Privacy Policy

Updated Date: November 1, 2023
Effective Date: November 11, 2023

Introduction

This software is a photovoltaic power station monitoring and maintenance product. To explain how this software collects, uses, and stores your personal information and what rights you have, we will elaborate on these matters through this guide, with key points as follows:

It should be particularly noted that obtaining a specific sensitive permission does not mean that we will necessarily collect your relevant information. Even if we have obtained sensitive permissions, we will only collect your relevant information within the necessary scope and in accordance with this guide when you use the related services or functions.
If you would like to know more detailed information, please read the corresponding sections according to the index below:

1. Information We Collect and Use

During the process of using our software services, we collect and use the information you actively provide or generate while using the services in the following ways:

1.1 When you register for our software service, we collect and use your name, phone number, or email address. These details are necessary to help you complete the registration process and protect the security of your account. Without this information, you may not be able to use our services fully. You may also choose to provide additional information such as a username based on your needs.

1.2 To ensure you can use our services properly, maintain the normal operation of our services, improve and optimize your service experience, and protect your account security, we collect and use information such as your device model, operating system, unique device identifier (e.g., AndroidID/OAID/MEID/BSSID for Android devices, IDFA for iOS devices prior to iOS 14.5), login IP address, MAC address, software version number, network connection method, type, and status, network quality data, accelerometer, gravity sensor, operation logs, and service log information (such as records of your searches and views, service fault information, and referral URLs). Additionally, to prevent viruses, malware, or other malicious programs and websites, we may collect information about the applications installed on your device, running processes, or data stored in device memory to prevent the leakage of your personal information.

1.3 When you use the monitoring feature, to provide you with complete monitoring data, we need to collect the serial numbers of the data collectors under the power station and their sub-devices (such as inverters, electricity meters, etc.). Our monitoring system will collect uploaded data from the data collectors and their sub-devices every 5 minutes to complete necessary data statistics and analysis. We also collect telemetry data, including device serial numbers, device status, and alarm codes, to help manufacturers diagnose faults and provide support and services to quickly resolve issues.

1.4 When you create a power station, you need to input information such as the power station name, region, installed capacity, address, and GPS location. This information will be uploaded and stored on our servers so that you can use it when logging in to the software from other devices. You can also modify this information at any time. During the device networking process, the device will store the account and password used for managing the device as credentials for your management. The account and password are stored only on the device, with the password encrypted in an irreversible manner.

1.5 When you contact our customer service, we may need you to provide necessary personal information for identity verification to ensure the security of your account. To address your concerns, after obtaining your authorization, customer service personnel may need to query or verify your relevant information within the authorized scope. We will take technical and management measures to ensure the security and confidentiality of your information and use it within the necessary scope. We may also save your contact details (phone number, WeChat ID, QQ number, or other contact information you use or provide), communication records, and content, as well as other necessary information, to provide and record customer service.

1.6 In accordance with relevant laws, regulations, and national standards, there are certain circumstances in which we may process your personal information without obtaining your explicit consent:
a) When it is necessary for the performance of legal duties or obligations by the personal information processor.
b) When it is necessary for the conclusion or performance of a contract to which you are a party.
c) When it is necessary to respond to a public health emergency or to protect the life, health, and property safety of individuals in an emergency situation.
d) When processing personal information that you have disclosed publicly or that has been legally disclosed by others within a reasonable scope.
e) Other circumstances stipulated by laws and administrative regulations.

1.7 To ensure the security of our services and better understand the operation of our applications, we may record relevant information, such as the frequency of your application usage, crash data, overall usage, performance data, and the source of the application. We will not merge the information stored in our analytics software with any personal identification information you provide in the application.

1.8 If we use your personal information beyond the scope of your original authorization or beyond a direct or reasonable association, we will inform you again and obtain your explicit consent before using your personal information.

1.9 Please note that currently, our software does not proactively obtain your personal information from third parties outside our company. If, in the future, we need to indirectly obtain your personal information from third parties for business development, we will inform you in advance of the source, type, and scope of use of your personal information. If the personal information processing activities we conduct for our business exceed the scope of your original consent when you provided the information to the third party, we will obtain your explicit consent before processing your personal information. Additionally, we will strictly comply with relevant laws and regulations and require third parties to ensure the legality of the information they provide.

1.10 To ensure the normal and efficient operation of our website or mobile application, we store small data files called Cookies on your web browser or mobile application. The content of Cookies can only be retrieved or read by the server that created them. Each Cookie is unique to your web browser or mobile application. Using Cookies can help you avoid the hassle of repeatedly filling out personal information, search content, and steps and processes (e.g., form filling, search history). You can manage or delete Cookies according to your preferences. Most browsers and mobile operating systems provide users with the functionality to clear cached data, which you can perform in the browser settings or mobile operating system settings. However, you may not be able to fully experience some of our convenient and secure service features.

1.11 Please understand that the functions and services we provide are constantly being updated and developed. If a particular function or service has not been explained in the above description regarding the handling rules for collecting and using your information, we will inform you of the scope, purpose, and method of information collection through page prompts, interaction processes, website announcements, or other means to obtain your consent.

2. Information Storage

2.1 Location of Information Storage

We will store user personal information collected within the country in China, in accordance with legal and regulatory requirements. If your personal information is to be transferred from within China to an overseas location, we will strictly follow the legal provisions.

2.2 Duration of Information Storage

Generally, we will retain your personal information only for the period necessary to achieve the intended purpose and in accordance with the retention periods stipulated by laws and regulations. For example:

Phone Number or Email**: If you need to use our software services, we need to keep your phone number or email address (including the initial registration phone number, bound phone number, initial registration email, bound email, etc.) to ensure you can use the service normally. After you deactivate your software account, we will legally delete the corresponding information.

Power Station Information**: When you create power station information, we need to save it to ensure you can use the monitoring function normally. When you delete your power station information, we will delete the corresponding information.

If our products or services cease operations, we will notify you via push notifications, announcements, or other forms, and delete your personal information or anonymize it within a reasonable time frame. ("Anonymization" in this guide refers to the technical processing of personal information so that the subject of the personal information cannot be identified, and the processed information cannot be restored. Information obtained after anonymization is not considered personal information.)

3. Information Security

We strive to provide security for user information to prevent loss, misuse, alteration, unauthorized access, or disclosure of information.

We will use various security measures within a reasonable level of security to protect the information. For example, we will use encryption techniques (such as SSL), de-identification, and anonymization to protect your personal information.

We continuously enhance the security capabilities of the software installed on your device to prevent the leakage of your personal information. For example, we perform partial information encryption on your device to ensure secure transmission; to prevent viruses, malware, or other malicious programs and websites, we may check the applications installed on your device, running processes, or data stored in device memory; to prevent fraud, account theft, impersonation, and other illegal activities, and to conduct security checks, we may analyze unique device identifiers, login IP addresses, operation logs, location information, and other data to take security measures or provide security alerts.

We have established specific management systems, operating procedures, and organizations to ensure information security. For example, we strictly limit the scope of personnel who can access the information, require them to comply with confidentiality obligations, and conduct audits. In addition, our company will also set up an independent body, primarily composed of external members, to oversee our personal information protection practices.

If a personal information leak or other security incidents occur, we will initiate emergency response plans and remedial measures to prevent the incident from escalating and fulfill the relevant reporting and notification obligations in accordance with the law.

We will do our best to protect your personal information. We also ask for your understanding that no security measures can be completely foolproof.

4. Information Sharing

4.1 To ensure proper after-sales service for equipment, manufacturers and their distributors can view your power stations through functions such as the equipment library and product features. The specific operation is to click "View Associated System" in the device list of the equipment library or product. We will authorize the power station to the equipment manufacturer and its distributors with read-only permissions. You can also view the authorized manufacturers and distributors in the "Authorization Information" section of the power station details. If you do not want these merchants to see your power station, you can delete them in the "Authorization Information" section of the power station details. If you do not want manufacturers and their distributors to view your power station by clicking "View Associated System," you can enable "Power Station Authorization Restriction" in the "Power Station Settings" section of the power station details. This will prevent manufacturers and their distributors from viewing your power station unless you grant explicit authorization.

4.2 To ensure the implementation of certain independent functions and to allow you to enjoy more services and features, we may embed third-party SDKs in our application. We will carefully assess the purposes of these SDKs. For more information on the purposes, methods, and scope of personal information processing by these SDKs, please refer to the Third-Party Information Sharing List.

As our business continues to evolve, we may undergo mergers, acquisitions, or other transactions. If such transactions involve the transfer of personal information, we will inform you of the relevant circumstances and continue to protect your personal information in accordance with laws and regulations and at a standard no lower than that required by this guide.

5. Your Rights

During your use of this software, to enable you to conveniently review, copy, correct, and delete your personal information, and to ensure your right to withdraw consent for personal information processing and to deactivate your account, we have provided corresponding operational settings in our product design. You can follow the guidance below to perform these operations. Additionally, we have established channels for complaints, reports, and requests for explanations, and your opinions and requests will be handled promptly.

Please note that there may be differences in operational settings between different operating systems and versions of this software. Moreover, to optimize your user experience, we may also adjust the operational settings. Therefore, the following guidance is for reference only. If you have any questions about the methods and channels for exercising these rights, you can contact us through the means disclosed in Article 8 of this rule.

5.1 Reviewing Personal Information

5.1.1 Reviewing Basic Information such as Avatar and Nickname:

1)Enter the software and click on "Me".

5.1.2 Reviewing Email and Username:

1)Enter the software and click on "Me".

5.2 Deleting Personal Information

5.2.1 Deleting Power Station:

1)Enter the software and open your power station list, click on the "..." icon at the top right corner.
2)Click on "Delete Power Station".

5.3 Correcting Personal Information

5.3.1 Changing Avatar:

1)Enter the software and click on "Me".
2)Click on "Personal Settings".
3)Click on "Change Avatar Icon".
4)Perform the correction operation.

5.3.2 Changing User Avatar and Password:

1)Enter the software and click on "Me".
2)Click on "Personal Settings".
3)Click on "Change Password" or "Change Avatar Icon".
4)Perform the correction operation.

5.4 Account Deactivation

5.4.1 Deactivating This Software Account:

1)Enter the software and click on "Me".
2)Click on "Deactivate Account".
Note: After you deactivate your account, we will retain your relevant information in accordance with the "Cybersecurity Law of the People's Republic of China" and other laws and regulations. After the necessary retention period has expired, we will delete or anonymize your personal information.

5.5 Complaints and Reports

1)Enter the software and click on "Me".
2)Click on "About Us".
3)Click on "Contact Us".
3)Click on "Copy Email Button".
4)Send us an email through the email address.

6. Changes

We may revise this guide from time to time. When there are significant changes to the terms of this guide, we will display the revised guide to you in the form of push notifications, pop-ups, or other forms that meet legal requirements when you log in and update the version.

7. Other

Under certain specific services or functions of this software, we may also inform you of the purposes, methods, or scope of personal information processing through interactive text, product interfaces, or pop-ups. If the content of such additional notifications is inconsistent with this guide, the content of the additional notifications shall prevail.

8. Contact Us

We have established a dedicated personal information protection team and a personal information protection officer. If you have any questions or complaints or suggestions regarding this privacy policy or personal information protection, please contact our customer service. We will review the issues involved as soon as possible and respond to your complaints and feedback within fifteen days of receipt.