1、 What information we collect and how we use it
The purpose of collecting personal information is to provide you with products or services and to ensure that we
comply with applicable relevant laws, regulations and other normative documents. You have the right to choose
whether
or not to provide this information, but in most cases, if you do not provide it, we may not be able to provide
you with
the corresponding services or respond to the problems you encounter. These functions include:
1.1 The circumstances under which you must authorize us to collect and use your personal information
1.1.1 Connection of intelligent devices
Providing YuTismt's services so that you can securely connect and manage smart devices, we may collect your
login
account information, mobile phone related information, IP address, and smart device related information. This
information will be used to provide you with the ability to quickly connect, connect, discover nearby devices
and manage
devices for smart devices. The above information is detailed as follows:
Log in account information:
YuTismt account number, nickname, sex, avatar information.
Mobile phone related information:
Hardware device identification (imsi, imei, meid, device hardware serial number, SIM card identification, OAID,
Mac
address Android ID)、 Mobile phone model, system version information, system language, the country or region set
by the
mobile phone, the size and resolution of the mobile phone screen, and the relevant information of the processor
and
display device.
Information collected during connection of smart devices:
Based on the type of smart devices you need to link, we may collect:
(1) Intelligent devices connected through Wi-Fi: Wi-Fi information (SSID, BSsid, Mac address of Wi-Fi, Wi-Fi
password),
device Mac address, device ID.
(2) After a local connection is established through Bluetooth, the smart devices connected through Wi-Fi: Wi-Fi
information (SSID, BSsid, Wi-Fi Mac address, Wi-Fi password), device Mac address, device Bluetooth Mac
address.
(3) Intelligent devices connected through Bluetooth: device Bluetooth Mac address, device ID.
(4) Intelligent devices connected through Zig bee: device Mac address, device ID.
1.1.2 Information collected during the use of intelligent devices
Information related to intelligent devices:information related to your device hardware,
performance, status, application, etc., including serial number, device
model, Firmware package version number, hardware version number, master Firmware version number, Bluetooth
Firmware
version number, and media version number; Battery power, bound app status, volume status, door lock status
(unlocking,
unlocked), waiting time for automatic locking, device installation location (such as study), number and survival
status
of Bluetooth keys.
Equipment dynamics and equipment operation record information:Including but not limited to
device name, location, operation record, authority setting, device password (such as
electronic password, fingerprint, face recognition, etc.), etc.
1.2 Circumstances in which you may choose whether to authorize us to collect and use your personal information
To enable you to better enjoy the control and management of the intelligent devices provided by YuTismt for you,
your
personal information may be collected and used in the following additional functions. If you do not provide such
personal information, you can still use YuTismt's basic services, but you may not be able to use these
additional
functions that can bring convenience to you. These additional functions include:
1.2.1 Home Management of Intelligent Devices
We may collect information on the room settings of the smart devices you provide for building home management of
smart
devices, which will enable you to enjoy a more convenient experience of operating smart devices (for example,
when there
are multiple locks, it can be quickly located that the door lock of the bedroom is managed, not the door lock of
the
living room).
1.2.2 Intelligent Device Sharing
We support you to share your smart devices with others through your YuTismt account. After sharing, the shared
person
can also control the intelligent device. To enjoy this function, we may collect your account ID, the sharing
account ID
you provide, and the shared device information (device ID, device name, device verification key, and device
sharing
status), which are used to provide you with the functions of common control and use of users who share devices
to other
YuTismt accounts, as well as to display the sharing status on the device list page.
1.2.3 Application and Firmware Upgrades
In order for you to continue to enjoy the latest YuTismt services, we may use the version information of your
YuTismt
application and the mobile phone model to provide you with the upgrade service of the application. At the same
time, we
may collect the list and version number information of the smart devices you have connected to provide you with
the
upgrade capabilities of the smart devices to ensure that you can use the latest version of the service
(including the
Firmware Version).
1.2.4 Video recording by security equipment
If you connect the equipment with camera's cat's eye doorbell and door lock through the YuTismt platform, in
order to
maintain the safety of your residence, after you add the equipment, if the equipment identifies that someone is
moving,
the equipment will automatically record the video, encrypt the upload to the cloud and store it for no more than
7 days
for you to view and playback only. Please be assured that your video data will not be used for any other
purpose.
1.2.5 User feedback
We may collect your feedback questions, filled in telephone numbers or mailboxes, added pictures or videos, and
submitted problem logs, which will be used to give us a better understanding of your problems and to contact
you.
1.2.6 Background Status Collection of Personal Information
The application will collect the user's personal information under the "background state" and obtain the user's
express
consent. We obtain your information. When you use YuTismt, the information we collect, summarize and record,
such as log
information and device information. Collect the user's "IMSI, IMEI. SDKGet MAC address, ANDROID ID" to push the
device
message alarm information service.
1.3 Description of authority call
In addition, the following device privileges may be triggered when you use YuTismt. In order to enable you to
better
manage your information, we will synchronously inform you of the purpose of the use of the right when applying
for the
right in the product use process, and if you do not open the right, it may affect your use of the service.
Please
consult carefully. Before using specific functions, you can choose whether to authorize the opening of the
following
rights. The following are the details of the relevant functions and call authorities, which are listed for your
reference:
Read and write external storage (Android version):It is used to read and write photos on
devices in functions such as scanning recording and leaving messages.
Location permission (Android, iOS versions):Used to determine areas, home location management,
intelligent device automation, discover nearby intelligent devices,
and discover nearby wireless LAN or Bluetooth lists.
Camera authority (Android, iOS versions):It is used to scan two-dimensional codes for equipment
installation, account login, replacement of avatars, cat's eye
equipment and other functions.
Read phone access (Android):The device identifier used to generate the phone locally on the
client.
Turn on the permission of the wireless network (Android, iOS versions):When used for fast
connecting equipment, connect the WIFI sent by the equipment for equipment communication.
Open Bluetooth permission (Android, iOS versions):When used for fast connecting devices, the
Bluetooth signal sent by the connecting device is used for device
communication; For smart devices connected through Bluetooth, Bluetooth permission is also required for
communication.
1.4 SDKs for Third Party Services
In the course of providing services to you, we may also provide services to you through software development
kits
("SDKs") provided by third-party service providers, which collect some of your information. If you refuse to
provide
information or authority, you will not be able to use the relevant functions. Specifically, it includes the
following:
1.4.1 Android SDK:
Third-party SDK Name: Getui Intelligent Push SDK (Including Message Push/Data Analytics
Components)
Third-party Company Name: Zhejiang Daily Interactive Network Technology Co., Ltd.
Purpose of Use: Enable real-time message push services, statistics on message delivery rates,
and analyze user
engagement
Personal Information Involved: Device identifiers (IMEI, MEID, OAID, Android_ID, IDFA, IDFV),
MAC address, IP
address,
location information, network environment identifiers (SSID/BSSID), carrier information, application list
information,
device serial number, sensor data, running process information
Privacy Policy Link/SDK URL: https://www.getui.com/privacy
Third-party SDK Name: Google Firebase Cloud Messaging (FCM) SDK
Third-party Company Name: Google LLC
Purpose of Use: Enable real-time message push services, track message delivery status, and
analyze notification interaction behavior.
Personal Information Involved:
1.Device identifiers
2.IP address
3.Approximate location information (derived from IP address)
4.Network environment identifiers (SSID/BSSID, connection type)
5.Device metadata (OS version, device model, language, time zone)
6.Notification interaction events (e.g., open/close notifications)
Privacy Policy Link/SDK URL:
Google Privacy Policy: https://policies.google.com/privacy
FCM Documentation: https://firebase.google.com/docs/cloud-messaging
Third-party SDK Name: Google ML Kit SDK
Third-party Company Name: Google LLC
Purpose of Use: Provides machine learning capabilities such as image recognition, text
scanning, and barcode detection for visual data
processing and analysis in smart devices (e.g., camera-equipped door locks)
Personal Information Involved:
1.Device identifiers (Android ID, OAID)
2.Images or video data captured by the camera (processed locally on the 3.device and not uploaded to the
cloud)
3.Device model, OS version
4.Network environment identifiers (Wi-Fi SSID/BSSID)
Privacy Policy Link/SDK URL:
Google Privacy Policy: https://policies.google.com/privacy
FCM Documentation: https://developers.google.com/ml-kit
Third-party SDK Name: Fresco SDK
Third-party Company Name: Meta Platforms, Inc.
Purpose of Use: Provides efficient image loading, cache management, and rendering of animated
formats (e.g., WebP, GIF) for fast display
and memory optimization of image resources in smart devices (e.g., mobile applications).
Personal Information Involved:
1.Device identifiers (Android ID, OAID)
2.Network status information (IP address, Wi-Fi/Cellular connection status)
3.Image cache data stored on the device (stored locally and not actively uploaded)
4.Device model, operating system version
Privacy Policy Link/SDK URL:
Meta Privacy Policy: https://www.facebook.com/privacy/policy/
Fresco Documentation: https://frescolib.org/
Third-party SDK Name: OkHttp
Third-party Company Name: Square, Inc.
Purpose of Use: Used for network requests and data transmission, enabling communication between
smart devices and the cloud.
Personal Information Involved:
1.Device identifiers (IMEI, Android ID)
2.IP address
3.Network request data
4.Device model
5.Operating system version
Privacy Policy Link/SDK URL:https://square.github.io/okhttp/
Third-party SDK Name: Retrofit2
Third-party Company Name: Square, Inc.
Purpose of Use: Used to simplify REST API integration, handle HTTP requests, and parse response
data for efficient communication between
smart devices and cloud services.
Personal Information Involved:
1.Device identifiers (IMEI, Android ID)
2.IP address
3.Network request/response data
4.Device model
5.Operating system version
Privacy Policy Link/SDK URL:https://square.github.io/retrofit/
1.5 Where we obtain your personal information from a third party
In providing you with product functions or services, we may obtain your personal information from third parties
with
your authorization.
In providing you with product functions or services, we may obtain your personal information from third parties
with
your authorization. In the intelligent scene (device intelligent linkage) function, on the premise of your
authorization, we need to obtain the device name, device id and device status of the intelligent device from the
intelligent device you have bound, so as to determine whether to trigger the intelligent scene (for example,
when you
set the sensor to sense someone passing, the lamp lights up). You can add, delete and edit the intelligent
linkage rules
you set on the "Intelligent" page, or manage whether to turn on or delete the intelligent linkage on the "Scene"
page.
When you log in with a third-party account, we need to obtain the account information (avatar, nickname and
other
information prompted on the authorization page) that you are authorized to share from the third party, and bind
your
third-party account with your YuTismt account after you agree to this privacy policy, so that you can directly
log in
and use our products or services through the third-party account. We will use your personal information on the
premise
of complying with relevant laws and regulations after confirming the legality of the source of personal
information in
accordance with the agreement with the third party
1.6 You are fully aware that we do not need your consent to collect and use personal information under the
following
circumstances:
(1) Those related to national security and national defense security;
(2) Those related to public safety, public health and major public interests;
(3) Related to criminal investigation, prosecution, trial and judgment execution;
(4) To respond to public health emergencies, or to safeguard the lives of personal information subjects or other
individuals in emergencies;
(5) The personal information collected is disclosed to the public by the subject of personal information;
(6) Your personal information collected from legally disclosed information, such as news reports, government
information
disclosure and other channels;
(7) Necessary for signing the contract according to your requirements;
(8) Necessary for maintaining the safe and stable operation of the products or services provided, such as
discovering
and dealing with the faults of the products or services;
(9) Necessary for lawful news coverage;
(10) When an academic research institution is necessary to carry out statistics or academic research in the
public
interest, and provides the results of academic research or description to the outside world, it de identifies
the
personal information contained in the results;
(11) Other circumstances stipulated by laws and administrative regulations.
1.7 Non-Personal Information
We may also collect other information that cannot be identified as specific individuals (that is, information
that is
not personal information), such as statistical data generated when you use specific services, such as user
behavior
(including clicking, page skipping, and browsing time). The purpose of collecting such information is to improve
the
services we provide to you. The type and amount of information collected depends on how you use our products and
services. We will aggregate such information to help us provide more useful information to our customers about
which
parts of our websites, products and services they are most interested in. For the purposes of this Privacy
Policy,
aggregated data are treated as non-personal information. If we use non-personal information in combination with
personal
information, such information will be treated as personal information during the period of combined use.
5、 Your Rights
(1) Control settings
Cloud Intelligence acknowledges that everyone has different concerns about privacy. Therefore, we have provided
some
examples to illustrate the various ways provided by Yuntian Intelligence for you to choose to restrict the
collection,
use, disclosure or processing of your personal information and control your privacy settings:
Turn on or off location access, camera, telephone, recording, Bluetooth and read-write mobile phone
storage rights;
Agree/disagree when the Privacy Policy window pops up;
Log in or out of the YuTismt account;
In the YuTismt App, click "My - Profile" to modify your personal information, including nicknames,
avatars, etc;
Turn on or off the intelligent linkage of the device.YuTismt App, click "My - Profile" to modify your
personal information, including nicknames,
avatars, etc;
(2) Your rights to your personal information
According to the laws and regulations of the country or region to which you apply, you have the right to request
access
to, correct or delete any personal information related to you held by us (hereinafter referred to as the
request). More
detailed information related to the personal information in your Yuntian Smart Account can be accessed and
changed by
logging in to your account. Most laws require that requests made by personal information subjects comply with
specific
requirements, and this Privacy Policy requires that your request comply with the following circumstances:
Through our dedicated request channels, and for the purpose of protecting your information security, your
request should
be in writing (unless oral application is explicitly recognized by local law);
Provide sufficient information to enable us to verify your identity and ensure that the claimant is the subject
of the
requested information himself or a legally authorized person;
Once we have sufficient information to confirm that we can process your request, we will respond to your request
within
the time prescribed by applicable data protection laws. Specifically:
At your request and in accordance with applicable law, we may provide free of charge a record of the personal
information we have collected and processed about you,
If you make other requests for relevant information, we may charge you a reasonable fee based on relevant
applicable
laws and in light of actual management costs.
If you believe that any information we hold about you is incorrect or incomplete, you may request that personal
information be corrected or improved for the purpose of use.
Depending on the laws and regulations applicable to you, you may have the right to require us to delete your
personal
data. We will evaluate your request for deletion, and if the corresponding provisions are met, we will take
corresponding steps, including technical means, to deal with them. When you or we assist you in deleting the
relevant
information, we may not be able to immediately delete the corresponding information from the backup system due
to
applicable laws and security technologies, and we will securely store your personal information and isolate it
from any
further processing until the backup can be removed or anonymous.
We have the right to refuse to handle requests that are non-substantive/entangled and repetitive, requests that
impair
the privacy of others, extremely unrealistic requests, requests for disproportionate technical work, requests
that are
not required under local law, information that has been made public to the public, and information given under
confidential conditions. We may also refuse requests to delete data or access data if we believe that certain
aspects of
the request may prevent us from legally using the data for the purposes of fraud and security mentioned
above.
(3) Revocation of consent
You may contact us to submit a request to revoke your consent to the collection, use and/or disclosure of your
personal
information in our possession or control. This can be done by revoking the authorization of the Terms of Use and
Privacy
Policy in the setting. We will process your request within a reasonable time after you make the request and will
not
collect, use and/or disclose your personal information thereafter in accordance with your request.
Please note that your withdrawal of consent will have certain legal consequences. According to the scope of your
revocation of consent to let us process your personal information, this may indicate that you are unable to
enjoy the
products and services of Yuntian Intelligence.
(4) Cancellation of service or account
If you wish to cancel the Yuntian Intelligent Account, you shall operate with caution because the cancellation
of the
Yuntian Intelligent Account will make it impossible for you to use the whole line of products and services of
Yuntian
Intelligent. In order to protect the legitimate rights and interests of you or others, we will judge whether to
support
your cancellation request in light of your use of various products and services of Yuntian Intelligence.
You can cancel your account through the following path: [My] - [Personal Information] - [Cancellation of
Account].
After you cancel your account, we will stop providing you with products/services, and according to your request,
unless
otherwise stipulated by laws and regulations, we will delete your personal information.
Information retention period:We will process your personal information within one working day
for the purposes stated in this policy, unless it is
necessary to retain it for a longer period of time in accordance with specific legal requirements. We will
determine the
appropriate retention period according to the amount, nature and sensitivity of personal information, and after
the
expiration of the retention period, we will destroy your personal information.
When you explicitly request to delete your personal information, we make this a task and no longer keep your
personal
information.
If we are unable to destroy the information for technical reasons, we will take appropriate measures to prevent
further
use of your personal information.