data transmission in the field of security surveillance, and can provide reliable security assurance for the image push process.

When using the image push service, users are unable to configure encryption keys on their own to implement additional encryption protection for the pushed image data. If users have higher requirements for data encryption levels or cannot accept the potential risks associated with the current encryption mode, it is recommended to carefully evaluate whether to use this service. Once users choose to use this service, it shall be deemed that they have fully understood, acknowledged, and voluntarily accepted the aforementioned arrangements and any potential risks involved.

XI. Third-party products and services

In order to ensure the realization and stable operation of the relevant functions of this APP, we may access software development kits (SDKs) provided by third parties to achieve related purposes. Different versions of third-party SDKs will be different. The third-party SDK connected to the APP.

The third-party Company Name

Product/Service

Purpose Of Usage

Scenes

Personal info/Permissions

How to share

Tencent Technology (Shenzhen) Co., Ltd.

WeChat third-party login SDK

You can log in to the app with your WeChat account

App login

https://support.weixin.qq.com/cgi-bin/mmsupportacctnodeweb-bin/pages/ONwPihxKd82RAkIJ

Background interface transfer

Google

Firebase

Push Notification

User gets Push Notification

Device identification code (IMEI, android_id, ssid, IDFA, OPENUDID, GUID, SIM card information, IMSI), MAC address, device platform, device manufacturer, device brand, device application installation list; network information and location Related information: network status and changes of the device, location related information, ssid, video, task list, Wifi information

Background interface transfer

XII. How to Contact Us

If you have any questions, comments, or suggestions regarding this statement or matters related to your personal information, please contact our Personal Information Protection Officer by sending an email to [tsrc@tvt.net.cn].
In general, we will review the relevant issues as soon as possible and provide a response within 15 working days.

Important note: Due to local legal and language differences, the local language version of the "Privacy Statement" may differ from this version. In case of any discrepancy, the local language version shall prevail.