YuTismt Privacy Policy

This privacy policy was updated on January 1, 2025 and will take effect on January 1, 2025.

Introduction

This Privacy Policy shall apply to the software, hardware, websites and services provided by Shenzhen Yuntian Intelligent Terminal Co., Ltd. and all its affiliated companies (the software name is YuTismt, and the software developer is Shenzhen Yuntian Intelligent Terminal Co., Ltd. (hereinafter referred to as [YuTismt] or [us]))

We deeply understand the importance of personal information to you and will do our best to protect the security and reliability of your personal information. We are committed to maintaining your trust in us and adhering to the following principles to protect your personal information: the principle of consistency of rights and responsibilities, the principle of clear purpose, the principle of selective consent, the principle of minimum sufficiency, the principle of ensuring security, the principle of subject participation, and the principle of openness and transparency. At the same time, we promise to take corresponding security measures in accordance with mature industry security standards to protect your personal information. Please read this Privacy Policy carefully before using this product or service. Once you use this product or service, you agree that we may collect, use, process, and store your information in accordance with this Privacy Policy. We may revise the Privacy Policy in a timely manner. When the Privacy Policy changes, we will display the updated Privacy Policy to you in the form of push notifications, pop ups, etc. during your login and version updates. Please note that we will only collect, use, process, and store your personal information in accordance with the updated Privacy Policy after you click the consent button included in the change notification; You can choose the disagree button, but this will prevent you from continuing to use the full services and features of YuTismt. When you use this product and service, it involves our collection and use of your personal information. Understanding how we collect and use your personal information is crucial for you to exercise your relevant personal rights. This policy will help you understand the following:

1、 What information we collect and how we use it

The purpose of collecting personal information is to provide you with products or services and to ensure that we comply with applicable relevant laws, regulations and other normative documents. You have the right to choose whether or not to provide this information, but in most cases, if you do not provide it, we may not be able to provide you with the corresponding services or respond to the problems you encounter. These functions include:

1.1 The circumstances under which you must authorize us to collect and use your personal information

1.1.1 Connection of intelligent devices

Providing YuTismt's services so that you can securely connect and manage smart devices, we may collect your login account information, mobile phone related information, IP address, and smart device related information. This information will be used to provide you with the ability to quickly connect, connect, discover nearby devices and manage devices for smart devices. The above information is detailed as follows:

Log in account information:
YuTismt account number, nickname, sex, avatar information.

Mobile phone related information:
Hardware device identification (imsi, imei, meid, device hardware serial number, SIM card identification, OAID, Mac address Android ID)、 Mobile phone model, system version information, system language, the country or region set by the mobile phone, the size and resolution of the mobile phone screen, and the relevant information of the processor and display device.

Information collected during connection of smart devices:
Based on the type of smart devices you need to link, we may collect:
(1) Intelligent devices connected through Wi-Fi: Wi-Fi information (SSID, BSsid, Mac address of Wi-Fi, Wi-Fi password), device Mac address, device ID.
(2) After a local connection is established through Bluetooth, the smart devices connected through Wi-Fi: Wi-Fi information (SSID, BSsid, Wi-Fi Mac address, Wi-Fi password), device Mac address, device Bluetooth Mac address.
(3) Intelligent devices connected through Bluetooth: device Bluetooth Mac address, device ID.
(4) Intelligent devices connected through Zig bee: device Mac address, device ID.

1.1.2 Information collected during the use of intelligent devices

Information related to intelligent devices:information related to your device hardware, performance, status, application, etc., including serial number, device model, Firmware package version number, hardware version number, master Firmware version number, Bluetooth Firmware version number, and media version number; Battery power, bound app status, volume status, door lock status (unlocking, unlocked), waiting time for automatic locking, device installation location (such as study), number and survival status of Bluetooth keys.
Equipment dynamics and equipment operation record information:Including but not limited to device name, location, operation record, authority setting, device password (such as electronic password, fingerprint, face recognition, etc.), etc.

1.2 Circumstances in which you may choose whether to authorize us to collect and use your personal information

To enable you to better enjoy the control and management of the intelligent devices provided by YuTismt for you, your personal information may be collected and used in the following additional functions. If you do not provide such personal information, you can still use YuTismt's basic services, but you may not be able to use these additional functions that can bring convenience to you. These additional functions include:

1.2.1 Home Management of Intelligent Devices

We may collect information on the room settings of the smart devices you provide for building home management of smart devices, which will enable you to enjoy a more convenient experience of operating smart devices (for example, when there are multiple locks, it can be quickly located that the door lock of the bedroom is managed, not the door lock of the living room).

1.2.2 Intelligent Device Sharing

We support you to share your smart devices with others through your YuTismt account. After sharing, the shared person can also control the intelligent device. To enjoy this function, we may collect your account ID, the sharing account ID you provide, and the shared device information (device ID, device name, device verification key, and device sharing status), which are used to provide you with the functions of common control and use of users who share devices to other YuTismt accounts, as well as to display the sharing status on the device list page.

1.2.3 Application and Firmware Upgrades

In order for you to continue to enjoy the latest YuTismt services, we may use the version information of your YuTismt application and the mobile phone model to provide you with the upgrade service of the application. At the same time, we may collect the list and version number information of the smart devices you have connected to provide you with the upgrade capabilities of the smart devices to ensure that you can use the latest version of the service (including the Firmware Version).

1.2.4 Video recording by security equipment

If you connect the equipment with camera's cat's eye doorbell and door lock through the YuTismt platform, in order to maintain the safety of your residence, after you add the equipment, if the equipment identifies that someone is moving, the equipment will automatically record the video, encrypt the upload to the cloud and store it for no more than 7 days for you to view and playback only. Please be assured that your video data will not be used for any other purpose.

1.2.5 User feedback

We may collect your feedback questions, filled in telephone numbers or mailboxes, added pictures or videos, and submitted problem logs, which will be used to give us a better understanding of your problems and to contact you.

1.2.6 Background Status Collection of Personal Information

The application will collect the user's personal information under the "background state" and obtain the user's express consent. We obtain your information. When you use YuTismt, the information we collect, summarize and record, such as log information and device information. Collect the user's "IMSI, IMEI. SDKGet MAC address, ANDROID ID" to push the device message alarm information service.

1.3 Description of authority call

In addition, the following device privileges may be triggered when you use YuTismt. In order to enable you to better manage your information, we will synchronously inform you of the purpose of the use of the right when applying for the right in the product use process, and if you do not open the right, it may affect your use of the service. Please consult carefully. Before using specific functions, you can choose whether to authorize the opening of the following rights. The following are the details of the relevant functions and call authorities, which are listed for your reference:

Read and write external storage (Android version):It is used to read and write photos on devices in functions such as scanning recording and leaving messages.

Location permission (Android, iOS versions):Used to determine areas, home location management, intelligent device automation, discover nearby intelligent devices, and discover nearby wireless LAN or Bluetooth lists.

Camera authority (Android, iOS versions):It is used to scan two-dimensional codes for equipment installation, account login, replacement of avatars, cat's eye equipment and other functions.

Read phone access (Android):The device identifier used to generate the phone locally on the client.

Turn on the permission of the wireless network (Android, iOS versions):When used for fast connecting equipment, connect the WIFI sent by the equipment for equipment communication.

Open Bluetooth permission (Android, iOS versions):When used for fast connecting devices, the Bluetooth signal sent by the connecting device is used for device communication; For smart devices connected through Bluetooth, Bluetooth permission is also required for communication.

1.4 SDKs for Third Party Services

In the course of providing services to you, we may also provide services to you through software development kits ("SDKs") provided by third-party service providers, which collect some of your information. If you refuse to provide information or authority, you will not be able to use the relevant functions. Specifically, it includes the following:

1.4.1 Android SDK:

Third-party SDK Name: Getui Intelligent Push SDK (Including Message Push/Data Analytics Components)
Third-party Company Name: Zhejiang Daily Interactive Network Technology Co., Ltd.
Purpose of Use: Enable real-time message push services, statistics on message delivery rates, and analyze user engagement
Personal Information Involved: Device identifiers (IMEI, MEID, OAID, Android_ID, IDFA, IDFV), MAC address, IP address, location information, network environment identifiers (SSID/BSSID), carrier information, application list information, device serial number, sensor data, running process information
Privacy Policy Link/SDK URL: https://www.getui.com/privacy

Third-party SDK Name: Google Firebase Cloud Messaging (FCM) SDK
Third-party Company Name: Google LLC
Purpose of Use: Enable real-time message push services, track message delivery status, and analyze notification interaction behavior.
Personal Information Involved:
1.Device identifiers
2.IP address
3.Approximate location information (derived from IP address)
4.Network environment identifiers (SSID/BSSID, connection type)
5.Device metadata (OS version, device model, language, time zone)
6.Notification interaction events (e.g., open/close notifications)
Privacy Policy Link/SDK URL:
Google Privacy Policy: https://policies.google.com/privacy
FCM Documentation: https://firebase.google.com/docs/cloud-messaging

Third-party SDK Name: Google ML Kit SDK
Third-party Company Name: Google LLC
Purpose of Use: Provides machine learning capabilities such as image recognition, text scanning, and barcode detection for visual data processing and analysis in smart devices (e.g., camera-equipped door locks)
Personal Information Involved:
1.Device identifiers (Android ID, OAID)
2.Images or video data captured by the camera (processed locally on the 3.device and not uploaded to the cloud)
3.Device model, OS version
4.Network environment identifiers (Wi-Fi SSID/BSSID)
Privacy Policy Link/SDK URL:
Google Privacy Policy: https://policies.google.com/privacy
FCM Documentation: https://developers.google.com/ml-kit

Third-party SDK Name: Fresco SDK
Third-party Company Name: Meta Platforms, Inc.
Purpose of Use: Provides efficient image loading, cache management, and rendering of animated formats (e.g., WebP, GIF) for fast display and memory optimization of image resources in smart devices (e.g., mobile applications).
Personal Information Involved:
1.Device identifiers (Android ID, OAID)
2.Network status information (IP address, Wi-Fi/Cellular connection status)
3.Image cache data stored on the device (stored locally and not actively uploaded)
4.Device model, operating system version
Privacy Policy Link/SDK URL:
Meta Privacy Policy: https://www.facebook.com/privacy/policy/
Fresco Documentation: https://frescolib.org/

Third-party SDK Name: OkHttp
Third-party Company Name: Square, Inc.
Purpose of Use: Used for network requests and data transmission, enabling communication between smart devices and the cloud.
Personal Information Involved:
1.Device identifiers (IMEI, Android ID)
2.IP address
3.Network request data
4.Device model
5.Operating system version
Privacy Policy Link/SDK URL:https://square.github.io/okhttp/

Third-party SDK Name: Retrofit2
Third-party Company Name: Square, Inc.
Purpose of Use: Used to simplify REST API integration, handle HTTP requests, and parse response data for efficient communication between smart devices and cloud services.
Personal Information Involved:
1.Device identifiers (IMEI, Android ID)
2.IP address
3.Network request/response data
4.Device model
5.Operating system version
Privacy Policy Link/SDK URL:https://square.github.io/retrofit/

1.5 Where we obtain your personal information from a third party

In providing you with product functions or services, we may obtain your personal information from third parties with your authorization. In providing you with product functions or services, we may obtain your personal information from third parties with your authorization. In the intelligent scene (device intelligent linkage) function, on the premise of your authorization, we need to obtain the device name, device id and device status of the intelligent device from the intelligent device you have bound, so as to determine whether to trigger the intelligent scene (for example, when you set the sensor to sense someone passing, the lamp lights up). You can add, delete and edit the intelligent linkage rules you set on the "Intelligent" page, or manage whether to turn on or delete the intelligent linkage on the "Scene" page.

When you log in with a third-party account, we need to obtain the account information (avatar, nickname and other information prompted on the authorization page) that you are authorized to share from the third party, and bind your third-party account with your YuTismt account after you agree to this privacy policy, so that you can directly log in and use our products or services through the third-party account. We will use your personal information on the premise of complying with relevant laws and regulations after confirming the legality of the source of personal information in accordance with the agreement with the third party

1.6 You are fully aware that we do not need your consent to collect and use personal information under the following circumstances:

(1) Those related to national security and national defense security;

(2) Those related to public safety, public health and major public interests;

(3) Related to criminal investigation, prosecution, trial and judgment execution;

(4) To respond to public health emergencies, or to safeguard the lives of personal information subjects or other individuals in emergencies;

(5) The personal information collected is disclosed to the public by the subject of personal information;

(6) Your personal information collected from legally disclosed information, such as news reports, government information disclosure and other channels;

(7) Necessary for signing the contract according to your requirements;

(8) Necessary for maintaining the safe and stable operation of the products or services provided, such as discovering and dealing with the faults of the products or services;

(9) Necessary for lawful news coverage;

(10) When an academic research institution is necessary to carry out statistics or academic research in the public interest, and provides the results of academic research or description to the outside world, it de identifies the personal information contained in the results;

(11) Other circumstances stipulated by laws and administrative regulations.

1.7 Non-Personal Information

We may also collect other information that cannot be identified as specific individuals (that is, information that is not personal information), such as statistical data generated when you use specific services, such as user behavior (including clicking, page skipping, and browsing time). The purpose of collecting such information is to improve the services we provide to you. The type and amount of information collected depends on how you use our products and services. We will aggregate such information to help us provide more useful information to our customers about which parts of our websites, products and services they are most interested in. For the purposes of this Privacy Policy, aggregated data are treated as non-personal information. If we use non-personal information in combination with personal information, such information will be treated as personal information during the period of combined use.

2、 How we use cookies and similar technologies

We will use technologies such as cookies, labels and scripts to collect data on your behavior when visiting our official website. These technologies are used to analyze trends, manage websites, track website activities of users, collect demographic information about the entire user base, and are based on separate and summary reports using the above technologies. For the avoidance of doubt, these data are only used to improve the operating experience of our websites.

Log information:When you use our products or services, we will automatically collect your detailed use of our services as relevant weblogs. Operations log information such as your search query content, IP address, language used, date and time of visit, web page records you visited, browser type, browser version, Internet Service Provider (ISP), login/logout page, operating system type and version, login date/time stamp, and click operation data on the website. Please note that separate log information, etc., is information that cannot identify a specific natural person. If we combine such non-personal information with other information to identify the identity of a specific natural person, or use it in combination with personal information, such non-personal information may be regarded as personal information during the period of combined use, and we will anonymize and deidentify such personal information unless authorized by you or otherwise stipulated by laws and regulations.

3、 How do we handle the personal information of minors

Our products and services are mainly for adults. Minors under the age of 14 (hereinafter referred to as "children") shall not create their own user accounts without the consent of their parents or guardians. We consider it the responsibility of parents to supervise the use of our products and services by children. Our policy does not require access to children's personal information or the sending of any promotional materials to children. We will not seek or attempt to seek to receive any personal information from children. For the collection of children's personal information with the consent of parents, we will only use or publicly disclose this information when it is permitted by law, expressly agreed by parents or guardians, or necessary to protect children. If a parent or guardian has reason to believe that a child has submitted personal information to YuTismt without their prior consent, please contact us to ensure that such personal information is deleted and that the minor unsubscribes from any applicable YuTismt service.

4、 Sharing your personal information with third-party service providers

In order to provide you with all the functions of products and services, some of the service contents in this business are provided by third-party service providers, for which we need to provide some of your personal information to third-party service providers. For example, under the following circumstances, we may share your personal information with third-party service providers: We may provide information such as your device identification to positioning service providers for providing positioning services for you. If we share your personal information with these third parties, we will adopt encryption and other means to ensure the security of your information. For companies and organizations with which we share personal information, we will conduct a reasonable review of their data security environment, sign strict data processing agreements with them, require third parties to take sufficient protection measures for your information, and strictly abide by relevant laws, regulations and regulatory requirements. We will not sell any personal information to third parties.

5、 Your Rights

(1) Control settings

Cloud Intelligence acknowledges that everyone has different concerns about privacy. Therefore, we have provided some examples to illustrate the various ways provided by Yuntian Intelligence for you to choose to restrict the collection, use, disclosure or processing of your personal information and control your privacy settings:

Turn on or off location access, camera, telephone, recording, Bluetooth and read-write mobile phone storage rights;

Agree/disagree when the Privacy Policy window pops up; Log in or out of the YuTismt account;

In the YuTismt App, click "My - Profile" to modify your personal information, including nicknames, avatars, etc;

Turn on or off the intelligent linkage of the device.YuTismt App, click "My - Profile" to modify your personal information, including nicknames, avatars, etc;

(2) Your rights to your personal information

According to the laws and regulations of the country or region to which you apply, you have the right to request access to, correct or delete any personal information related to you held by us (hereinafter referred to as the request). More detailed information related to the personal information in your Yuntian Smart Account can be accessed and changed by logging in to your account. Most laws require that requests made by personal information subjects comply with specific requirements, and this Privacy Policy requires that your request comply with the following circumstances:
Through our dedicated request channels, and for the purpose of protecting your information security, your request should be in writing (unless oral application is explicitly recognized by local law);
Provide sufficient information to enable us to verify your identity and ensure that the claimant is the subject of the requested information himself or a legally authorized person;
Once we have sufficient information to confirm that we can process your request, we will respond to your request within the time prescribed by applicable data protection laws. Specifically:
At your request and in accordance with applicable law, we may provide free of charge a record of the personal information we have collected and processed about you,
If you make other requests for relevant information, we may charge you a reasonable fee based on relevant applicable laws and in light of actual management costs.
If you believe that any information we hold about you is incorrect or incomplete, you may request that personal information be corrected or improved for the purpose of use.
Depending on the laws and regulations applicable to you, you may have the right to require us to delete your personal data. We will evaluate your request for deletion, and if the corresponding provisions are met, we will take corresponding steps, including technical means, to deal with them. When you or we assist you in deleting the relevant information, we may not be able to immediately delete the corresponding information from the backup system due to applicable laws and security technologies, and we will securely store your personal information and isolate it from any further processing until the backup can be removed or anonymous.
We have the right to refuse to handle requests that are non-substantive/entangled and repetitive, requests that impair the privacy of others, extremely unrealistic requests, requests for disproportionate technical work, requests that are not required under local law, information that has been made public to the public, and information given under confidential conditions. We may also refuse requests to delete data or access data if we believe that certain aspects of the request may prevent us from legally using the data for the purposes of fraud and security mentioned above.

(3) Revocation of consent

You may contact us to submit a request to revoke your consent to the collection, use and/or disclosure of your personal information in our possession or control. This can be done by revoking the authorization of the Terms of Use and Privacy Policy in the setting. We will process your request within a reasonable time after you make the request and will not collect, use and/or disclose your personal information thereafter in accordance with your request.
Please note that your withdrawal of consent will have certain legal consequences. According to the scope of your revocation of consent to let us process your personal information, this may indicate that you are unable to enjoy the products and services of Yuntian Intelligence.

(4) Cancellation of service or account

If you wish to cancel the Yuntian Intelligent Account, you shall operate with caution because the cancellation of the Yuntian Intelligent Account will make it impossible for you to use the whole line of products and services of Yuntian Intelligent. In order to protect the legitimate rights and interests of you or others, we will judge whether to support your cancellation request in light of your use of various products and services of Yuntian Intelligence.
You can cancel your account through the following path: [My] - [Personal Information] - [Cancellation of Account].
After you cancel your account, we will stop providing you with products/services, and according to your request, unless otherwise stipulated by laws and regulations, we will delete your personal information.
Information retention period:We will process your personal information within one working day for the purposes stated in this policy, unless it is necessary to retain it for a longer period of time in accordance with specific legal requirements. We will determine the appropriate retention period according to the amount, nature and sensitivity of personal information, and after the expiration of the retention period, we will destroy your personal information.
When you explicitly request to delete your personal information, we make this a task and no longer keep your personal information.
If we are unable to destroy the information for technical reasons, we will take appropriate measures to prevent further use of your personal information.

6、 Security

(1) Safety Measures for Cloud and Sky

We promise to keep your personal information safe. To prevent unauthorized access, disclosure or other similar risks, we have put in place reasonable physical, electronic and administrative procedures to protect the information we collect from the cloud intelligent products and services you use. We will take all reasonable measures to protect your personal information.
All your personal information is stored on secure servers and protected in controlled facilities. We classify your data according to importance and sensitivity, and ensure that your personal information has the highest level of security. We guarantee that employees and third-party service providers who access this information to help provide you with products and services have strict contractual confidentiality obligations and that if they fail to fulfill these obligations, they will be subject to disciplinary action or termination of cooperation. To sum up, we regularly review information collection, storage and processing practices, including physical security measures, to prevent any unauthorized access and use.
We will take all practicable measures to protect your personal information. However, you should be aware that the use of the Internet is not always secure, and therefore, we cannot guarantee the security or integrity of any personal information when transmitted in both directions over the Internet.

(2) What can you do

You may play a role in protecting the security of your personal information by not disclosing your login password or account information to anyone (unless that person is formally authorized by you).
Yuntian Intelligence shall not be liable for security omissions caused by third-party access to your personal information due to your failure to maintain the privacy of your personal information. Notwithstanding the above, you must notify us immediately of any unauthorized use of your account by any other user of the Internet or any other security breach.
Your assistance will help us protect the privacy of your personal information.

7、 Retention Policy

The period necessary for us to retain personal information for the purposes of information collection as described in this Privacy Policy, or to comply with applicable relevant legal requirements. Upon completion of the collection purpose, or upon confirmation by us of your application for deletion or cancellation, or upon termination of our operation of the corresponding product or service, we will stop retaining the personal information and make the deletion or anonymization. If it is for public interest, scientific, historical research or statistical purposes, we will continue to retain relevant data on the basis of applicable law, even if further data processing is unrelated to the original collection purpose. In addition, we need to retain your personal information in accordance with relevant laws and regulations under the following circumstances:
According to the Electronic Commerce Law of the People's Republic of China, your commodity and service information and transaction information shall be kept for not less than three years from the date of completion of the transaction.

8、 How to update this policy

We will regularly review the Privacy Policy based on changes in business and technology, and we may update this Privacy Policy. If we make major changes to this privacy policy, we will notify you through the pop-up window in the mobile device app so that you can understand the information we collect and how we use it. Such privacy policy changes will apply from the effective date specified in the notice or website. We recommend that you regularly consult this website for updated information on our privacy practices. Your continued use of products and services on websites, mobile phones and any other devices will be deemed to have accepted the updated privacy policy. We will seek your consent again when we collect more personal information from you or when we use or disclose your personal information for new purposes.

9、 Contact us

If you have any comments or questions about this Privacy Policy, or if you have any questions about the collection, use or disclosure of your personal information by us, please contact us at the address below and refer to the "Privacy Policy". We have a professional team to solve your problems when consulting your rights and requests related to personal information. If your question itself involves more significant matters, we may ask you for more information. If you are not satisfied with the reply received, you may refer the complaint to the relevant regulatory authority in your jurisdiction. If you consult us, we will provide information on the relevant complaint channels that may be applicable according to your actual situation.

contact information
Company: Shenzhen Yuntian Intelligent Terminal Co., Ltd
Address: Room 201, Building 2, No.13, Hourui Second Industrial Zone, Hourui Community, Hangcheng Street, Bao'an District, Shenzhen, China
Contact: Mr. Meng
Email: tan_hj@yuntianzn.net
Postal Code: 518000

Thank you for taking the time to understand our privacy policy!