点击此处切换为中文版本
Click here to switch to the Chinese version of KPM Config Privacy Policy
KPM Config Privacy Policy
Version update time: April 16, 2025
Version effective date: April 16, 2025
Prompt clause
[special note]
KPM Config is a specialized app developed by Henan Compere Smart Technology Co., Ltd. for configuring temperature and vibration sensors.
Henan Compere Smart Technology Co., Ltd.(hereinafter referred to as "we") attaches great importance to the protection of users' privacy and personal information.
When you use our services, we may use and collect your relevant information. This privacy policy explains to you how we collect, use, store, and protect your personal information, how we protect your privacy and security, and how you exercise your right to manage personal information, including but not limited to: The various products and services provided to you by web websites, mobile application apps, mini programs, and new forms emerging with technological development.
[Special Instructions - Third Party SDK List Information Sharing List]
We will not share your user information with any other companies, organizations or individuals, except for the following situations:
1. Sharing with explicit consent: after obtaining your explicit consent, we will share your user information with other parties.
2. We may share your user information according to laws and regulations or the mandatory requirements of government departments.
3. Share with our affiliated companies: your user information may be shared with our affiliated companies. We will only share the necessary user information and are bound by the purposes stated in this privacy policy. If the affiliated company wants to change the purpose of user information processing, it will seek your authorization again.
4. Share with authorized partners: for the purposes stated in this policy only, some of our services will be provided by authorized partners. We may share some of your user information with our partners to provide better customer service and user experience. We will only share your user information for legitimate, legitimate, necessary, specific and specific purposes, and only share the user information necessary to provide services. In order to better operate and improve technology and services, you agree that we and our authorized partners can use the information collected for other services and purposes on the premise of complying with relevant laws and regulations.
We will adjust the cooperation information of the third party company / application from time to time according to the specific situation of the cooperation. If we increase the cooperation information of the third party company or application with which we share personal information, we will inform you in time and ask for your authorization consent. The relevant situation and the required authorization are as follows:
(1) SDK Name: Tencent Bugly (Compliance Version)
Third party developer entity: Shenzhen Tencent Computer System Co., Ltd
Usage scenario: When counting abnormal situations
Purpose of SDK: To improve service stability and facilitate quick and accurate identification of problems in the event of service crashes
Scope of information collected by SDK:
Bugly SDK for Android:
1)Mobile phone model: troubleshoot crash issues, help improve app stability, identify whether crashes and other issues are related to the phone model, encrypt transmission
2)Mobile phone brand: troubleshoot crash issues, help improve app stability, identify whether crashes and other issues are related to the mobile phone brand, encrypt transmission
3)Android system version: troubleshooting crash issues, helping apps improve stability, identifying whether crashes and other issues are related to the Android system version, encrypting transmission
4)Android system API level: troubleshooting crash issues, helping apps improve stability, identifying whether crashes and other issues are related to Android system APIs, encrypting transmission
5)Manufacturer's system version: troubleshooting crash issues, helping APP improve stability, identifying whether crashes and other issues are related to the manufacturer's system version, encrypting transmission
6)CPU architecture type: troubleshooting crash issues, helping APP improve stability, identifying whether crashes and other issues are related to CPU architecture, encrypted transmission
7)Whether the device is rooted: When the APP crashes, identify whether the crash and other issues are caused by root and encrypt the transmission
8)Disk space occupation size: When the APP crashes, identify whether the crash or other issues are caused by small remaining disk space and encrypt the transmission
9)Sdcard space occupation size: When the APP crashes, whether the recognition of crashes and other issues is due to the small remaining space on the sdcard, encrypted transmission
10)Memory space occupation size: When the APP crashes, identify whether the crash and other issues are caused by small memory space, and encrypt the transmission
11)Network type: When the APP crashes, identify whether issues such as crashes are related to the network type and encrypt transmission
12)The name and PID of the currently running process of the application: When the APP crashes, determine the ANR status of the current process, troubleshoot crash issues, help improve stability of the APP, only read, not save locally, and not upload to the server
Bugly SDK for iOS:
1)Device model: troubleshoot crash issues, help improve app stability, identify whether crashes and other issues are related to the phone model, encrypt transmission
2)Operating System Version: Troubleshooting crash issues, helping APP improve stability, identifying whether crashes and other issues are related to the operating system version, encrypting transmission
3)Internal version number of operating system: troubleshooting crash issues, helping APP improve stability, identifying whether crashes and other issues are related to the internal version number of the operating system, encrypting transmission
4)WiFi status: troubleshoot crash issues, help improve app stability, identify whether crashes and other issues are related to network status, encrypt transmission
5)CPU properties: troubleshoot crash issues, help improve app stability, identify whether crashes and other issues are related to CPU construction, encrypt transmission
6)Remaining memory space: When the APP crashes, identify whether issues such as crashes are caused by small remaining memory space and encrypt transmission
7)Disk space/remaining disk space: When the APP crashes, identify whether the crash or other issues are caused by small remaining memory space and encrypt the transmission
8)Run time phone status (memory occupied by processes, virtual memory, etc.): When the APP crashes, identify whether the crash or other issues are caused by abnormal memory usage of the current APP, and encrypt the transmission
9)Idfv: troubleshooting crash issues, helping APP improve stability, used for device identification, providing indicators such as APP networking device count and crash rate, encrypted transmission
10)Whether to jailbreak: When the APP crashes, identify whether the crash and other issues are caused by device jailbreaking, and encrypt the transmission
11)Region code: When the APP crashes, identify whether the Crash and other issues are related to the device's region and encrypt the transmission
Handling method: SDK local collection, does not involve data sharing
Data processing method: Through de identification, encrypted transmission, and other secure methods
Official website link: https://bugly.qq.com/v2/
Privacy Policy Link: https://privacy.qq.com/document/preview/fc748b3d96224fdb825ea79e132c1a56
(2)SDK Name: 360 Reinforcement SDK (applicable to APK/HAP/APK plugins/SDK reinforcement)
Third party subject: Beijing 360 Zhiling Technology Co., Ltd
Scope of information collected by SDK:
1)Strengthen the package information, including the MD5 of the package name, version, and signature file of the application or SDK; Used for basic reinforcement services, as well as piracy monitoring, operational data analysis, crash log analysis, terminal environment detection, virus and Trojan detection services.
2)Basic device information, network type, system operating language environment, operating system version name, operating system version, model, system version, manufacturer, terminal motherboard name, brand, device memory size, phone screen resolution, operating environment; Used for basic reinforcement services, as well as piracy monitoring, operational data analysis, crash log analysis, and terminal environment detection services.
3)Network information, DNS server IP, whether VPN is enabled or not; Used for basic reinforcement services and terminal environment detection services.
4)Security information, security patch program level; Used for basic reinforcement services, as well as crash log analysis and terminal environment detection services.
5)Terminal environment information, Android ID、OAID,root、xposed、 be dismissed from public office and expelled from the Party frida、 Simulator environment; Used for basic reinforcement services, as well as terminal environment detection, risk equipment identification, and reinforcement program shell shedding adversarial detection.
SDK purpose: Used for detecting and diagnosing App malfunctions, App security reinforcement protection, piracy detection services, threat environment detection services, in order to help users quickly solve abnormal situations
Device permissions: none
The type of personal information collected by SDK: The authorization method is determined by the app developer, and it is activated when the end user agrees to authorize the developer's app for this permission
Data processing method: Through de identification, encrypted transmission, and other secure methods
Official website link: https://jiagu.360.cn
Privacy Policy Link: https://jiagu.360.cn/#/global/help/322
[[Special] note]
Please read and fully understand this privacy policy before using our service. If you use or continue our service, it means that you fully understand all contents of this Privacy Policy and agree that we will handle your relevant information in accordance with this privacy policy.If you do not agree with this privacy policy or any part of it, please contact us for a satisfactory reply before you choose to agree.
Please note that this policy does not apply to other third party products / services (other third parties, including your trading partner, any third party website and third party service provider, etc.), accessed by you through our products / services, and refer to the privacy policy or similar statement of such third party.
This privacy policy will help you understand the following:
1、How do we collect and use your personal information
2、How do we use cookies and similar technologies
3、How do we share, transfer and publicly disclose your personal information
4、How do we protect and preserve your personal information
5、How do we store your personal information
6、How do you manage your personal information
7、How do we protect and process children's personal information
8、Cross border transmission of your personal information
9、Disclaimer
10、How to change this policy
11、How to contact us
Privacy policy text
1、How do we collect and use your personal information
When you use our services, you need to authorize or choose to authorize us to collect and use your personal information in scenarios including:
1. In order to provide you with the basic functions of services, you need to authorize us to collect and use the necessary information. If you refuse to provide the necessary information, you will not be able to use our services normally;
2. In order to provide you with the expanded functions of the service, you can choose to authorize us to collect and use the information. If you refuse to provide the above information, you will not be able to normally use the relevant additional functions or participate in specific activities, and will not be able to achieve the functional effects we intend to achieve, but it will not affect your normal use of the basic functions of our service.
(1) When you use the service, you need to be authorized to collect and use your personal information: we will follow the principle of "reasonable, relevant and necessary", and will only collect and use your personal information for the following purposes described in this privacy policy.
1)Login / registration function
In order to comply with the requirements of our laws and regulations, and to provide you convenient services, when you log in / register with our platform, when you register as our user, you need to provide at least your mobile phone number to create an account. You should ensure that the mobile phone number provided by opening this service is owned and valid by yourself, and authorize us to verify the authenticity and validity of the mobile phone number provided by you through a third party channel.
2)Security function
In order to enhance the security of your account, transaction and system operation, we will obtain your device information, including the device attributes, connection and status information, such asdevice model, unique device identifier (such as IMEI / androidID / IDFA / openudid / guid, SIM card IMSI information, etc.) and device information, with your authorization, after meeting the relevant requirements of laws and regulations and our agreement rules MAC address, software list, etc. Basic service function When you use our services, you need to provide your device information or software information, IP address, version and device identification number (IDFA / IMEI) of your mobile device, as well as configuration information used to access our services through web browser and mobile device. These are the basic information we must collect for providing services. If you refuse to provide the above information, you can't use some of our services properly.
(2) You can choose the scenario where we are authorized to collect and use personal information
To enhance your user experience, we may collect and use your personal information based on the relevant permissions of your authorized mobile device operating system. If you do not provide these personal information, it will not affect the basic features of your use of our platform. The relevant permissions and corresponding functions after opening are as follows:
1) Camera permission: after it is turned on, you can scan the device QR code to obtain device details and other information;
2) Album permissions: after activation, it allows you to save pictures to your local phone album while viewing them;
3) Memory card permission / file storage function: after it is turned on, it is used to save your login information and search records. It can avoid the problem of re login, quickly and automatically log in to the account, and view the search history;
4) Location permissions: after it is turned on, obtain the current position information to connect the temperature and vibration sensor device;
5) Bluetooth permissions: after it is turned on, connect the temperature vibration device sensor through Bluetooth to send data to it;
(3)Application Permission Application and Usage Description
1. To ensure the safe and stable operation of APP related products or services, we may apply for or use relevant permissions of the operating system;
1. To ensure the safe and stable operation of APP related products or services, we may apply for or use relevant permissions of the operating system; 2. To protect your right to know, we display the relevant operating system permissions that products or services may apply for and use through the following list. You can manage the relevant permissions according to your actual needs;
3. According to the upgrade of products or services, the types and purposes of permission applications and usage may change. We will adjust the list in a timely manner based on these changes to ensure that you are informed of the application and usage of permissions in a timely manner
Android operating system application permission list
1)android.permission.CAMERA
Collection field: shooting content
Collection method: Take videos, photos, scan codes
Collection frequency: using video shooting, taking photos, scanning codes, and
Complete video shooting, taking photos, and scanning codes
2)android.permission.ACCESS_FINE_LOCATION
Collecting fields: precise location
Collection method: Obtain accurate geographic location through Global Positioning System (GPS) or network location information (such as base stations or WLAN)
Collection frequency: Collect according to the user's set frequency
When inspecting work orders, record the current location information
3)android.permission.ACCESS_COARSE_LOCATION ACCESS_BACKGROUND_LOCATION
Collect fields: rough location
Collection method: Obtain approximate geographic location information through network location information (such as base stations or WLAN)
Collection frequency: Collect according to the user's set frequency
Use Bluetooth function module to search device Bluetooth, connect Bluetooth, and transfer data to device via Bluetooth
4)android.permission.INTERNET
Access network permissions
Enable Application Networking
5)android.permission.ACCESS_WIFI_STATE
Get WiFi status permission
Monitor network changes and prompt users of current network environment
6)android.permission.ACCESS_NETWORK_STATE
Get network status permission
Monitor network changes and prompt users of current network environment
7)android.permission.CHANGE_WIFI_STATE
Change WiFi status permission
Allow apps to change WiFi status
8)android.permission.BLUETOOTH android.permission.BLUETOOTH_SCAN android.permission.BLUETOOTH_ADVERTISE android.permission.BLUETOOTH_CONNECT
Use Bluetooth permissions
Use Bluetooth function module to search device Bluetooth, connect Bluetooth, and transfer data to device via Bluetooth
iOS operating system application permission list
1)NSCameraUsageDescription
Collection field: shooting content
Convenient for scanning the device QR code or taking photos to upload device images for you
2)NSLocationAlwaysAndWhenInUseUsageDescription(During the use of the app and always allowing location retrieval);
NSLocationAlwaysUsageDescription(Always allow location retrieval);NSLocationWhenInUseUsageDescription(Allow location retrieval during app usage)
Collecting Fields: Location Information
Collection method: acquire precise or rough geographical location through satellite and network information (such as base station or WLAN), which can be adjusted in settings
Collection frequency: Collect according to the user's set frequency
Use Bluetooth function module to search device Bluetooth, connect Bluetooth, and transfer data to device via Bluetooth
2)NSLocationUsageDescription
Collection fields: location information
Collection method: obtain precise or rough geographical location through satellite and network information (such as base station or WLAN), which can be adjusted in the setting
Collection frequency: collect according to the frequency set by the user
Convenient access to location services is required to obtain connected WiFi information
3)NSPhotoLibraryAddUsageDescription(album);NSPhotoLibraryUsageDescription(Album Usage)
Collection fields: pictures
It is convenient to save pictures for you or upload device pictures
4)NSBluetoothAlwaysUsageDescription; NSBluetoothPeripheralUsageDescription
Convenient for you to connect your device via Bluetooth
Convenient access to location services is required to obtain connected WiFi information
Application permission list of HarmonyOS operating system
1)ohos.permission.INTERNET
Allow Internet access
Enable Application Networking
2)ohos.permission.GET_NETWORK_INFO
Allow applications to obtain data network information.
Monitor network changes and prompt users of current network environment
3)ohos.permission.APPROXIMATELY_LOCATION(Fuzzy location)
Collection fields: rough location
Collection method: obtain approximate geographic location information through network location information (such as base station or WLAN)
Collection frequency: collect and confirm the user login environment according to the frequency set by the user, ensure the security of the user account, and roughly recommend products and/or services that can be delivered/delivered to you
4)ohos.permission.MEDIA_LOCATION
Collection fields: rough location
Collection method: obtain approximate geographic location information through network location information (such as base station or WLAN)
Collection frequency: collect and confirm the user login environment according to the frequency set by the user, ensure the security of the user account, and roughly recommend products and/or services that can be delivered/delivered to you
5)ohos.permission.LOCATION
Collection field: precise location
Collection method: obtain accurate geographical location through global positioning system (GPS) or network location information (such as base station or WLAN)
Collection frequency: automatically enter the receiving address according to the frequency set by the user and recommend products and/or services that can be delivered/delivered in the context of local retail
6)ohos.permission.READ_IMAGEVIDEO(Read picture)
Collection field: photo/video/audio
Collection method: upload photos/videos/audio
Collection frequency: use the photo shopping function when uploading photos/videos/audio and the list display, evaluation and question and answer functions
7)ohos.permission.WRITE_IMAGEVIDEO(Modify picture)
Collection field: photo/video/audio
Collection method: upload photos/videos/audio
Collection frequency: use the photo shopping function when uploading photos/videos/audio and the list display, evaluation and question and answer functions
8)ohos.permission.APP_TRACKING_CONSENT
Allow apps to read open anonymous device identifiers.
Used to identify devices to recommend quality content to you
9)ohos.permission.READ_PASTEBOARD(clipboard)
Read system clipboard contents
Copy and share product information, title, SMS verification code
10)ohos.permission.CAMERA
Collection field: shooting content
Collection method: take video, photos, scan code
Collection frequency: when using video capture, photographing, code scanning and face recognition to log in
Photo shopping function, list display, evaluation and Q&a function
11)ohos.permission.MICROPHONE
Collection field: recording content
Collection method: recording
Collection frequency: when using voice input, voice search and Internet telephone service
Identify your shopping needs, customer service and after-sales needs
12)ohos.permission.DISCOVER_BLUETOOTH
Allows applications to configure local Bluetooth, find and pair with remote devices.
Use of Bluetooth function in app
13)ohos.permission.USE_BLUETOOTH
Allow apps to view Bluetooth configuration.
Use of Bluetooth function in app
14)ohos.permission.ACCESS_BLUETOOTH
Allow applications to access Bluetooth and use Bluetooth capabilities, such as pairing, connecting peripheral devices, etc.
Use of Bluetooth function in app
15)ohos.permission.GET_BUNDLE_INFO
Allows you to query the basic information of the application.
Prompt users to update, improve user experience and ensure application security
16)ohos.permission.GET_WIFI_INFO
Allow apps to get Wi Fi information. Monitor network changes and prompt users of current network environment
17)ohos.permission.SET_NETWORK_INFO
Allows the application to configure the data network.
Allow apps to change network connection status
18)ohos.permission.PUBLISH_AGENT_REMINDER
Allow the app to use background proxy alerts.
Remind users to pay attention to promotional activities of specific products or rush to buy within a limited time
19)ohos.permission.NFC_TAG
Real name authentication read ID card
Scan user ID card with NFC capability to realize ID card information collection
2、 How do we use cookies and similar technologies
To ensure the normal operation of the website, we will store a small data file called cookie on your computer or mobile device. Cookies usually contain identifiers, site names, and some numbers and characters. With the help of cookies, websites can store your access preference data.
We will not use cookies for any purpose other than those described in this policy. You can manage or delete cookies based on your preferences. You can clear all cookies saved on your computer, and most web browsers have the function of blocking cookies. But if you do, you need to change the user settings yourself every time you visit our website.
3、How do we share, transfer and publicly disclose your personal information
(1) Share
[Third Party SDK List Information Sharing List]
(2) Assignment
We will not transfer your user information to any company, organization or individual, except for the following circumstances:
1. Transfer with explicit consent: after obtaining your explicit consent, we will transfer your user information to other parties;
2. In case of merger, acquisition or bankruptcy liquidation, if the transfer of user information is involved, we will require the new company or organization holding your user information to continue to be bound by this privacy policy, otherwise we will require the company or organization to seek your authorization again.
(3) Public disclosure
We will only publicly disclose your user information under the following circumstances:
1. With your explicit consent;
2. Law based disclosure: we may publicly disclose your user information when required by law, legal proceedings, litigation or government authorities.
4、 How do we protect and preserve your personal information
(1) We have used industry standard security measures to protect your personal information from unauthorized access, public disclosure, use, modification, damage or loss. We will take all reasonable and feasible measures to protect your personal information. For example, we will use encryption technology to ensure the confidentiality of data; we will use trusted protection mechanisms to prevent malicious attacks on data; we will deploy access control mechanisms to ensure that only authorized personnel can access personal information; and we will hold security and privacy protection training courses to enhance employees' awareness of the importance of protecting personal information.
(2) In the use of data, we strictly abide by the principle of minimum authorization for the operators who are authorized to access data, so that they can only access the minimum personal information required by their authority, and only have the minimum data operation authority required to complete their duties. In addition, we set the approval process for important data operations, and separate the roles of security management personnel, data operators, and auditors. In data transmission, we use strong encryption to protect the transmitted data, and we also use strong encryption to protect the localized stored procedure of data.
(3) We will take all reasonable and feasible measures to ensure that no irrelevant personal information is collected. We will only retain your personal information for the period required to achieve the purposes set forth in the cost privacy policy unless it is necessary to extend the retention period or be permitted by law.
(4) The Internet environment is not 100% secure. We will try our best to ensure or guarantee the security of any information you send to us. If our physical, technical, or management protection facilities are damaged due to the reasons attributable to us, resulting in unauthorized access, public disclosure, tampering, or destruction of information, resulting in damage to your legitimate rights and interests, we will bear the corresponding legal responsibility.
(5) After the unfortunate personal information security incident, we will timely inform you of the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, the suggestions that you can prevent and reduce the risk on your own, and the remedial measures for you in accordance with the requirements of laws and regulations. We will timely inform you of the relevant information of the event by mail, letter, telephone, push notice, etc. when it is difficult to inform the personal information subject one by one, we will take a reasonable and effective way to issue an announcement. At the same time, we will actively report the disposal of personal information security incidents in accordance with the requirements of regulatory authorities.
5、 How do we store your personal information
We do our best to store your personal information in a reliable and secure way, and we only process it when necessary.
Unless otherwise stipulated by laws and regulations, we will only keep your information for the period necessary to achieve the purpose stated in this policy. For example, the "e-commerce law of the people's Republic of China" requires that the storage time of commodity and service information and transaction information shall not be less than three years from the date of completion of the transaction. At the same time, we will judge the aforementioned period according to the following criteria:
1. Complete the transaction purpose related to you, maintain the corresponding transaction and business records, and deal with your possible inquiries or complaints;
2. Ensure the safety and quality of our services for you;
3. Whether you agree to a longer retention period;
4. Other special agreements on whether or not to be retained.
When you cancel the authorization, delete your personal information or cancel your account, we will delete your personal information according to the law, or anonymize it as permitted by the law. We do our best to store your personal information in a reliable and secure way, and we only process it when necessary.
6、 How do you manage your personal information
In accordance with relevant laws, regulations, standards and the common practices of other countries and regions, we guarantee that you can exercise the following rights to your personal information:
(1)Access and correct your personal information
You have the right to access and correct your personal information, except for exceptions stipulated by laws and regulations. You can visit and correct your personal information on the "I - related information" function page. You can't change your mobile phone number after you provide it to us. If you need to change it, please contact us through the contact information at the bottom of this privacy policy. We will respond to your request through customer service phone or email within 15 days.
(2)Delete your personal information or cancel your account
In the following cases, you can request us to delete your personal information:
1. If we collect and use personal information in violation of laws and regulations;
2. If we violate the agreement with the subject of personal information, collect and use personal information, violate the provisions of laws and regulations or the agreement with the subject of personal information, and publicly disclose personal information;
3. If you no longer use our products or services, or you cancel your account;
4. If we no longer provide products or services for you.
You can contact us at any time through the contact information announced at the bottom of this privacy policy to ask for the deletion of personal information or cancellation of your account. We will respond to your request by customer service telephone or email within 15 days.
(3)Change, withdraw the scope of your authorized consent and unsubscribe the commercial advertisement
You can contact us at any time through the contact information publicized at the bottom of this privacy policy. We will reply to your request to change the scope of authorization and unsubscribe from commercial advertisement through customer service telephone or email within 15 days. You may also choose to unsubscribe from the commercial according to our advertisement / promotion email / information.
(4) Under the following circumstances, we will not be able to respond to your request according to the requirements of laws and regulations:
1. Directly related to national security and national defense security;
2. Directly related to public safety, public health and major public interests;
3. Directly related to criminal investigation, prosecution, trial and execution of judgment, etc;
4. There is sufficient evidence to show that you have subjective malice or abuse of rights;
5. Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations;
6. Involving trade secrets.
7、 How do we protect and process children's personal information
We attach great importance to the protection of children's personal information. Our products, websites and services are mainly for adults. Children should not create their own user accounts without the consent of their parents or guardians. Although local laws and customs define children differently, we regard anyone under 14 as a child.
In the case of collecting children's user information with the consent of parents or guardians, we will only store, use or publicly disclose this information when it is permitted by law, explicitly agreed by parents or guardians, or necessary for the protection of children. Otherwise, we will try to delete the relevant data as soon as possible.
In view of the limitations of existing technology and business model, it is difficult for us to actively identify children's personal information. If you find that we have collected children's personal information without knowing it or obtaining the consent of a verifiable guardian in advance, you can contact us in time. We will try to delete it in time after we find it. If we find the above situation ourselves, I will We will delete them in time, except for those we are required to keep by law.
8、 Cross border transmission of your personal information
At present, our personal information collected and generated in the people's Republic of China will be stored in the people's Republic of China without any cross-border transmission.
9、 Disclaimer
This privacy policy only applies to the data we collect and use. We choose a reputable third-party company or website as our partner to provide users with information and services. We may provide links (including but not limited to SDK or API) to the above partners. Once you click into the partner's website, our privacy terms will no longer take effect. We suggest that you check the privacy terms of the partner's website and confirm Understand the partner's regulations on the collection, use and processing of your personal information.
10、 How to change this policy
(1)This privacy policy is updated with the effective date at the top of the page.
(2)When applicable laws and policies change, or our product or service functions change significantly, our privacy policy may change.
11、 How to contact us
If you have any questions, comments or complaints about this Privacy Policy and your privacy options, please contact us.
Company name: Henan Compere Smart Technology Co., Ltd.
Address: Unit 1, Building 38, Liandong U Valley, No. 352 Lianhua Street, High tech Industrial Development Zone, Zhengzhou City, Henan Province (450066)
Customer service hotline: 400-0371-828
Email: service@compere-power.com