Privacy Policy

This privacy policy is designed to help you understand what information we collect in a particular situation, why we collect it, and how you manage your own information. We hope to explain to you through this privacy policy how we collect, use, store, share and transfer your personal information and the information of intelligent hardware devices when using this product app to control intelligent hardware devices, as well as the ways we provide you with to access, update, delete and protect these information. Please read and understand this privacy policy carefully before using app, and use our products or services after confirming that you fully understand and agree. Once you begin to use the products and services of this product, you fully understand and agree to this policy, and agree that we will collect, use, store and share your relevant information in accordance with this privacy policy. If you have any questions about this policy, please contact: service@tumblevd.com . In providing our services, we may collect, store and use the following information:

1. Collection of personal information

We use, save and disclose personal information to serve you by creating accounts, identifying users, responding to queries and emails. This product will provide you with content-based management and services, news, surveys, promotions and other promotional materials to provide you with better services.

We will collect and use your personal information in accordance with this privacy policy. Among them, your sensitive information, location information, and the use and consumption records of this product will be involved. The purpose and purpose of collecting and using these sensitive information are detailed in the following function description. Once personal sensitive information is leaked, illegally provided or abused, it may endanger personal and property safety, and easily lead to personal reputation, physical and mental health damage or discrimination. Therefore, we will adopt compliance technology to encrypt / encrypt the sensitive information you explicitly agree to and actively provide, so as to protect the security of your personal information.

We have not indirectly obtained your personal information through sharing, transferring or collecting public information. If you need to obtain your personal information indirectly through other channels in the future, we only obtain the minimum amount of information necessary to realize the business function of the product or service, and explicitly inform you and seek your express consent before collection and use. At the same time, we will ensure the legitimacy of the information source before collecting the information, and understand the scope of the personal information processing authorization that the personal information provider has obtained, including the purpose of use, authorization, consent, transfer, sharing and public disclosure. If we need to process personal information beyond the scope of this authorization, we will obtain your express consent within a reasonable period of time after obtaining personal information or before processing personal information. In order to facilitate your use of this product, we will collect relevant information about your various intelligent hardware products under specific circumstances, such as device model, device ID and other similar feature records. The purpose and purpose of our collection and use of your information are as follows:

1. Information collected through registered accounts. When you install this product app on your mobile phone, you need to register on the app or log in to our account before you can use it. When you sign up for our account, you need to provide your mobile phone number and password or use the one click login function to sign in. Based on our cooperation with communication operators, when you use the "one click login" function, with your express consent, the operator will send your mobile phone number to us, so that we can provide you with fast login service. If you refuse to provide the mobile phone number, you will not be able to use the "one click login" method to register and log in to our account, but it does not affect your registration and login through other ways, nor does it affect the normal use of other functions. You can change your avatar, nickname and password through "my - > modify personal information".

2. Bind intelligent hardware device. After you log in to the app, you can connect and bind the app with intelligent hardware devices through Bluetooth. In order to achieve the binding of app and intelligent hardware device, we need to obtain your location information (used to obtain Bluetooth information), the status of intelligent hardware device and mobile phone on / off and network connection, intelligent hardware device model, mobile phone operator, mobile phone operating system and version, mobile phone model and local storage space of mobile phone. The above information will be uploaded to our company's server to prevent other identities other than yourself from accessing and managing intelligent hardware devices, so as to better protect the security of your information. You can unbind the intelligent hardware device and delete all your personal information related to the intelligent hardware device by "my - > delete the device".

2. Use of personal information

We may use the information collected above for the following purposes:

2.1 Provide you with services beneficial to users;

2.2 Our services shall be used for authentication, customer service, security prevention, fraud monitoring, archiving and backup purposes to ensure the safety and compliance of the products and services we provide to you;

2.3 Help us improve existing products;

2.4 To enable us to better understand how you access and use our services, so as to targeted personalized requirements;

2.5 Perform software verification and upgrade services;

2.6 When providing specific services at the special request of users, it is necessary to provide the information to our affiliates, third parties or other users;

2.7 Allow you to participate in the investigation of our products and services. Your personal information will not be used for any other purpose except in cases where it is not specified in this Privacy Policy or where you were not first notified of an update to this Privacy Policy.Anonymous Aggregate Statistics is not personal user information as defined in this Product and we will store and use such information for a variety of purposes, including but not limited to analysis and reporting of usage patterns.
The Product reserves the right to use and disclose anonymised aggregate statistics for any purpose or unilaterally to third parties.

3. Disclosure of personal information

Unless limited disclosure is specified in this Privacy policy, we will keep your personal information in good faith and will not disclose the customer list.You hereby authorize us to disclose your personal Information to third parties without your consent if:

3.1 If we disclose such information for the purpose of identifying, contacting or bringing action against us for ACTS that may cause harm to our rights or property, users of the Products or any other person (including the rights and property of any other person)

3.2 The necessity of legal investigation;

3.3 Such disclosure is required by law or necessary for subpoenas or other writs to be served on us.

4, safe

We have taken security measures in line with industry standards to protect your personal information from unauthorized access, public disclosure, use, modification, damage or loss. We will take all reasonable and feasible measures to protect your personal information.

1.We attach great importance to the security of your personal information, and will strive to take reasonable security measures to protect your personal information. At present, we have passed the information system security level test record of the Ministry of public security of the people's Republic of China, and obtained the "national information security level 3 certification" approved and issued by the public security department. At the same time, we have also passed the international authoritative ISO 27001 Information security management system certification.

2.We will encrypt, transmit and store the identifiable personal identity information to ensure the confidentiality of the data. For your mobile device identifier, international mobile device identity code (IMEI) and network device address (MAC), we will use MD5 algorithm for anonymization and encryption on your mobile device end, and only collect and upload the identifier after anonymization and encryption.

3.If you have registered our account, we may do a good job in risk control management by analyzing your login time, IP, login times and other information. In case of suspected non self login operation, we will remind you by SMS to avoid non self login operation of our account. For the data exchange between your mobile phone and our client, we use our custom encryption scheme and double encryption of HTTPS to ensure the security of data transmission.

4.If our application adopts WebView technology, we will check the URL of all file protocols used in WebView, and restrict the access to sensitive data and sdcard data of the application, so as to avoid malicious embezzlement of any private files and sensitive information of our products without special permission, resulting in the disclosure of your personal information.

5.We deploy the access control mechanism on the server side, adopt the principle of minimum sufficient authorization for the staff who may contact your personal information, and regularly check the list of visitors and access records.

6.Our server system for storing your personal information is the operating system after security reinforcement. We will audit and monitor the server operation. If we find the server operating system with security problems in external announcements, we will upgrade the server security at the first time to ensure the security of all our server systems and applications.

7.We hold regular training on laws and regulations related to personal information protection for staff to enhance their awareness of personal privacy protection

8.If our physical, technical or management protection measures are damaged, we will start the emergency plan in time to prevent the expansion of the security incident, report to the national competent authorities according to the requirements of laws and regulations, and timely take reasonable and effective ways such as push and announcement to inform you of the basic situation of the security incident, the possible impact, the measures taken or the measures to be taken Measures to be taken, etc.

5. Collection and use of teenagers' personal information

We recommend that minors under the age of 18 use this product with the permission and guidance of their legal guardians.The product will not use the personal information of minors, nor will it disclose identifiable information to any third party. The guardian has the right to refuse the product to further collect the personal information of the ward, or request the Product to delete the personal information of the ward.

6. Improved user experience

Continuous attention to products and improve the user experience is the goal of the company persistence, the company will according to the users in the process of using products and services, the operation of the products and services, data, and so on and so forth, a comprehensive evaluation and a targeted according to the results of the assessment to provide users with specific products use improvement opinions and Suggestions, in order to enhance the user experience.

7. Disclaimer

7.1 The Product shall not bear any legal liability in the following circumstances

7.1.1 Provide your personal information as required by laws or relevant government departments;

7.1.2 Disclosure of any personal information due to your improper use;

7.1.3 Any service interruption or obstruction caused by hacker attack, intrusion of computer virus, blocking of illegal content information and harassment information, government regulation and any other network, technology, communication lines and information security management measures that cannot meet the requirements of users;

7.1.4 The user's loss caused by communication line failure, technical problems, network failure, computer failure, system instability and force majeure of a third party such as the operator;

7.1.5 Risks caused by anonymous or pseudonym information containing threatening, defamatory, offensive or illegal contents that may exist in the use of the Product;

7.1.6 The Product expressly states that it does not guarantee, express or implied or in any form, the timeliness, safety and accuracy of the Product and its partner company's services.

7.2 To ensure your use experience, we may conduct some tests against your network in case of network connection problems.

8. Revision of this Privacy Policy

This Privacy Policy allows for adjustments. If we make any material changes to the way we use your personal information, we will notify you through the email address you provide or through the announcement of our products.The E-mail we send containing such change notifications undoubtedly constitutes a valid part of such change notifications.If you do not wish us to change the use of your personal information, you must notify us before you wish to stop using our account.Your continued use of the Product will be deemed to be your knowledge and consent to be bound by such changes in the notice.