Privacy Policy
Publisher: SUNGO Energy Technology(Jiangsu)Co.,Ltd.
Date of update: October 31, 2023
Effective date: October 31, 2023
Reminder Terms
Sungo Cloud App (hereinafter referred to as "App") is well aware of the importance of personal information to you, your trust is very important to us, and we will protect your personal information and privacy by laws and regulations and concerning industry best practices. We have formulated the "Privacy Policy" of this App and especially remind you that we hope that you will carefully read and understand this Privacy Policy before using the relevant services, to make an appropriate choice.
This Privacy Policy will help you understand that we will collect and use your information by the Privacy Policy, but will not collect personal information in a blanket bundle manner solely because you agree to this Privacy Policy. When you use or enable relevant functions or use services, we will collect and use relevant information as necessary to realize the functions and services. Unless it is necessary for the realization of business functions or by the requirements of laws and regulations, you can refuse to provide other functions or services. We will explain each item of the information we collect in our Privacy Policy.
When you use our products or services, we need to comply with the relevant requirements of laws and regulations Collect, store, use and share your information. As well as to provide you with services and improve the quality of services, we hope to explain to you through this policy: When you use our products or services, what data we collect, why we collect this data, what we do with this data, and how we protect this data. This policy is closely related to the products or services you use and is essential for you to exercise your user rights and protect your user information, Please carefully read and fully understand the content of this policy before using our products or services
We have reminded you in bold about the important content of the terms and interests of your personal information, please pay special attention.
1. How We Collect and Use Personal Information
2.How we use cookies and similar technologies
3.Third parties involved in the use of data and transfer and disclosure of personal information
4.How We Store Personal Information
5.How We Protect the Security of Personal Information
6.How we manage personal information information
7. Protection of information of minors
8.Privacy Policy Updates and Notices
9.Contact Details
1.How We Collect and Use Personal Information
We will collect the information you voluntarily provide when using the service as follows, and collect the information generated in the process of using the function or receiving the service through automated means:
1.1 Sign up, Login
When you register and log in to the app, you can pass an Email account Create an app account and password, which is collected to help you complete your registration
When you access the App, you need to log in to use the Overview, Power Station, Work Ticket, Support, My, and other app functions
The information collected and used for the realization of business functions is as follows: email account, nickname, password, and email verification code. For example, when you register an account, Sungo Cloud will send a verification code to your email, which you need to verify through the verification code.
1.2 Password Recovery
You can retrieve your password through the recovery function, to protect the security of your account when retrieving the password, we need you to enter the verification code received by email for authentication.
1.3 Information presentation
1.3.1 Log information for information presentation includes:
Location information: When you authorize the system to turn on the location function of your mobile device and use the location-based services, we will collect and use your location information to search for devices connected to nearby for you.
Log information: When you use the products/services we provide, we will collect your search, click, share, and other information and store it as relevant weblogs, including your IP address, the language used, operating system version, date, and time of access, network requests, etc.
1.3.2 Data analysis
We will de-identify the information collected and used above, and the data analysis only corresponds to a specific code that cannot be directly linked to your identity, and will not be associated with your real identity.
1.4 User feedback and service
Customer service and questions: To facilitate contact with you, help you solve problems as soon as possible, or record the solution and results of related problems, we may save you and our Communication/call logs and related content (including account information, feedback information, other information you provide to prove the relevant facts, or contact information you have left), if you make inquiries, complaints or provide suggestions for specific orders, we will use your account information and order information. To facilitate the use of customer service or feedback functions by non-logged-in users, we may associate the above information with your device information and can view it after logging in.
Questionnaires: To provide services and improve the quality of services, we may also use your other information, including the relevant information you provide when you contact customer service, and the questionnaire response information you send us when you participate in questionnaires; If you do not wish to, you may also refuse to participate in the survey.
1.5 Operations & Safety
Operation and safety assurance: We are committed to providing you with safe and trusted products and usage environments, and providing high-quality and reliable services and information is our core goal. We collect to maintain the proper functioning of our services and to protect the legitimate interests of you or other users or the public from loss of Information necessary to maintain the safe and stable operation of products or services.
Use of device information and log information: To ensure the safe operation of software and services, the quality and efficiency of operation, we will collect your device Hardware model, operating system version number, device identifier (Android such as IMEI, AndroidID, OAID, IMSI, ICCID, MEID, iOS, such as IDFV, IDFA; Different identifiers will vary in terms of the validity period, whether they can be reset by the user, and how they are obtained), Bluetooth, software version number, network access method, type, status, network quality data, operation, use, service logs. We may associate your device information or email account with your App Account.
1.6 Change of purpose of collection and use of personal information
Please understand that as our business develops, the functions and services provided by the App may be adjusted and changed. In principle, when a new function or service is related to a function or service currently provided by us, the personal information collected and used will be directly or reasonably related to the original purpose of processing. In scenarios that are not directly or reasonably related to the original processing purpose, we will collect and use your personal information, and we will inform you again of the requirements of laws, regulations and national standards in the form of page prompts, interactive processes, and agreement confirmation, and obtain your consent.
1.7 Device permission invocation
To ensure the normal implementation of relevant business functions, we need to call the necessary permissions according to the specific usage scenario and ask you in a pop-up window before calling.
Location permissions: Some third-party functional components used in our products will request location information to help users locate the power station when creating a power station. You have the right to choose whether or not to agree, and if you do not agree, you will not be able to use location services.
Camera permission: When you use the functions of creating power station, work order, feedback, etc., if you need to take photos and upload data of the power station, work order attachments, feedback content, etc., to ensure that you can use the photo function normally, you will apply for photo permission. You have the right to choose whether or not to agree, if you do not agree, you will not be able to use the photo service.
Album permissions: When you use the functions of creating power stations, work orders, feedback, etc., to be able to send photos that are already on your phone, you need to obtain album permissions. You have the right to choose whether to agree or not, if you do not agree, you will not be able to open the album and upload the existing photos directly.
Read and write mobile phone storage permission: When using the save application cache function and image upload service within our products, we may apply for reading and write external storage permission. You have the right to choose whether to agree or not, if you do not agree, you will not be able to use the image upload service.
Bluetooth permission: When you use the App to connect the collector device, you need to allow Bluetooth to configure the collector's network operation. You have the right to choose whether to agree, if you do not agree, you will not be able to use the Bluetooth function, and the App will not be able to complete the network configuration operation related to the collector.
Data permissions: When you use the registration and login, change or retrieve password, you need to let the app connect to the network through Wi-Fi or cellular data. You have the right to choose whether to agree, if you do not agree, you will not be able to use the above functions, and the App will not be able to upload or download functions involving network data.
You can choose to turn off some or all permissions in the device's settings, which may cause the corresponding business function to not be implemented or not achieve the expected effect.
2.How we use cookies and similar technologies
Similar technologies such as cookies and device information identification are commonly used technologies on the Internet. When you use the App and related services, we may use relevant technologies to send one or more cookies or anonymous identifiers to your device to collect, identify and store information when you visit and use this product. We promise not to use cookies for any purpose other than those described in this Privacy Policy. We use cookies and similar technologies primarily to achieve the following functions or services:
2.1 Ensure the safe and efficient operation of products and services
We might Set up authentication and security cookies or anonymous identifiers to confirm that you are securely logged in to the Services or have been subject to theft, fraud, and other nefarious activity. These technologies also help us improve the efficiency of our services, and increase the speed of login and responsiveness.
2.2 Helps you get an easier access experience
Using such technologies can help you eliminate the need to fill in personal information repeatedly.
2.3 Removal of cookies
Most browsers offer users the ability to clear their browser cache data, You can perform the corresponding data-clearing operation in the browser settings function. If you make clearances, you may not be able to use the services or corresponding functions provided by the Company that relies on cookies because of these modifications.
3.Third parties involved in the use of data and transfer and disclosure of personal information
3.1 Partners involved in the use of data
3.1.1 Principle
Principle of legality: Where data use activities are involved in cooperation with partners, they must have a legitimate purpose and comply with the legal basis. If the partner's use of information is no longer by the principle of legality, it should no longer use your personal information or use it after obtaining the corresponding legal basis.
Principle of justification and minimum necessity: The use of data must have a legitimate purpose and should be limited to what is necessary to achieve the purpose.
Security prudence principle: We will carefully assess the purpose of the use of information by our partners, conduct a comprehensive assessment of the security capabilities of these partners, and require them to comply with the legal agreements of cooperation. We will conduct strict security monitoring of software tool development kits (SDKs) and application program interfaces (APIs) obtained by partners to protect data security.
3.1.2 Delegated processing
Some specific modules or functions in this business function are provided by external vendors. For example, we engage service providers to assist us in providing customer support.
For companies, organizations, and individuals entrusted with the processing of personal information, we will sign strict confidentiality agreements with them, requiring them to process personal information by our requirements, this privacy policy, and any other relevant confidentiality and security measures.
3.1.3 Share
We will not share your personal information with any company, organization, or individual outside the company unless we have obtained your explicit consent.
Unless otherwise required by laws, regulations, and regulatory authorities, we will only share your information with third parties in the context of security and analytics statistics. If it is necessary to share your information with a third party to provide you with services, we will evaluate the legality, legitimacy, and necessity of the third party's collection of information. We will require third parties to take protective measures for your information and strictly comply with relevant laws, regulations, and regulatory requirements.
We may share your personal information externally by laws and regulations, or by the mandatory requirements of government authorities.
3.1.4 Scope of partners
If specific functions and scenarios involve services provided by our affiliates or third parties, the scope of partners includes our affiliates and third parties.
3.1.5 Implement security and analyze statistics to provide information
Ensure safe use: We take account, service, and content security very seriously. To protect the security of your accounts and the property of other users, so that you and our legitimate rights and interests are protected from illegal infringement, Our partners may use necessary devices, account numbers, and log information.
Analysis of products: To analyze the use and performance of our products, Our partners may need to use information such as product usage (crashes, crashes), device identification information, and overall app install usage.
3.2 Transfer
We will not transfer your personal information to any company, organization, or individual, except in the following circumstances:
Transfer with explicit consent: With your explicit consent, we will transfer your personal information to other parties
In the event of a merger, acquisition, or bankruptcy liquidation, if the transfer of personal information is involved, we will require the new company or organization holding your personal information to continue to be bound by this Privacy Policy, otherwise, we will require the company or organization to seek your authorization and consent again.
3.3 Public
We will not disclose your personal information unless we comply with national laws and regulations or obtain your consent. We disclose your personal information and will adopt safety protection measures that comply with industry standards.
4.How We Store Personal Information
4.1 Storage location
Bylaws and regulations, we store your personal information collected and generated in the course of domestic operations in the territory of the People's Republic of China. If we transfer overseas, we will strictly abide by the relevant laws and regulatory policies of China and will comply with relevant national regulations or seek your consent.
4.2 Storage Period
We are only to Retain your personal information for as long as necessary for the purpose of providing the App and Services, For example:
Email account: When you register and log in with your email account, we need to keep your email account continuously to provide you with normal services, respond to possible inquiries and customer complaints, and protect the security of your account and system
We will retain the information you post for as long as you do not recall, delete or close your account
If you cancel your account, voluntarily delete personal information, or exceed the necessary period, we will treat your information deletion or anonymization , However, the following exceptions apply:
Comply with laws and regulations regarding information retention requirements
It is necessary to reasonably extend the time limit for financial, auditing, dispute resolution, etc. purposes
5. How we protect the security of personal information
5.1 We take the security of your personal information very seriously
We will endeavor to take reasonable security measures (both technical and administrative) to protect your personal information from improper use or unauthorized access, public disclosure, use, modification, damage, loss, or leakage of the personal information you provide.
5.2 We will use safety technologies that are no less than industry usage
As Encryption technology, anonymization and related reasonable and feasible means Protect your personal information and use security protection mechanisms to prevent malicious attacks on your personal information.
5.3 We will establish a special security department, security management system, and data security process to ensure the security of your personal information
We take Strict data use and access policies, Ensure that only authorized personnel have access to your personal information, and conduct timely security audits of data and technology.
5.4 This is even though the above reasonable and effective measures have been taken and the standards required by the relevant legal provisions have been complied with
However, please understand that due to technical limitations and possible malicious means, in the Internet industry, even if we try our best to strengthen security measures, it is impossible to always ensure 100% security of information, and we will try our best to ensure the security of the personal information you provide to us.
5.5 You acknowledge and understand that the system and communication network you use to access our services may have problems due to factors beyond our control
Therefore, we strongly recommend you Take proactive measures to protect the security of personal information, including but not limited to using complex passwords, changing passwords regularly, and not disclosing your account password and related personal information to others.
5.6 We will formulate an emergency response plan and immediately activate the emergency plan when a user information security incident occurs
Efforts are being made to prevent the impact and consequences of these security incidents from spreading. Once a user information security incident (leakage or loss) occurs, we will promptly inform you of the basic situation and possible impact of the security incident by the requirements of laws and regulations, the disposal measures we have taken or will take, the suggestions you can independently prevent and reduce risks, and the remedial measures for you. We will promptly inform you of the relevant circumstances of the incident in push notifications, emails, letters, text messages, and related forms, and when it is difficult to inform them one by one, we will issue announcements reasonably and effectively. At the same time, we will also report the handling of user information security incidents to the requirements of relevant regulatory authorities.
6.How We Manage Personal Information
We take your management of personal information very seriously and do our best fully protect the rights related to accessing, copying, correcting, supplementing, deleting, withdrawing consent and authorization, canceling accounts, and making complaints and reports about your personal information,so that you can protect your privacy and information security. To optimize your experience, we may also adjust the operation settings, so the following guidelines are for reference only.
6.1 You can check and correct personal information through the App, in "My → Account"
Check your identity information, including name, email address, password, etc
If you find that your name is wrong, simply click the name option to modify it. If you want to change the password, you need to click on the password selection and enter the old password and the new password you want to replace to complete the change
6.2 Manage your authorization scopes
If you want to change the authorization scope, you can modify authorization scope through the mobile permission settings. For example, you can turn off recognition permissions such as geolocation services, cameras (cameras), and storage in the device's operating system, change the scope of consent, or withdraw your authorization. When authorization is turned off, we will no longer collect information related to these permissions.
Specific business functions and services will require your information to be completed, and when you withdraw your consent or authorization, we cannot continue to provide you with the functions and services corresponding to the withdrawal of consent or authorization, and no longer process your corresponding personal information. However, your decision to withdraw your consent or authorization will not affect the company's previous processing of personal information based on your authorization.
6.3 In the following cases, you can request us to delete your personal information
The purpose of the processing has been achieved, cannot be achieved, or is no longer necessary to achieve the purpose of the processing
We cease to provide products or services, or the retention period has expired
Withdrawal of consent by the individual
If our processing of personal information violates laws, administrative regulations, or agreements with you
Other circumstances provided for by laws and administrative regulations
Deletion of personal information: refers to the act of removing personal information from the system involved in the realization of daily business functions, so that it remains unsearchable or accessible. When you or we assist you in deleting the relevant information, Due to applicable laws and security technology limitations, we may not be able to immediately delete the corresponding information from our backup systems, and we will securely store your personal information and restrict any further processing of it until the backup can be erased or anonymized.
6.4 Notwithstanding the above agreement, by relevant laws and regulations and national standards, we may not be able to respond to your request in the following circumstances:
Directly related to national security and national defense security
Directly related to public safety, public health, and major public interests
Directly related to the criminal investigation, prosecution, trial, and execution of judgments
There is sufficient evidence that you have subjective malice or abuse of rights
Responding to your request will cause serious damage to the legitimate rights and interests of other individuals and organizations
Involving trade secrets
7. Protection of information of minors
7.1 Principles for the protection of minors' personal information
We attach great importance to the protection of minors' personal information. The app is primarily aimed at adults. if If you are a minor under the age of 18, you should read and agree to this Privacy Policy under the supervision and guidance of your parents or other guardians before using this product. If you are the guardian of a minor under the age of 16, you should read and agree to this Privacy Policy for your ward before using the App and related services.
7.2 We protect the personal information of minors by relevant national laws and regulations
Collect, use or disclose minors' personal information only when permitted by law, with the explicit consent of parents or other guardians, or as necessary to protect minors; If we find that the personal information of minors has been collected without the prior consent of a verifiable guardian, we will try to delete the relevant information as soon as possible.
7.3 If you are the guardian of a minor
When you have other questions about the minor's personal information under your guardianship, please contact us through the contact information published in this privacy policy.
8. Privacy Policy Updates and Notices
8.1 To provide you with better services, the App and related services will be updated and changed from time to time
We will revise this Privacy Policy from time to time, and these amendments form part of this Privacy Policy and have the effect of being equivalent to this Privacy Policy, and we will not reduce your rights under this Privacy Policy in force without your express consent.
8.2 When this Privacy Policy is updated, we will post an updated version in the App
Before the updated Terms take effect Remind you of the updated content through official website announcements or other appropriate means so that you can keep abreast of the latest version of this Privacy Policy.
9. Contact Details
9.1 The app is provided by SUNGO Energy Technology(Jiangsu)Co.,Ltd.
If you have complaints, suggestions, or questions about personal information protection, you can send your questions to (sales@sungoess.com), We will verify and verify your user identity and respond to your complaints and reports within 15 days.