XAG Privacy Policy

 

 

Updated Date6/24/2024

Effective Date6/24/2024

 

Introduction

Guangzhou XAG Technology Co., LTD. (hereinafter referred to as "we" or "XAG", including its subsidiaries, affiliates, etc.) is a limited liability company established pursuant to the laws of the People's Republic of China. We take the privacy and personal information protection of our users (hereinafter referred to as "you") very seriously. When you use our products/services, we may collect, use, store and share your information. We wish to use our Privacy Policy (the "Privacy Policy") to explain to you how we collect, store, use or share your relevant information, and how we provide you with access to, update, control and protect your relevant information.

 

The Privacy Policy will help you understand the following:

1、How do we collect and use your Personal Information

2、How do we share, transfer and publicly disclose your personal information

3、How do we use cookies and similar technologies

4、How do we protect and store your personal information

5、Children and Personal Data

6、Users' rights

7、How is your personal information transferred globally

8、How to update this policy

9、How to contact us

 

Please read carefully before using our product/service and make sure you have fully understand the whole content of this privacy policy, To use or to continue using our products/services after we update this privacy policy will be seen as you agree to this privacy policy, and agree in accordance with this privacy policy we collect, use, save and share your information.

. How do we collect and use your Personal Information

1.1 Circumstances under which you authorize us to collect and use your personal information

We are committed to creating a variety of products and services to meet your needs. Due to the variety of products and services we provide to you and the specific range of products/services selected by different users, basic/additional functions and the types and scope of personal information collected and used may vary accordingly. Please refer to the specific product/service functions.

1.1.1 When you register your XAG account, we will collect your mobile phone number, login password and SMS verification code, so that the system can quickly identify and verify your identity and protect the security of your XAG account during your subsequent use of the software and services. Such information is collected to meet the requirements of relevant laws and regulations on Internet real-name system. If you do not provide such information, you will not be able to use our services normally. After you complete your account registration, you can also choose whether to provide us with your nickname, profile picture and other information to further improve your account, so that you can show your account to other users in the product and facilitate collaboration and interaction with other users.

1.1.2 If your country related laws and regulations (UAV) hardware products use aspects, such as real-name authentication rules, when you for real-name authentication operation, we will collect the information such as your name, id number, to collect the information to help you complete reality real-name authentication, to determine whether or not you have legal control related hardware products. Names and ID numbers are sensitive information, and such information is collected to comply with real-name requirements for drones and other products stipulated in relevant laws and regulations. If you do not provide this information, you will not be able to use our services.

1.1.3 When you authenticate with your real name through face recognition, we will collect your facial recognition feature information. Facial recognition information is sensitive information, which is collected to help you complete real-name authentication more conveniently and quickly. Such information may be submitted to relevant third parties for data analysis, comparison and processing. If you refuse to provide this information, you cannot use face recognition for real-name authentication, but you cannot use other functions to complete real-name authentication.

1.1.4 When you pass the manual verification for real-name authentication, we will collect your ID card photo and the photo information of the person holding the ID card. The photo of your ID card and the photo of a person holding your ID card are sensitive information. Such information is collected to help you submit the information required for your real-name authentication. If you refuse to provide this information, you cannot manually verify the real-name authentication function, but you cannot use other functions to complete the real-name authentication.

1.1.5 When you use map-related functions such as task creation, task browsing and task execution, we will collect and record your geographical location information after obtaining your consent of independent choice, in order to ensure the security of hardware products and provide you with location display and comparison services. This information is sensitive information. If you do not provide such information, you will not be able to use our services normally.

1.1.6 When you purchase a product, use a paid service, or apply for a return or refund, We may collect and record your phone number, name, payment account information (including but not limited to, bank accounts, pay treasure to account, WeChat accounts, etc.), trade goods/services letter, order information and payment records, address, telephone records of the receiving information, such as contact and communication, and other financial information, etc. Such information is sensitive information, and such information is collected for The purpose of Completing orders and providing relevant after-sale services, including customer support, order delivery, invoice printing, etc., by XAG and relevant third-party service providers. If you do not provide this information, you may not be able to order products from us, apply for returns or refunds, or use the paid services.

1.1.7 If you want to participate in lucky draw or competitions, to oneself or business partner, we organize promotional activities and marketing activities, fill out the questionnaire, to participate in our oneself or business partners host user BBS or blog, you may need to provide us with your name, phone number, email address, address, bank account and the payment account information, So that we can contact you and issue your reward.

1.1.8 We may require you to provide and collect your personal information when providing after-sales service and customer support to you, The software running equipment information, such as IMEI use hardware product information, purchase records, pay records, system operation records & photos, your name, phone number, email address, address, logging, and extremely fly technology to connect the communication records, etc., and may be for you with our customer service calls for the recording. We use this information to diagnose product problems, repair customers' hardware products, and contact customer service personnel to help you solve problems or provide customer care services. We may also collect your email address or mobile phone number to respond to your questions or comments on Contact us or Feedback. If you refuse to provide the relevant information, XAG may not be able to help you resolve the relevant issues.

1.1.9 In order to know you in using our service, promotion or marketing activities to participate in our organization, users BBS or blog, or use of after-sales service and customer support and listen to your feedback, we may also by you in the scene to provide cell phone number, email address and other contact information to contact you, for user research and visit.

1.1.10 During your use of the software and services, in order to ensure your normal use of our services, maintain the normal operation of our services, improve and optimize our service experience and protect the security of your account, We will collect your device model, operating system, the only device identifier (such as IMEI/Android ID/IDFA/OpenUDID/GUID/SIM card IMSI information, etc.), hardware serial number, MAC Landing address, IP address, operating system and application version and type, language Settings, resolution, methods, types and status of access networks, network quality data, equipment (such as gravity sensing devices), accelerator operating logs, service log information (such as you operate in the software, search, review records of operation, service information such as fault information), such as log Information. We collect this information to verify your identity, analyze the efficiency of our business operations, review transactions, and prevent fraud. Such information is the basic information that must be collected to provide services.

1.1.11 When you file a complaint, appeal or consult with XAG, we may require you to provide your name, mobile phone number, email, QQ number or Wechat account for the convenience of contacting you or helping you solve the problem. If you refuse to provide the above information, we may not be able to respond to complaints, appeals or inquiries in a timely manner.

1.2 Circumstances in which you must authorize us to obtain permission for your device

1.2.1 We will ask for your permission before requesting any permission to invoke it. We will only open relevant permissions after your authorization.

1.2.2, Please note that you open the permissions that represent your authorization which we can collect and use personal information to implement specific functions, you close the permissions represents you cancelled the authorization, then we will no longer continue to collect and use your personal information, these also is unable to provide you with the above and the authorization of the function. Your decision to turn off your permission will not affect the processing of your personal information based on your authorization.

1.2.3 During your use of the Software and services, the following system permissions related to personal information will be applied to you:

1.2.3.1 Storage Rights (For Android Devices)

· purpose:

1. It is used to cache all data such as account information, hardware product information, task data, achievement data, map data, picture and video data during the use of the software and services to help you improve the efficiency and fluency of information display and reduce network traffic consumption.

2. It is used to read pictures from the device album when you upload pictures by setting the profile picture and other functions.

3. For you to take the initiative to store the results, pictures, videos and other files in the device for other purposes.

· Timing:

Obtained when the user starts the software for the first time

· Impact of the shutdown:

The core functions of the software must be authorized, closed after the use of the software and services.

1.2.3.2 Locating Permissions

· purpose:

1. During the process of adding and binding hardware products, ensure the security of hardware products.

2. During the use of map function for task creation, browsing, execution and other related modules, display the user's current location and judge the relevant location relationship.

3. Match local laws, regulations and requirements of uav and other hardware products according to your location.

· Timing:

Obtained when the user starts the software for the first time.

· Impact of the shutdown:

The core functions of the software must be authorized, closed after the use of the software and services.

1.2.3.3 Call Rights/Device Information (For Android Devices)

· purpose:

1. To ensure the security of your account, obtain your device information, carrier network information and other information.

2. In order to maintain the normal operation of our services, statistically analyze the information related to product operation, improve and optimize our service experience.

· Timing:

Obtained when the user starts the software for the first time.

· Impact of the shutdown:

The core functions of the software must be authorized, closed after the use of the software and services.

1.2.3.4 Camera/Camera/Album Permissions:

· purpose:

1. It is used to take pictures by camera/album when you upload your profile picture.

2, used for real-name authentication process, through the camera to obtain id card photo, ID card camera recognition or face recognition to obtain facial feature information.

· Timing:

Obtain this parameter when the user enters the above function page for the first time.

· Impact of the shutdown:

It can be turned off. Functions and services cannot be used after this function is disabled.

1.2.3.5 Bluetooth Permissions

purpose:

1. Used to retrieve nearby Bluetooth devices through Bluetooth in scenarios such as adding devices.

2. To establish a communication connection with the device through a Bluetooth sharing network while connecting to the device.

Timing

Obtain this permission when the user first enters the above functional interface.

    Impact of the shutdown:

It can be turned off. Functions and services cannot be used after this function is disabled.

1.2.4 You can view, enable, or disable the above sensitive permissions through the "Settings" path of your device. The paths and methods for viewing or performing operations may vary depending on the device or system version. For details, see device and system developer instructions.

1.2.5 In addition to the above necessary permissions for the software, you can independently choose whether to grant additional system permissions to the software. If you do not authorize it, we will not be able to provide the corresponding business functions.

1.3 How do we use your Personal Information

1.3.1 We will use the personal information collected in accordance with this Privacy Policy to the extent necessary to realize the functions of our products and/or services.

1.3.2 After collecting your personal information, we may anonymize part of the data by technical means, and the subject of the anonymized information will not be identified. Please understand and agree that we have the right to use the anonymized information in this case; On the premise of not disclosing your personal information, we have the right to analyze the user database and make commercial use of it.

1.3.3 Please note that all personal information provided by you when using our products and/or services will continue to be authorized to be used by us during your use of our products and/or services unless you delete, withdraw your consent through system Settings or contact us. When you cancel your account, we will stop using and delete your personal information.

1.3.4 We will collect statistics on the usage of our products and/or services and may share such statistics with the public or third parties to show the overall usage trend of our products and/or services. But these statistics do not contain any identifying information about you.

1.3.5 When we display your personal information, we will desensitize your information by means of content replacement and de-labeling to protect your information security.

1.3.6 You fully understand that we do not need your consent to collect and use personal Information under the following circumstances:

(1) those related to national security and national defense security;

(2) those related to public security, public health or major public interests;

(3) those related to criminal investigation, prosecution, trial and execution of judgment;

(4) For the purpose of safeguarding the life, property and other important legal rights and interests of the subject of personal information or other individuals, but it is difficult to obtain the consent of the subject;

(5) The collected personal information is disclosed to the public by the subject of personal information;

(6) Collect your personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels;

(7) necessary for signing the contract according to your requirements;

(8) Necessary to maintain the safe and stable operation of the provided products and/or services, such as finding and disposing of faults of the products and/or services;

(9) necessary for legitimate news reporting;

(10) When academic research institutions carry out statistical or academic research necessary for the public interest, and provide the results of academic research or description externally, they de-label the personal information contained in the results;

1.4 Circumstances in which we obtain your Personal Information from a third party

Under certain legal circumstances, we may obtain your personal information from third parties after you voluntarily authorize it. For example, with your authorization, we may obtain your Wechat Pay account number and transaction records from Wechat. This information will only be used by the user during the display of order details, payment related queries or financial verification of order related, and will not be used for other purposes.

1.5 Non-personal information

We may also collect other information that cannot be identified to a specific individual (that is, information that is not personal information), such as statistical data generated when you use a specific service, such as device-related information, function module click, push display or click. The purpose of collecting such information is to improve the services we provide to you. The type and amount of information collected depends on how you use our products and/or services.

For the purposes of this Privacy Policy, statistical data is considered non-personal information. If we use non-personal Information in combination with personal Information, such information will be treated as personal information for the duration of such combination.

 

. How do we share, transfer and publicly disclose your personal information

2.1 Share

In principle, we will not share your personal information with any third party other than XAG except in the following cases:

2.1.1 With your consent;

2.1.2 Only by sharing your information can we achieve the core functions of our products/services or provide the services you need;

2.1.3 To deal with disputes for you in case of your needs;

2.1.4 Within the scope permitted by laws and regulations, if it is necessary to protect us, our affiliates or partners, you or other users or the public interests, property or safety from damage and reasonable rights protection;

2.1.5 Provided in accordance with relevant agreements signed by you (including online agreements and corresponding platform rules) or other legal documents;

2.1.6 Where required by applicable laws, regulations, legal procedures, or mandatory administrative or judicial requirements, including but not limited to: 1) disclosure to judicial or law enforcement agencies for the purpose of investigation and prevention of crime in the event of suspected criminal activity; 2) disclosure as required by law (or court); 3) Disclosure according to the mandatory requirements of the government; 4) To protect the assets (such as the settlement of overdue accounts), etc. In such cases, we will record the content, time, reason and object of the information disclosure.

2.1.7 We may share your personal Information with our affiliates. However, we will only share necessary personal information for the purposes stated in this Privacy Policy. If our Affiliate wishes to change the purpose of processing personal information, it will seek your authorization again.

2.1.8 We will share your order information, account information and other information with partners and other third parties for the purpose of providing services to you, but we will only share your personal information for legal, legitimate, necessary, specific and clear purposes, and only the personal information necessary for providing services. Our partners are not entitled to use the shared personal information for any other purpose.

2.1.9 For statistical analysis purposes, our products may integrate third-party SDKS or other similar applications. For your information security, we have signed a strict data security confidentiality agreement with the third-party SDK service provider, and these companies will strictly comply with our data privacy and security requirements. We will not share your personally identifiable information with you without your consent. To better understand the types and uses of the data collected by the third-party SDK and protect your personal information, you can learn about the specific permissions and corresponding privacy policies from below information. We understand and respect your right to opt out. If you do not want to participate in big data calculation, you can also exercise your opt-out right by using the link between the third-party SDK partner and the sharing information description.

In order to provide you with more professional and secure core business functions and additional business functions, our products will be connected to third-party plug-in products(SDK:

Sobot AI SDK

To provide you with customer service IM services, we integrate wisdom tooth technology SDK. In the process of using IM related module functions of customer service, wisdom tooth TECHNOLOGY SDK needs to collect device and system information (including device identifier, Android ID, Operating system type, system version, App package name, App version, device type, device manufacturer, device model, screen size, network type), network identity information (IP address), user nickname, mobile phone number information, etc.

Sobot AI Personal Information and Privacy Protection Policy:

https://www.zhichi.com/clause.html

JPush SDK 

In order to provide you with relevant services of message push in the process of using customer service IM function, we integrate aurora push SDK. In the process of receiving messages using the CUSTOMER service IM function, aurora push SDK requires you to open device location permission and collect device location information, device parameters and system information, device identifier, network information, APP application list and active status information, etc.

JPush Personal Information and Privacy Protection Policy:

https://www.jiguang.cn/license/privacy

Aliyun SDK

In order to provide you with cloud storage services for job log data during the use of this App and services, we have integrated Aliyun SDK. When using this App and services, Aliyun SDK needs to obtain device information (such as operating system version) and log information.

Aliyun Personal Information and Privacy Protection Policy:

https://terms.aliyun.com/legal-agreement/terms/suit_bu1_ali_cloud/suit_bu1_ali_cloud202107091605_49213.html?spm=5176.7933691.J_9220772140.23.41422c47JQU2nW

Volcengine SDK

In order to provide you with cloud storage services for software operation logs during the use of this App and services, we have integrated the Volcengine SDK.In the process of using this App and services, the Volcengine SDK needs to collect your device information, including the device hardware model, operating system type and operating system version number, network device hardware address (MAC), IP address, software version number, etc.

Volcengine Personal Information and Privacy Protection Policy:

https://www.volcengine.com/docs/6256/64902

Mapbox SDK

In order to provide you with map and location function services during the use of this App and services, we have integrated the Mapbox SDK. In the process of using this App and services, the Mapbox SDK needs to obtain the geographic location information and network log information of the device.

Mapbox Personal Information and Privacy Protection Policy:

https://www.mapbox.com/legal/privacy

Umeng SDK

In order to provide you with better operational services in the process of using this App and services, we have integrated Umeng SDK. In the process of using this App and services, Umeng SDK needs to obtain equipment information, location information, and network information.

Umeng Personal Information and Privacy Protection Policy:

https://www.umeng.com/page/policy

2.2 Transfer

In principle, we will not transfer your personal information to any company, organization or individual except in the following cases:

2.2.1 Obtain your express consent or authorization in advance;

2.2.2 In accordance with applicable laws and regulations, legal process requirements, mandatory administrative or judicial requirements necessary to provide;

2.2.3 Provided in accordance with relevant agreements signed by you (including online agreements and corresponding platform rules) or other legal documents;

2.2.4 In the case of merger, acquisition, asset transfer or similar transaction, if the transfer of personal information is involved, we will require the new company or organization that holds your personal information to continue to be bound by this Privacy Policy; otherwise, we will require the company or organization to seek authorization from you again.

3. Public disclosure

We will only publicly disclose your personal information under the following circumstances and in accordance with industry standard security measures:

3.1 To disclose the personal information specified by you in the manner expressly agreed by you according to your needs;

3.2 We may publicly disclose your personal Information in accordance with the required type of personal information and the way of disclosure when it is required by laws, regulations, mandatory administrative enforcement or judicial requirements. We carefully review all requests to ensure they are valid.

 How do we use cookies and similar technologies

3.1 Use of Cookies

To make your access experience easier, we will send one or more small data files named Cookies on your computer or mobile device. The Cookies assigned to you are unique and can only be read by the Web server in the domain that publishes Cookies to you. We send Cookies to you to simplify the steps of your repeated login, store your preferences or your browsing history and other data so as to provide you with preference Settings, help judge your login status and account or data security.

We do not use Cookies for any purpose other than those stated in this Privacy Policy. You can manage or delete Cookies according to your preference. You can clear all Cookies saved on your computer. Most Web browsers automatically accept Cookies, but you can usually modify your browser Settings to reject Cookies as you see fit. In addition, you can also clear all Cookies saved in the software. However, if you do so, you may need to personally change the user Settings each time you visit XX App, and your previously recorded information will be deleted, which may affect the security of the services you use.

3.2 Use of Web Beacon and similar technologies

In addition to cookies, we also use web beacons and other similar technologies on our sites. Our web pages often contain electronic images (called "single-pixel" XAG or "web beacons"). We use Web Beacon in the following ways:

(1) By using network Beacon on XX App, calculate the number of users' access, and identify the registered XAG users through access cookies.

(2) Provide personalized services for you through the cookies information obtained.

IV. How do we protect your personal information

4.1 We have used industry-standard security measures to protect your personal information from unauthorized access, public disclosure, use, modification, damage or loss of data. We will take all reasonably practicable steps to protect your personal information. For example, the exchange of data (such as id information) between your browser and the Service is protected by SSL encryption; We will use encryption to ensure the confidentiality of data; We will use trusted protection mechanisms to protect our data from malicious attacks; We have a dedicated department for personal information protection; We will deploy access control mechanisms to ensure that only authorized personnel have access to personal information; And we will conduct security and privacy protection training courses to enhance staff's awareness of the importance of protecting personal information.

4.2 We will take all reasonably practicable measures to ensure that no irrelevant personal information is collected. We will only retain your personal information for as long as necessary to achieve the purpose stated in our cost policy, unless the retention period is extended or permitted by law.

4.3 The Internet is not an absolutely secure environment, and we strongly advise you not to send personal information through email, instant messaging and communication shared with other XAG users without encryption. Please use a complex password to help us keep your account secure.

4.4 The Internet environment is not 100% secure and we will do our best to ensure or guarantee the security of any information you send us. If our physical, technical or management protection facilities are damaged, resulting in unauthorized access, public disclosure, tampering or destruction of information, which results in damage to your legitimate rights and interests, we will bear the corresponding legal liabilities.

4.5 After the unfortunate occurrence of personal information security incidents, we will promptly inform you in accordance with the requirements of laws and regulations: we will take a reasonable and effective way to release the announcement.

At the same time, we will also take the initiative to report the disposal of personal information security incidents in accordance with the requirements of regulatory authorities.

. Children and Personal Data

XAG understands the importance of safeguarding the personal data of children, which we consider to be  an individual under the age of 13 or the equivalent age as specified by law in your jurisdiction.

Due to the particularity of our products, we do not allow minors to register as users of XAG and operate and use our products/services. If you are a minor under the age of 18, you must obtain the prior written consent of your guardian before using our products and/or services. We will protect the personal information of minors in accordance with relevant national laws and regulations, but we will not be responsible for any consequences caused by minors' use of our products/services (whether with or without the consent of a guardian).

If we learn that a child’s personal data was collected without appropriate authorization, it will be deleted as soon as possible.

 

Userright

1. To access and correct your personal information, provided that you ensure that the personal information you have corrected is true and effective;

2. If you would like to access or verify information about you, as well as to view our disclosure records, please contact our account managers or dealers. If we are unable to provide the relevant information in certain circumstances, we will promptly inform you of the reason;

3. Delete your personal information

You can contact our online customer service directly or clear or delete your personal information to our email.

You may request the removal of personal information to us in the following circumstances:

(1) If our handling of personal information violates laws and regulations;

(2) If we collect or use your personal Information without your consent;

(3) If our handling of personal information violates our agreement with you;

(4) If we terminate the service and operation.

If we decide to respond to your deletion request, we will also notify the entities that receive your personal information from us and require them to delete it in a timely manner, unless otherwise required by law or regulation, or unless such entities have been independently authorized by you. When you delete information from our services, we may not immediately delete the corresponding information from the backup system, but will delete such information when backup updates.

4. If you do not want us to share your information with our members, please let us know. In this case, we may not be able to provide you with specific products or services due to the lack of information.

5. In certain circumstances, you have the right to choose to refuse to provide us with certain information, but we may therefore be unable to provide you with certain products, services or information. To protect the interests of both parties, for example, to ensure that your request is complied with and to prove that we have provided you with the required information, we may monitor your phone calls or emails with XAG to ensure the quality of our services.

6. Log out

You can contact our customer service to cancel your XAG account. After you cancel your account, we will stop providing products and/or services to you, and in accordance with your request, we will delete your personal information or anonymize your information, and no longer use any technology except as otherwise provided by laws and regulations.

After the cancellation of this account, you will be deemed to have abandoned the following interests:

(1) Account information, purchase record, user rights and interests, virtual assets

(2) User card number, verification mobile phone or email login to XAG and related services

(3) Remove the authorization or binding relationship with the third party

You understand and accept that we are unable to assist you to restore the service, will give you log-out your account after activist bring inconvenience, please before operation, ensure that your account does not have any dispute, and to all relevant information and data backup account, download and save the good order of goods and services trade documents, bills, such as electronic invoice etc.

Please note: If you use the same account to register multiple XAG apps, the cancellation of one of the apps will cause other XAG apps to be unavailable. Caution This operation cannot be restored after the log-out.

VI.How is your personal information transferred globally

In principle, personal information collected and generated by us in the People's Republic of China will be stored in the People's Republic of China.

As we provide products or services through resources and servers spread around the world, this means that your personal information may be transferred to, or accessed from, foreign jurisdictions in the countries/territories where you use the products or services. We will conduct safety assessment in accordance with laws and regulations before transferring.

Such jurisdictions may have different data protection laws, or even none at all. In such cases, we will ensure that your personal information is adequately and equally protected within the People's Republic of China.

VII. How to update this policy

 

Our privacy policy is subject to change. We will post any changes to this policy on this page. We also provide more prominent notice of major changes.

 

Material changes referred to in this Policy include, but are not limited to:

 

(1) Major changes have taken place in our service model. For example, the purpose of personal information processing, the type of personal information processing, the use of personal information, etc.

 

(2) The main object of personal information sharing, transfer or public disclosure changes;

 

(3) Your rights to participate in the processing of personal information and the way to exercise them change significantly;

 

If you continue to use the Service after this policy update takes effect, you indicate that you have fully read, understand and accept the updated policy and are willing to be bound by the updated policy.

VIII. How to Contact us

If you have complaints and reports about personal information security, or have any questions about the personal information processing practices described in this Privacy Policy, please contact us through the following contact information:

E-mail: support@xa.com Telephone: 400-980-3131

Normally, we will respond to your questions, comments or suggestions within 15 working days of receiving them and verifying your user identity.

If you are not satisfied with our response, especially if our personal information processing behavior has harmed your legitimate rights and interests, you can also complain or report to the Internet information, telecommunications, public security, industry and commerce and other regulatory authorities.

Guangzhou XAG Technology Co., LTD