Privacy Policy

Publisher: SUNGO Energy Technology(Jiangsu)Co.,Ltd.

Date of update: October 31, 2023

Effective date: October 31, 2023

Reminder Terms

Sungo Cloud App (hereinafter referred to as "App") is well aware of the importance of personal information to you, your trust is very important to us, and we will protect your personal information and privacy by laws and regulations and concerning industry best practices. We have formulated the "Privacy Policy" of this App and especially remind you that we hope that you will carefully read and understand this Privacy Policy before using the relevant services, to make an appropriate choice.

This Privacy Policy will help you understand that we will collect and use your information by the Privacy Policy, but will not collect personal information in a blanket bundle manner solely because you agree to this Privacy Policy. When you use or enable relevant functions or use services, we will collect and use relevant information as necessary to realize the functions and services. Unless it is necessary for the realization of business functions or by the requirements of laws and regulations, you can refuse to provide other functions or services. We will explain each item of the information we collect in our Privacy Policy.

When you use our products or services, we need to comply with the relevant requirements of laws and regulations Collect, store, use and share your information. As well as to provide you with services and improve the quality of services, we hope to explain to you through this policy: When you use our products or services, what data we collect, why we collect this data, what we do with this data, and how we protect this data. This policy is closely related to the products or services you use and is essential for you to exercise your user rights and protect your user information, Please carefully read and fully understand the content of this policy before using our products or services

We have reminded you in bold about the important content of the terms and interests of your personal information, please pay special attention.

1. How We Collect and Use Personal Information

2.How we use cookies and similar technologies

3.Third parties involved in the use of data and transfer and disclosure of personal information

4.How We Store Personal Information

5.How We Protect the Security of Personal Information

6.How we manage personal information information

7. Protection of information of minors

8.Privacy Policy Updates and Notices

9.Contact Details

1.How We Collect and Use Personal Information

We will collect the information you voluntarily provide when using the service as follows, and collect the information generated in the process of using the function or receiving the service through automated means:

1.1 Sign up, Login

When you register and log in to the app, you can pass an Email account Create an app account and password, which is collected to help you complete your registration

When you access the App, you need to log in to use the Overview, Power Station, Work Ticket, Support, My, and other app functions

The information collected and used for the realization of business functions is as follows: email account, nickname, password, and email verification code. For example, when you register an account, Sungo Cloud will send a verification code to your email, which you need to verify through the verification code.

1.2 Password Recovery

You can retrieve your password through the recovery function, to protect the security of your account when retrieving the password, we need you to enter the verification code received by email for authentication.

1.3 Information presentation

1.3.1 Log information for information presentation includes:

Location information: When you authorize the system to turn on the location function of your mobile device and use the location-based services, we will collect and use your location information to search for devices connected to nearby for you.

Log information: When you use the products/services we provide, we will collect your search, click, share, and other information and store it as relevant weblogs, including your IP address, the language used, operating system version, date, and time of access, network requests, etc.

1.3.2 Data analysis

We will de-identify the information collected and used above, and the data analysis only corresponds to a specific code that cannot be directly linked to your identity, and will not be associated with your real identity.

1.4 User feedback and service

Customer service and questions: To facilitate contact with you, help you solve problems as soon as possible, or record the solution and results of related problems, we may save you and our Communication/call logs and related content (including account information, feedback information, other information you provide to prove the relevant facts, or contact information you have left), if you make inquiries, complaints or provide suggestions for specific orders, we will use your account information and order information. To facilitate the use of customer service or feedback functions by non-logged-in users, we may associate the above information with your device information and can view it after logging in.

Questionnaires: To provide services and improve the quality of services, we may also use your other information, including the relevant information you provide when you contact customer service, and the questionnaire response information you send us when you participate in questionnaires; If you do not wish to, you may also refuse to participate in the survey.

1.5 Operations & Safety

Operation and safety assurance: We are committed to providing you with safe and trusted products and usage environments, and providing high-quality and reliable services and information is our core goal. We collect to maintain the proper functioning of our services and to protect the legitimate interests of you or other users or the public from loss of Information necessary to maintain the safe and stable operation of products or services.

Use of device information and log information: To ensure the safe operation of software and services, the quality and efficiency of operation, we will collect your device Hardware model, operating system version number, device identifier (Android such as IMEI, AndroidID, OAID, IMSI, ICCID, MEID, iOS, such as IDFV, IDFA; Different identifiers will vary in terms of the validity period, whether they can be reset by the user, and how they are obtained), Bluetooth, software version number, network access method, type, status, network quality data, operation, use, service logs. We may associate your device information or email account with your App Account.

1.6 Change of purpose of collection and use of personal information

Please understand that as our business develops, the functions and services provided by the App may be adjusted and changed. In principle, when a new function or service is related to a function or service currently provided by us, the personal information collected and used will be directly or reasonably related to the original purpose of processing. In scenarios that are not directly or reasonably related to the original processing purpose, we will collect and use your personal information, and we will inform you again of the requirements of laws, regulations and national standards in the form of page prompts, interactive processes, and agreement confirmation, and obtain your consent.

1.7 Device permission invocation

To ensure the normal implementation of relevant business functions, we need to call the necessary permissions according to the specific usage scenario and ask you in a pop-up window before calling.

Location permissions: Some third-party functional components used in our products will request location information to help users locate the power station when creating a power station. You have the right to choose whether or not to agree, and if you do not agree, you will not be able to use location services.

Camera permission: When you use the functions of creating power station, work order, feedback, etc., if you need to take photos and upload data of the power station, work order attachments, feedback content, etc., to ensure that you can use the photo function normally, you will apply for photo permission. You have the right to choose whether or not to agree, if you do not agree, you will not be able to use the photo service.

Album permissions: When you use the functions of creating power stations, work orders, feedback, etc., to be able to send photos that are already on your phone, you need to obtain album permissions. You have the right to choose whether to agree or not, if you do not agree, you will not be able to open the album and upload the existing photos directly.

Read and write mobile phone storage permission: When using the save application cache function and image upload service within our products, we may apply for reading and write external storage permission. You have the right to choose whether to agree or not, if you do not agree, you will not be able to use the image upload service.

Bluetooth permission: When you use the App to connect the collector device, you need to allow Bluetooth to configure the collector's network operation. You have the right to choose whether to agree, if you do not agree, you will not be able to use the Bluetooth function, and the App will not be able to complete the network configuration operation related to the collector.

Data permissions: When you use the registration and login, change or retrieve password, you need to let the app connect to the network through Wi-Fi or cellular data. You have the right to choose whether to agree, if you do not agree, you will not be able to use the above functions, and the App will not be able to upload or download functions involving network data.

You can choose to turn off some or all permissions in the device's settings, which may cause the corresponding business function to not be implemented or not achieve the expected effect.

2.How we use cookies and similar technologies

Similar technologies such as cookies and device information identification are commonly used technologies on the Internet. When you use the App and related services, we may use relevant technologies to send one or more cookies or anonymous identifiers to your device to collect, identify and store information when you visit and use this product. We promise not to use cookies for any purpose other than those described in this Privacy Policy. We use cookies and similar technologies primarily to achieve the following functions or services:

2.1 Ensure the safe and efficient operation of products and services

We might Set up authentication and security cookies or anonymous identifiers to confirm that you are securely logged in to the Services or have been subject to theft, fraud, and other nefarious activity. These technologies also help us improve the efficiency of our services, and increase the speed of login and responsiveness.

2.2 Helps you get an easier access experience

Using such technologies can help you eliminate the need to fill in personal information repeatedly.

2.3 Removal of cookies

Most browsers offer users the ability to clear their browser cache data, You can perform the corresponding data-clearing operation in the browser settings function. If you make clearances, you may not be able to use the services or corresponding functions provided by the Company that relies on cookies because of these modifications.

3.Third parties involved in the use of data and transfer and disclosure of personal information

3.1 Partners involved in the use of data

3.1.1 Principle

  • Principle of legality: Where data use activities are involved in cooperation with partners, they must have a legitimate purpose and comply with the legal basis. If the partner's use of information is no longer by the principle of legality, it should no longer use your personal information or use it after obtaining the corresponding legal basis.

  • Principle of justification and minimum necessity: The use of data must have a legitimate purpose and should be limited to what is necessary to achieve the purpose.

  • Security prudence principle: We will carefully assess the purpose of the use of information by our partners, conduct a comprehensive assessment of the security capabilities of these partners, and require them to comply with the legal agreements of cooperation. We will conduct strict security monitoring of software tool development kits (SDKs) and application program interfaces (APIs) obtained by partners to protect data security.

    3.1.2 Delegated processing

    Some specific modules or functions in this business function are provided by external vendors. For example, we engage service providers to assist us in providing customer support.

    For companies, organizations, and individuals entrusted with the processing of personal information, we will sign strict confidentiality agreements with them, requiring them to process personal information by our requirements, this privacy policy, and any other relevant confidentiality and security measures.

    3.1.3 Share

    We will not share your personal information with any company, organization, or individual outside the company unless we have obtained your explicit consent.

    Unless otherwise required by laws, regulations, and regulatory authorities, we will only share your information with third parties in the context of security and analytics statistics. If it is necessary to share your information with a third party to provide you with services, we will evaluate the legality, legitimacy, and necessity of the third party's collection of information. We will require third parties to take protective measures for your information and strictly comply with relevant laws, regulations, and regulatory requirements.

    We may share your personal information externally by laws and regulations, or by the mandatory requirements of government authorities.

    3.1.4 Scope of partners

    If specific functions and scenarios involve services provided by our affiliates or third parties, the scope of partners includes our affiliates and third parties.

    3.1.5 Implement security and analyze statistics to provide information

    Ensure safe use: We take account, service, and content security very seriously. To protect the security of your accounts and the property of other users, so that you and our legitimate rights and interests are protected from illegal infringement, Our partners may use necessary devices, account numbers, and log information.

    Analysis of products: To analyze the use and performance of our products, Our partners may need to use information such as product usage (crashes, crashes), device identification information, and overall app install usage.

    3.2 Transfer

    We will not transfer your personal information to any company, organization, or individual, except in the following circumstances:

    Transfer with explicit consent: With your explicit consent, we will transfer your personal information to other parties

    In the event of a merger, acquisition, or bankruptcy liquidation, if the transfer of personal information is involved, we will require the new company or organization holding your personal information to continue to be bound by this Privacy Policy, otherwise, we will require the company or organization to seek your authorization and consent again.

    3.3 Public

    We will not disclose your personal information unless we comply with national laws and regulations or obtain your consent. We disclose your personal information and will adopt safety protection measures that comply with industry standards.

    4.How We Store Personal Information

    4.1 Storage location

    Bylaws and regulations, we store your personal information collected and generated in the course of domestic operations in the territory of the People's Republic of China. If we transfer overseas, we will strictly abide by the relevant laws and regulatory policies of China and will comply with relevant national regulations or seek your consent.

    4.2 Storage Period

    We are only to Retain your personal information for as long as necessary for the purpose of providing the App and Services, For example:

    Email account: When you register and log in with your email account, we need to keep your email account continuously to provide you with normal services, respond to possible inquiries and customer complaints, and protect the security of your account and system

    We will retain the information you post for as long as you do not recall, delete or close your account

    If you cancel your account, voluntarily delete personal information, or exceed the necessary period, we will treat your information deletion or anonymization , However, the following exceptions apply:

    Comply with laws and regulations regarding information retention requirements

    It is necessary to reasonably extend the time limit for financial, auditing, dispute resolution, etc. purposes

    5. How we protect the security of personal information

    5.1 We take the security of your personal information very seriously

    We will endeavor to take reasonable security measures (both technical and administrative) to protect your personal information from improper use or unauthorized access, public disclosure, use, modification, damage, loss, or leakage of the personal information you provide.

    5.2 We will use safety technologies that are no less than industry usage

    As Encryption technology, anonymization and related reasonable and feasible means Protect your personal information and use security protection mechanisms to prevent malicious attacks on your personal information.

    5.3 We will establish a special security department, security management system, and data security process to ensure the security of your personal information

    We take Strict data use and access policies, Ensure that only authorized personnel have access to your personal information, and conduct timely security audits of data and technology.

    5.4 This is even though the above reasonable and effective measures have been taken and the standards required by the relevant legal provisions have been complied with

    However, please understand that due to technical limitations and possible malicious means, in the Internet industry, even if we try our best to strengthen security measures, it is impossible to always ensure 100% security of information, and we will try our best to ensure the security of the personal information you provide to us.

    5.5 You acknowledge and understand that the system and communication network you use to access our services may have problems due to factors beyond our control

    Therefore, we strongly recommend you Take proactive measures to protect the security of personal information, including but not limited to using complex passwords, changing passwords regularly, and not disclosing your account password and related personal information to others.

    5.6 We will formulate an emergency response plan and immediately activate the emergency plan when a user information security incident occurs

    Efforts are being made to prevent the impact and consequences of these security incidents from spreading. Once a user information security incident (leakage or loss) occurs, we will promptly inform you of the basic situation and possible impact of the security incident by the requirements of laws and regulations, the disposal measures we have taken or will take, the suggestions you can independently prevent and reduce risks, and the remedial measures for you. We will promptly inform you of the relevant circumstances of the incident in push notifications, emails, letters, text messages, and related forms, and when it is difficult to inform them one by one, we will issue announcements reasonably and effectively. At the same time, we will also report the handling of user information security incidents to the requirements of relevant regulatory authorities.

    6.How We Manage Personal Information

    We take your management of personal information very seriously and do our best fully protect the rights related to accessing, copying, correcting, supplementing, deleting, withdrawing consent and authorization, canceling accounts, and making complaints and reports about your personal information,so that you can protect your privacy and information security. To optimize your experience, we may also adjust the operation settings, so the following guidelines are for reference only.

    6.1 You can check and correct personal information through the App, in "My → Account"

    Check your identity information, including name, email address, password, etc

    If you find that your name is wrong, simply click the name option to modify it. If you want to change the password, you need to click on the password selection and enter the old password and the new password you want to replace to complete the change

    6.2 Manage your authorization scopes

    If you want to change the authorization scope, you can modify authorization scope through the mobile permission settings. For example, you can turn off recognition permissions such as geolocation services, cameras (cameras), and storage in the device's operating system, change the scope of consent, or withdraw your authorization. When authorization is turned off, we will no longer collect information related to these permissions.

    Specific business functions and services will require your information to be completed, and when you withdraw your consent or authorization, we cannot continue to provide you with the functions and services corresponding to the withdrawal of consent or authorization, and no longer process your corresponding personal information. However, your decision to withdraw your consent or authorization will not affect the company's previous processing of personal information based on your authorization.

    6.3 In the following cases, you can request us to delete your personal information

    The purpose of the processing has been achieved, cannot be achieved, or is no longer necessary to achieve the purpose of the processing

    We cease to provide products or services, or the retention period has expired

    Withdrawal of consent by the individual

    If our processing of personal information violates laws, administrative regulations, or agreements with you

    Other circumstances provided for by laws and administrative regulations

    Deletion of personal information: refers to the act of removing personal information from the system involved in the realization of daily business functions, so that it remains unsearchable or accessible. When you or we assist you in deleting the relevant information, Due to applicable laws and security technology limitations, we may not be able to immediately delete the corresponding information from our backup systems, and we will securely store your personal information and restrict any further processing of it until the backup can be erased or anonymized.

    6.4 Notwithstanding the above agreement, by relevant laws and regulations and national standards, we may not be able to respond to your request in the following circumstances:

    Directly related to national security and national defense security

    Directly related to public safety, public health, and major public interests

    Directly related to the criminal investigation, prosecution, trial, and execution of judgments

    There is sufficient evidence that you have subjective malice or abuse of rights

    Responding to your request will cause serious damage to the legitimate rights and interests of other individuals and organizations

    Involving trade secrets

    7. Protection of information of minors

    7.1 Principles for the protection of minors' personal information

    We attach great importance to the protection of minors' personal information. The app is primarily aimed at adults. if If you are a minor under the age of 18, you should read and agree to this Privacy Policy under the supervision and guidance of your parents or other guardians before using this product. If you are the guardian of a minor under the age of 16, you should read and agree to this Privacy Policy for your ward before using the App and related services.

    7.2 We protect the personal information of minors by relevant national laws and regulations

    Collect, use or disclose minors' personal information only when permitted by law, with the explicit consent of parents or other guardians, or as necessary to protect minors; If we find that the personal information of minors has been collected without the prior consent of a verifiable guardian, we will try to delete the relevant information as soon as possible.

    7.3 If you are the guardian of a minor

    When you have other questions about the minor's personal information under your guardianship, please contact us through the contact information published in this privacy policy.

    8. Privacy Policy Updates and Notices

    8.1 To provide you with better services, the App and related services will be updated and changed from time to time

    We will revise this Privacy Policy from time to time, and these amendments form part of this Privacy Policy and have the effect of being equivalent to this Privacy Policy, and we will not reduce your rights under this Privacy Policy in force without your express consent.

    8.2 When this Privacy Policy is updated, we will post an updated version in the App

    Before the updated Terms take effect Remind you of the updated content through official website announcements or other appropriate means so that you can keep abreast of the latest version of this Privacy Policy.

    9. Contact Details

    9.1 The app is provided by SUNGO Energy Technology(Jiangsu)Co.,Ltd.

    If you have complaints, suggestions, or questions about personal information protection, you can send your questions to (sales@sungoess.com), We will verify and verify your user identity and respond to your complaints and reports within 15 days.