Privacy Policy

Introduction

We are committed to protecting your personal information and privacy and maintaining your trust with us. This privacy policy is intended to clarify how we collect, use, share, store, and protect your personal information. Understanding these contents is essential for you to exercise your personal rights and protect your personal information. Please read through this policy carefully before using or accepting our products and/or services. If you disagree with any part of this policy, please discontinue the use of our products and/or services immediately. Your use of any of our products and/or services signifies your full understanding and agreement to all terms in this privacy policy.

This policy contains the following sections:
(1) Definition of personal information
(2) How we collect your information
(3) How we use your information
(4) Sharing of your information
(5) Information storage and protection
(6) Your rights
(7) Third-party services
(8) Privacy of minors
(9) Contact us
(10) Revisions to the privacy policy

(1) Definitions of personal information and non-personal information

The definition of personal information shall be defined by your local laws.

Non-personal information refers to data other than personal information that cannot be directly linked to any specific individual, such as occupation, language, zip code, area code, serial number, URL, and automatically recorded browse data, product and unique product identifier of your mobile device, video contents without personal information, country/region and time zone of the connected product, geographical location, identifier of mobile network operator, device software platform, and hardware information, etc.

(2) How we collect your information

(A)How we collect your personal information

  1. When you log in to or activate our products or services: When you create an account to use our product or service, or when you sign up for an account to access or view video online, we need you to provide your username, password, mobile phone number, and email address. The purposes of information collection: 1) The username, password, mobile phone number, email address, and verification code are collected for real-name registration required by relevant laws and regulations in various regions; 2) When you install and activate a product that is connected to our service and is bound with your account, we may request you to provide certain unique basic information of your product, such as product name, verification code and serial number. If you refuse to provide such information, you may not be able to use our product and/or service normally.
  2. When you log in to an app provided by us, we will collect the following information:
    Device type, username, number of devices, and device login mode; app usage time (when app is running in the foreground); number of live videos can be played simultaneously (collect multiple times and report the maximum value); mobile phone model, mobile phone system, system version information, and information about the network that the phone is connected to. The purpose is to verify your product and identity and provide precise service support. If you refuse to provide such information, you may not be able to use your product and/or service normally.
  3. Permission description
    When you use our app, we will need you to authorize us certain permissions in your mobile phone. If you refuse such permissions, you will be unable to use the relevant functions, but it will not affect your normal use of other functions of the app. For information about permissions that we ask for, refer to the table below. Please note that we ask for the permissions only when you use the relevant functions. You can turn off the permissions at any time in the system settings of your mobile phone. Once the permissions are turned off, we will stop collecting and using these permissions.
    Permission
    Application scenario
    Function
    ACCESS_FINE_LOCATION access precise location Add Wi-Fi device; Initialize JPush service Obtain Wi-Fi information to connect device to network; network connection request from Aurora server to ensure stable and continuous JPush service
    CAMERA camera Read QR code to add device, retrieve device password; face import function Use camera to read QR code to obtain device information to add device or retrieve password; import face information to device
    RECORD_AUDIO microphone Device audio intercom and doorbell intercom; access control device video call; set custom alarm sound Two-way audio between user and device; answer video call from access control devices; record custom alarm sound as an alarm-triggered action
    READ_EXTERNAL_STORAGE read external storage Read QR code to add device, retrieve device password; face import function Used to scan QR code in album to add device or import face information into device
    WRITE_EXTERNAL_STORAGE write to external storage Import snapshots or videos into system album Download snapshots or videos to system album
    ACCESS_NETWORK_STATE obtain network status When app is running Used to obtain network status information to improve video communication efficiency
    ACCESS_WIFI_STATE obtain Wi-Fi information When app is running Used to obtain network status information to improve video communication efficiency
    INTERNET connect to network When app is running For Internet connection using SIM card
    CHANGE_NETWORK_STATE edit network status When app is running Update device status after network changes
    CHANGE_WIFI_STATE change Wi-Fi status When app is running Update device status after network changes
    RECEIVE_BOOT_COMPLETED automatic startup at system boot When app is running Used for Android persistent connection
    SYSTEM_ALERT_WINDOW display on top of other apps When a dialog box opens Request for floating box permission to pop up a dialog box in the system
    READ_PHONE_STATE read mobile phone status and identity When using the push service User obtains mobile phone’s device feature code information
    DISABLE_KEYGUARD allow app to disable keyboard guard when it is not safe When on-screen keyboard is opened Allow app to disable keyboard lock
    WAKE_LOCK prevent mobile phone from going into sleep status When video is playing Used for video playing to prevent mobile phone screen from going to sleep
    FLASHLIGHT control flashlight When scanning QR code Control flashlight to scan QR code to connect smart device in low-light environment
    MODIFY_AUDIO_SETTINGS change audio settings Device audio intercom or doorbell intercom Used for audio settings when having two-way audio with device or doorbell
    BATTERY_STATS When app is running Used for data processing before shutdown due to low battery
    MOUNT_UNMOUNT_FILESYSTEMS When saving or reading video tutorial or configuration file Permission to read files in SD card
    C2D_MESSAGE When initializing the push service Used to receive notification messages
    RECEIVE_USER_PRESENT When initializing the push service Used to wake up the screen or unblock radio when receiving alarm notifications
    DOWNLOAD_WITHOUT_NOTIFICATION Download upgrade file, configuration file or tutorial video Used for file download
    USE_FULL_SCREEN_INTENT When initializing push service Full screen notification, click doorbell notification in background
    JPUSH_MESSAGE When initializing push service Used for the JPush message push service
    BLUETOOTH connect to Bluetooth device When app is running Used to connect to a paired Bluetooth device and achieve audio adaptation to the Bluetooth device
    BLUETOOTH_ADMIN discover and pair with Bluetooth device When app is running Used to discover and pair with Bluetooth devices and provide audio to the Bluetooth devices
    SENSOR_SERVICE light sensor When scanning QR code Used to prompt user to turn on flashlight when scanning QR code in low-light environment
    NOTIFICATION_SERVICE notification service When using notification service Used to display or clear notifications in the bar
    WINDOW_SERVICE window service When obtaining window size Used to fit the window size in the app screen
    INPUT_METHOD_SERVICE soft keyboard When using soft keyboard Used to display soft keyboard when entering mobile phone number, username, password, etc.
    POWER_SERVICE power status When local video is playing Used to wake up the screen when local video is playing
  4. Video information
    When you use our service to save video related contents, such as video clips, live video streams, images (user content), message notifications, etc., we will collect video images captured by your camera and push the video images to you so you can save the contents that you need. You can disable this function in your account settings. If you refuse to provide such information, you will not be able to save the contents you need.
  5. Message push
    When you use the message notification function, we need to collect the unique feature value of your client (such as the unique value generated based on your device's IMEI or UDID) and the language of your mobile phone. The purpose is to provide precise alarm message notification in the language you prefer.
    Such information is necessary for the function. If you refuse to provide such information, you will not be able to use the alarm subscription function, but it will not affect your normal use of other functions. You can choose to turn off the function and clear information about the unique feature value of your client.
  6. Device adding
    When you use device adding functions, we may need to collect the serial number, register code, password, model, and Wi-Fi information of your client, so as to connect your device to network and bind your device. Such information is necessary for the function. If you refuse to provide such information, you will not be able to add your device.
  7. Connecting device to cloud
    When you use our device connection service, to ensure your normal use of our service, we will collect information including the model, UDID, IP address, MAC address, software version, network connection method and type, latitude and longitude (if applicable), and operation records of your device. Such information is necessary for the service. If you refuse to provide such information, you may not be able to connect your device to cloud.
  8. Live view
    When you use the live view function, we will collect the serial number, IP address, port number, and video stream information of your device in order to provide you with live streams of your device. Such information is necessary for the function. If you refuse to provide such information, you will not be able to use the live view function, but it will not affect your normal use of other functions.
  9. Information that you provide proactively when using our service
    When you use analysis, comparison functions and alarm service based on user benchmark information (including face/human body recognition, license plate/vehicle recognition, fingerprint unlocking, if applicable to your device), you need to provide the benchmark information such as face images, license plate information, fingerprints into the system in advance. Such information is necessary for the service. If you refuse to provide such information, you will not be able to use the relevant analysis, comparison functions and alarm service, but it will not affect your normal use of other functions.
  10. Device sharing
    When you use the device sharing function, we need to collect certain information in order to implement the sharing, including the device serial number, your nickname, and the usernames with which you want to share the device. Such information is necessary for the function. If you refuse to provide such information, you will not be able to use the device sharing function, but it will not affect your normal use of other functions. The sharing function is active only when you use it; it is not permanently active.
  11. Device operation control
    When you use functions such as device operation control, we may need to collect your device serial number, device status, and operation behavior. This purpose is to modify device status and control device. Such information is necessary for the function. If you refuse to provide such information, you will not be able to modify device status and device configuration, but it will not affect your normal use of other functions.
  12. Customer service
    When you need our support and contact us through email or our customer support tools, we need to collect information including your name, email address, enterprise or organization, device usage, device serial number, and account. The purpose is to verify your product and identity and provide precise service support. If you refuse to provide such information, we will not be able to provide support services to you.
  13. In other possible scenarios, we will also collect your personal information, including but not limited to:
    1. In situations where you need to sign a certificate to authorize remote access, we will collect your manual signature or company seal.
    2. When you forget your device password and need to regenerate it, you can get a temporary password by scanning the QR code if you bind an email or mobile phone number.
    3. When you enter the test/exhibition area of our products, we may collect your images and/or videos, depending on the products being tested/exhibited. The images and videos will be deleted at the end of the test/exhibition; you can avoid collection of your images/videos by leaving the test/exhibition area.

(B) How we collect your non-personal information

  1. When you use our services to help us understand your usage behavior, improve our services, and provide after-sales support to you:
    In order to offer better user experience and prevent misoperation, we will collect industry-standard non-personal information. We may record adjustments that you make to your products through the services we provide, and we will store the collected non-personal information with the information directly collected by the product. If you have any concerns about the security and privacy settings of your mobile phone, please adjust the settings by referring to the documentation of your mobile service provider or mobile device manufacture.
  2. We may also use cookies, web beacons, pixel tags, and other technologies to record and store your settings, and collect some non-personal information such as log data and device data. In particular, the cookies we use allow us to associate your usage behavior with the account information we have stored or other information we have stored during your use of our services, which can help us to better diagnose and solve your problems, as well as to help us manage and improve our services and products, and thereby improving your experience with our services. You can refuse the collection of cookies by declining the use of cookies in your browser settings.
  3. When you use audio recording or media streaming functions of our product, we may record and transmit videos and/or audios from the product, with your permission. This may include taking snapshot images and attaching part of snapshot images and analysis data to email notifications.

(3) How we use your information

During the term of your account or while we are providing services to you, we may use your personal information for the following purposes to protect your legitimate interests and fulfill our obligations under our agreement with you:

  1. Respond to your inquiries;
  2. Evaluate your application for a position based on your information;
  3. Enhance the security of our website, such as user identity verification, security protection, fraud detection, archiving, and backup;
  4. Conduct audits, data analysis, and research for our internal purposes;
  5. Send email, with your permission, to notify you our latest products and services;
  6. Use non-essential cookies, with your permission, to better understand your behavior in order to improve user experience, enhance functionality, or provide better services.

(4) Sharing of your information

We share your personal information in the following situations:

  1. When our associated companies need to use your personal information to fulfill the purposes of this policy, we will share it with them.
  2. When we provide you with certain services, we need to share your personal information with authorized partners, carefully selected service providers, or national regulatory agencies, only for legal, justified, necessary, specific, and definitive purposes, and only share the information necessary for us to provide services. The organization that shares your personal information has no right to use the shared personal information for any other purposes irrelevant to our products or services. For companies, organizations, and individuals with whom we share personal information, we will sign strict data protection agreements with them, demanding them to process personal information as per our instructions, this privacy policy, and any other relevant confidentiality and security measures.
  3. You can share your videos, identity information, etc. with specific people, and share your videos, location information, identity information, etc. with unspecified people based on our products and/or services. We bear no legal liability for serious situations such as leakage of your information due to your sharing behavior.
  4. To comply with local laws and regulations, and to provide you with a better customer experience and service quality, we ensure that, information sharing, particularly when transmitting your personal information to countries outside the EU, will comply with the requirements of this privacy policy.
  5. Please understand, in accordance with applicable laws, we can disclose your personal information without your consent under the following circumstances:
    1. When it is directly related to criminal investigation, prosecution, trial, and verdict.
    2. When it is necessary to safeguard significant legitimate rights such as life, property of the personal information subject or other individuals but it is difficult to obtain your consent.
    3. When the personal information collected is disclosed to the public by yourself.
    4. When the personal information is collected from information that has been disclosed lawfully, such as from lawful news reports, government-disclosed information, etc.
    5. When it is necessary for signing a contract according to your requirements.
    6. When it is necessary for maintaining the safe and stable operation of the provided products or services, such as detecting and handling product or service failures.
    7. When required for academic research institutions conducting statistics or academic research based on public interest, and when providing academic research or descriptive results, the personal information included in the results is de-identified.
    8. When required by applicable laws and regulations and government orders of the country where the business is operated, as well as legal procedures of law enforcement agencies, regulatory agencies, and court of law, or other applicable legal procedures and subpoenas.

(5) Storage and protection of personal information

  1. Storage of personal information
    Unless otherwise explicitly permitted by law or by you, we will retain your personal information only for the length of time required for the purposes bound by this privacy policy. During the period that you use our products or receive our services, we will continuously keep your personal information for you. If you cancel your account or proactively delete your personal information, we will delete or anonymize your personal information within 48 hours after receiving your request, unless otherwise stated in law or agreement.
  2. Security protection of personal information
    1. We are committed to safeguarding your information security and have a dedicated team responsible for the research, development and application of a variety of security technologies and programs. We use data encryption and access control mechanisms to establish internal control systems to ensure only the authorized personnel can access your personal information, to publicize security and privacy protection requirements to the related personnel, and to publicize protection measures such as the information security protection system to all the staff. At the same time, we have been granted information security management system certification (ISO27001 international standard), and will regularly hire independent third-party organizations to evaluate our information security management system. Through these rigorous measures, we try our best to protect your information from unauthorized access, use and disclosure. However, please understand that in the Internet industry, due to the limits of current technologies and all kinds of possible malicious attack methods, even if we do everything that we can to strengthen our security measures, it is impossible to guarantee 100% security of information. Please be aware, the systems and communication networks that you use while using our products and/or services may encounter security issues due to factors that are beyond our control. Therefore, we strongly recommend that you take proactive measures to safeguard the security of your personal information, such as using complex passwords, changing your password regularly, and not disclosing your account passwords and related personal information to others.
    2. The security of your personal information also depends on your cooperation with us in security measures. We provide you with a username and password so you can access our products, websites or services, and you are responsible for the confidentiality of such information. We request that you do not share such information with anyone, and we will also regularly review the technologies that we use and the strategies used to implement information collection.
    3. We have established dedicated management systems, procedures and organizations to safeguard information security. We strictly limit the scope of people who have access to the information, demand their compliance with confidentiality obligations, and conduct audits regularly.
    4. In the event of a security incident such as personal information leakage, we will initiate an emergency plan to prevent the expansion of the security incident and promptly inform you in the form of push notifications, announcements, etc.

(6) Your rights

  1. Access your personal information. You can tap Me > My Profile photo to access the personal information you provided.
  2. Correct your personal information. You have the right to update your personal information at any time. You can also correct your personal information after finding the information collected and stored by us is incorrect. You can correct or change your username, password, mobile phone number or email address in My Profile by tapping Me > My Profile photo.
  3. Delete your personal information. You can delete the personal information online by yourself or contact us (see chapter 9) to delete it for you. We will delete or anonymize your personal information after the minimum retention period required by the applicable laws and regulations.
  4. Revoke authorization. You can disable permissions on your mobile phone as needed (including access to your location, phone, album, camera, microphone, and notification).
    After you withdraw consent or authorization, we may not be able to provide the related services, but it does not affect us handling your personal information based on your previous consent or authorization.
  5. Cancel your account. You can tap Me > Account & Security to cancel your account.
    After you cancel your account, unless otherwise provided by laws and regulations, we will stop providing services to you, keep your personal information for the length of time stated in this agreement, and then anonymize your personal information.
  6. If you cannot access, correct, delete your personal information, withdraw consent or cancel your account using the above ways, you can contact us (see chapter 9) for assistance. We will respond within 15 working days after verifying your identity. We reserve the right to decline requests that are unreasonably repetitive, require excessive technical efforts, pose risks to other’s legitimate rights, or are otherwise highly impractical.

(7) Third-party services

Our products and/or services may be connected to or linked to websites or other services provided by the third party. Including:

  1. You can use the Share button to share certain information with third-party services. This feature may collect your information (including your log information) to function properly.
  2. In order to achieve the purposes stated in this policy, we may connect SDK or other similar applications provided by third-party service providers, and share with them certain information about you that we collect in accordance with this policy, so as to provide better customer service and user experience. At present, the third-party service providers we connect include the following types:
    1. Used for notification push function, including the push function provided by mobile phone manufactures.
    2. Used for obtaining your device location, collecting device information and log information with your consent.
    3. Used for third-party authorization services to share relevant contents with third-party products, etc.
    4. Used for services related to account security, product reinforcement, including data encryption, data decryption, etc.

For information about third-party services that we are currently using, please refer to the table below.

  1. Android version
    Third-party SDK
    Description
    Bugly Function
    Collect program crash information
    Application scenario
    Collect application error information during runtime, and report to the backend for analyzing and improving the application.
    Sharing method
    SDK native collection
    Scope of collected personal information
    Mobile phone model, mobile phone brand, system version, manufacture system version, CPU architecture type, network type, process name and PID of the application currently running
    Privacy policy
    https://privacy.qq.com/document/preview/fc748b3d96224fdb825ea79e132c1a56
    Baidu Speech Synthesis Function
    Text-to-speech
    Application scenario
    Custom alarm sound for device
    Scope of collected personal information
    Network status, Wi-Fi status, permission to read/write external storage
    Privacy policy
    https://ai.baidu.com/ai-doc/REFERENCE/Jkdyl0v3v
  2. iOS version
    Third-party SDK
    Description
    Baidu Speech Synthesis Function
    Text-to-speech
    Application scenario
    Custom alarm sound for device
    Scope of collected personal information
    Network status, Wi-Fi status, permission to read/write external storage
    Privacy policy
    https://ai.baidu.com/ai-doc/REFERENCE/Jkdyl0v3v

    We will only share your information for legitimate, necessary, and specific purposes. For third-party service providers with whom we share information, we demand them to fulfill confidentiality obligations and take corresponding security measures.

    Such third-party services are operated by the relevant third party; your using their services or providing information to them are subject to the terms of service/or privacy protection statements of the corresponding third party (not this policy).

(8) Privacy of minors

We do not provide any of our services to minors under 18 years of age (or equivalent minimum age set by the relevant jurisdiction). If we find any account associated with or registered by a minor under 18 years of age (or equivalent minimum age set by the relevant jurisdiction), we will immediately delete the relevant account information. If we find that we have collected personal information of minors without prior verifiable parental consent, we will try to delete the relevant data as soon as possible.

If you are the parent or guardian of a minor under the age of 18 (or equivalent minimum age set by the relevant jurisdiction), and you believe that your minor has disclosed her/his personal information to us, please contact us immediately using the contact information of our local company. Parents or guardians of minors who are under 18 years of age (or equivalent minimum age set by the relevant jurisdiction) can check and ask us delete the minor's personal information and prohibit us from using it. In cases where we collect personal information of minors with the consent of the parents/guardians, we will only use or publicly disclose the information when permitted by law, expressly allowed by the parents or guardians, or when necessary to protect the minors.

(9) Contact us

If you have any questions about our privacy policy, please contact our technical support via the email appdebug@163.com.

(10) Revisions to privacy policy

Last updated on 1st July, 2024.

This privacy policy is subject to revisions from time to time, and such revisions shall constitute a part of this privacy policy. When the terms of this policy are changed, we will show you the changed policy in the form of push notifications and pop-up windows when you log in and upgrade the version. Please note that we will collect, use and store your personal information according to the updated policy only after you tap the Agree button in the pop-up window.