点击此处切换为中文版本

Click here to switch to the Chinese version of Touch Energy Privacy Policy

Touch Energy Privacy Policy

Version update time: April 16, 2025

Version effective date: April 16, 2025

Prompt clause

[special note]

Touch Energy is an energy carbon management cloud platform and APP developed by Henan Compere Smart Technology Co., Ltd. It integrates the calculation of basic electricity fee, power adjustment electricity fee and multi rate electricity fee, carbon emission monitoring, prepaid management, and energy consumption data monitoring and analysis.

Henan Compere Smart Technology Co., Ltd.(hereinafter referred to as "we") attaches great importance to the protection of users' privacy and personal information.

When you use our services, we may use and collect your relevant information. This privacy policy explains to you how we collect, use, store, and protect your personal information, how we protect your privacy and security, and how you exercise your right to manage personal information, including but not limited to: The various products and services provided to you by web websites, mobile application apps, mini programs, and new forms emerging with technological development.

[Special Instructions - Third Party SDK List Information Sharing List]

We will not share your user information with any other companies, organizations or individuals, except for the following situations:

1. Sharing with explicit consent: after obtaining your explicit consent, we will share your user information with other parties.

2. We may share your user information according to laws and regulations or the mandatory requirements of government departments.

3. Share with our affiliated companies: your user information may be shared with our affiliated companies. We will only share the necessary user information and are bound by the purposes stated in this privacy policy. If the affiliated company wants to change the purpose of user information processing, it will seek your authorization again.

4. Share with authorized partners: for the purposes stated in this policy only, some of our services will be provided by authorized partners. We may share some of your user information with our partners to provide better customer service and user experience. We will only share your user information for legitimate, legitimate, necessary, specific and specific purposes, and only share the user information necessary to provide services. In order to better operate and improve technology and services, you agree that we and our authorized partners can use the information collected for other services and purposes on the premise of complying with relevant laws and regulations.

We will adjust the cooperation information of the third party company / application from time to time according to the specific situation of the cooperation. If we increase the cooperation information of the third party company or application with which we share personal information, we will inform you in time and ask for your authorization consent. The relevant situation and the required authorization are as follows:

(1) SDK Name: JPush SDK
Third party entity: Shenzhen Hexun Huagu Information Technology Co., Ltd
SDK Purpose: To provide information push services for APP users
Scope of information collected by SDK:
1)Device identifiers (including Android ID, GAID, OAID, UAID, IDFA, AAID) are used to generate a unique identifier for desensitized end-user devices to ensure accurate message push.
2)Device hardware information (including device model, device screen resolution, device hardware manufacturer, device product name, device storage space), operating system information (including operating system version, system name, system language), used to ensure compatibility of services on different devices and accurate message delivery.
3)Network information (including network type, operator information, IP address, WIFI status information) is used to determine the network connection status between SDK and server, ensuring the stability and continuity of services.
4)Push information log, used for you to query push service records and understand the delivery status of push information.
5)Device identifiers (including IMEI, MAC, IMSI) are used to supplement the generation of unique identifiers for end-user devices, improve the accuracy of unique device identifiers, and thereby enhance the accuracy and reach rate of push notifications.
6)Network information (including SSID, BSSID, WiFi list information, and base station information) is used to determine ambiguous location information, select nearby push service nodes to provide push services, and improve push reach rate.
7)Software list information (including software list and software running list information), location related information, can help you understand the interests and preferences of your end users and achieve user segmentation push; By providing users with more suitable push content through this feature, we aim to minimize the disturbance caused by useless push content and further enhance the user experience.
8)We use merge link technology to push software list information (including software list and software running list information). When a device has multiple active APP push links, we use merge link technology to randomly merge them into one link to achieve the goal of saving power and data for users. When a device has offline push messages to be sent, the associated start function can be used to send offline messages. When you turn off this service, the associated start will also be turned off, which will increase power and data consumption, and the message reach rate will also decrease. Mainly used to optimize SDK connection, improve push delivery rate and application activity, developers can configure as needed.
9)After receiving the push, the active duration data of the application switches to the backend and frontend. In order to help developers better analyze the push effect and user behavior, further optimize your push strategy, and improve user engagement and conversion rates.
Data processing method: Through de identification, encrypted transmission, and other secure methods
Official website link: https://www.jiguang.cn/push
Privacy Policy Link: https://www.jiguang.cn/license/privacy

(2) SDK Name: Xiaomi Push SDK
Third party entity: Beijing Xiaomi Mobile Software Co., Ltd
SDK Purpose: To improve service stability, facilitate system channels on MIUI, and provide timely, efficient, and stable message push services
Scope of information collected by SDK:
1)Android: Application information (application package name, version number, and running status), push message content, device related information (device manufacturer, device model, device memory, operating system version, Xiaomi push SDK version, device location (country or region), SIM card operator name, current network type, WiFi status), notification bar setting information
2)iOS:IDFV、 Application package name, version number, push message content, device related information (device model, operating system version, Xiaomi Push SDK version), notification bar setting information
Data processing method: Through de identification, encrypted transmission, and other secure methods
Official website link: https://dev.mi.com/console/appservice/push.html
Privacy Policy Link: https://dev.mi.com/console/doc/detail?pId=1822

(3) SDK Name: OPPO Push SDK
Third party entity: Guangdong Huantai Technology Co., Ltd
Usage scenario: Used when pushing messages on OPPO mobile terminals
SDK Purpose: To improve service stability, facilitate system channels on ColorOS, and provide timely, efficient, and stable message push services
Scope of information collected by SDK:
1)The device identifier in the application, Registered Id, generates device identifiers to ensure accurate message push
2)App internal device identifier appKey, generates device identifier to ensure accurate message push
2)App internal device identifier appSecret, generates device identifier to ensure accurate message push
2)MCS application package name, used to support push messages and determine whether the package name exists
2)Application version number, used to support push messages and determine whether the package name exists
2)Push SDK version number, used to support push messages and determine whether the package name exists
Data processing method: a secure processing method for encrypted transmission and processing
Official website link: https://open.oppomobile.com/
Privacy Policy Link: https://open.oppomobile.com/new/developmentDoc/info?id=11228

(4) SDK Name: Huawei HMS SDK
Third party entity: Huawei Software Technology Co., Ltd
Usage scenario: Used when pushing messages on Huawei mobile terminals
SDK Purpose: To improve service stability, facilitate system channels on HarmonyOS, and provide timely, efficient, and stable message push services
Scope of information collected by SDK: application information, device information (device hardware information, system basic information, and system settings)
Data processing method: Through de identification, encrypted transmission, and other secure methods
Official website link: https://developer.huawei.com/consumer/cn/
Privacy Policy Link: https://developer.huawei.com/consumer/cn/doc/development/HMSCore-Guides/sdk-data-security-0000001050042177

(5) SDK Name: Honor Push SDK
Third party entity: Honor Terminal Co., Ltd
SDK usage scenario: Used when pushing messages on Honor mobile terminals
Scope of information collected by SDK: Application Anonymous Identifier (AAID), Application Token
Data processing method: Through de identification, encrypted transmission, and other secure methods
Official website link: https://developer.hihonor.com/cn/
Privacy Policy Link: https://developer.honor.com/cn/docs/11002/guides/sdk-data-security

(6) SDK Name: vivo Push SDK
Usage scenario: Used when pushing messages on vivo mobile terminals
Third party entity: Vivo Mobile Communications Co., Ltd
SDK Purpose: To improve service stability, facilitate system channels on Funtouch OS and OriginOs, and provide timely, efficient, and stable message push services
Scope of information collected by SDK: application basic information, in app device identifiers, device hardware information, system basic information
1)To push the relevant information provided by application developers to your device terminal, we will collect your device identification information (such as IMEI, EmmCID, UFSID, ANDROIDID, UID, GAID, OPENID, VAID, OAID, RegID, encrypted Android ID), application software information using push services (such as application package name, version number, APPID, installation, uninstallation, factory reset, running status), device manufacturer, network related information (such as IP address, network type), country code, device type;
2)To provide you with push services, we will collect timestamps of message creation, delivery, and clicks, and temporarily store the message content obtained from third-party applications and pushed to you;
3)To push and display messages to your device and system, we will collect your push SDK version number, device model, operating system version, current network type, message sending results, notification bar status (such as notification bar permissions, user click behavior), and lock screen status (such as whether the screen is locked and whether lock screen notifications are allowed);
4)To ensure the stability of the push service connection and avoid delayed push notifications, we will collect your IP address for device network optimization. We only process your IP address locally and will not upload this data to the server or use it for your identification.
5)We may associate the information collected from your various devices so that we can provide you with consistent services on these devices. We will use this information to analyze and develop statistical information related to the use of our products or services, in order to better improve our products or services, such as optimizing folding message algorithms.
6)To provide you with scenario based message push services, we may use your mobile system status information and application behavior data. For details, please refer to the "AI Service Engine Privacy Statement";
7)To provide you with more personalized services, we may collect your push message content, notification bar status (such as notification bar permissions, user click behavior) to form a user profile. For details, please refer to the "vivo Personalized Service Privacy Statement".
Data processing method: Through de identification, encrypted transmission, and other secure methods
Official website link: https://dev.vivo.com.cn/promote/pushNews
Privacy Policy Link: https://dev.vivo.com.cn/documentCenter/doc/652#w1 -12075822

(7) SDK name: App Alipay client SDK
Third party subject: Alipay (China) Network Technology Co., Ltd
SDK purpose: To facilitate your payment behavior when purchasing platform goods or services
Types of personal information collected by SDK: Android ID、OAID、AAID、SSID、BSSID; System settings, system properties, device model, device brand, operating system; IP address, network type, operator information, Wi Fi status, Wi Fi parameters, Wi Fi list.
Data processing method: Through de identification, encrypted transmission, and other secure methods
Purpose of use:
A. Ensure the security of user accounts and funds, as well as the safe and stable operation of payment services.
B. Fulfill legal obligations such as anti money laundering, counter-terrorism financing, and anti telecommunications fraud.
C. Implement the selection and optimization of network links to enhance user experience.
Official website link: https://open.alipay.com
Privacy Policy Link: https://opendocs.alipay.com/common/02kiq3

(8)SDK Name: WeChat Pay SDK
Third party entity: Tenpay Payment Technology Co., Ltd
SDK purpose: To facilitate your payment behavior when purchasing platform goods or services
Types of personal information collected by SDK: WeChat Pay authorization information, Mac address IMEI、Android_id、IMSI
Data processing method: Through de identification, encrypted transmission, and other secure methods
Official website link: https://pay.weixin.qq.com
Privacy Policy Link: https://support.weixin.qq.com/cgi-bin/mmsupportacctnodeweb-bin/pages/RYiYJkLOrQwu0nb8

(1) SDK Name: Tencent Bugly (Compliance Version)
Third party developer entity: Shenzhen Tencent Computer System Co., Ltd
Usage scenario: When counting abnormal situations
Purpose of SDK: To improve service stability and facilitate quick and accurate identification of problems in the event of service crashes
Scope of information collected by SDK:
Bugly SDK for Android:
1)Mobile phone model: troubleshoot crash issues, help improve app stability, identify whether crashes and other issues are related to the phone model, encrypt transmission
2)Mobile phone brand: troubleshoot crash issues, help improve app stability, identify whether crashes and other issues are related to the mobile phone brand, encrypt transmission
3)Android system version: troubleshooting crash issues, helping apps improve stability, identifying whether crashes and other issues are related to the Android system version, encrypting transmission
4)Android system API level: troubleshooting crash issues, helping apps improve stability, identifying whether crashes and other issues are related to Android system APIs, encrypting transmission
5)Manufacturer's system version: troubleshooting crash issues, helping APP improve stability, identifying whether crashes and other issues are related to the manufacturer's system version, encrypting transmission
6)CPU architecture type: troubleshooting crash issues, helping APP improve stability, identifying whether crashes and other issues are related to CPU architecture, encrypted transmission
7)Whether the device is rooted: When the APP crashes, identify whether the crash and other issues are caused by root and encrypt the transmission
8)Disk space occupation size: When the APP crashes, identify whether the crash or other issues are caused by small remaining disk space and encrypt the transmission
9)Sdcard space occupation size: When the APP crashes, whether the recognition of crashes and other issues is due to the small remaining space on the sdcard, encrypted transmission
10)Memory space occupation size: When the APP crashes, identify whether the crash and other issues are caused by small memory space, and encrypt the transmission
11)Network type: When the APP crashes, identify whether issues such as crashes are related to the network type and encrypt transmission
12)The name and PID of the currently running process of the application: When the APP crashes, determine the ANR status of the current process, troubleshoot crash issues, help improve stability of the APP, only read, not save locally, and not upload to the server

Bugly SDK for iOS:
1)Device model: troubleshoot crash issues, help improve app stability, identify whether crashes and other issues are related to the phone model, encrypt transmission
2)Operating System Version: Troubleshooting crash issues, helping APP improve stability, identifying whether crashes and other issues are related to the operating system version, encrypting transmission
3)Internal version number of operating system: troubleshooting crash issues, helping APP improve stability, identifying whether crashes and other issues are related to the internal version number of the operating system, encrypting transmission
4)WiFi status: troubleshoot crash issues, help improve app stability, identify whether crashes and other issues are related to network status, encrypt transmission
5)CPU properties: troubleshoot crash issues, help improve app stability, identify whether crashes and other issues are related to CPU construction, encrypt transmission
6)Remaining memory space: When the APP crashes, identify whether issues such as crashes are caused by small remaining memory space and encrypt transmission
7)Disk space/remaining disk space: When the APP crashes, identify whether the crash or other issues are caused by small remaining memory space and encrypt the transmission
8)Run time phone status (memory occupied by processes, virtual memory, etc.): When the APP crashes, identify whether the crash or other issues are caused by abnormal memory usage of the current APP, and encrypt the transmission
9)Idfv: troubleshooting crash issues, helping APP improve stability, used for device identification, providing indicators such as APP networking device count and crash rate, encrypted transmission
10)Whether to jailbreak: When the APP crashes, identify whether the crash and other issues are caused by device jailbreaking, and encrypt the transmission
11)Region code: When the APP crashes, identify whether the Crash and other issues are related to the device's region and encrypt the transmission
Handling method: SDK local collection, does not involve data sharing
Data processing method: Through de identification, encrypted transmission, and other secure methods
Official website link: https://bugly.qq.com/v2/
Privacy Policy Link: https://privacy.qq.com/document/preview/fc748b3d96224fdb825ea79e132c1a56

(10)SDK Name: Amap SDK
SDK purpose: to facilitate the recording of current location information when creating patrols and work orders
The types of personal information collected by SDK include device identifiers (IMEI, MEID, IDFA, Android ID, MAC address, etc.) OAID、IMSI、OpenUDID、ICCID、 Hardware serial number and other device related information), application information (application crash information, notification switch status, application installation list, and other application related information), device parameters and system information (device type, device model, operating system and hardware related information, operator information, external storage directory, Bluetooth information), device network environment information (IP address, WiFi information), SSID、BSSID、 Base station information and other network related information, sensor information (vector, geomagnetic, acceleration, gyroscope, direction, photosensitive, pressure, gravity, step counting, step detection), shear plate
1)IDFA, Track, troubleshoot, diagnose, and analyze various issues in the service
2)OAID, Track, troubleshoot, diagnose, and analyze various issues in the service
3)GAID, Track, troubleshoot, diagnose, and analyze various issues in the service
4)Application name, service authentication, tracking, troubleshooting, diagnosis, and statistical analysis of various issues in the service
5)Application version number service authentication, tracking, troubleshooting, diagnosing, and statistical analysis of various issues in the service
6)Equipment brand and model, tracking, troubleshooting, diagnosis, and statistical services for various issues
7)Various issues in the operating system, tracking, troubleshooting, diagnosis, and statistical services
8)Operator information to assist in improving network positioning accuracy
9)Screen resolution, various issues in tracking, troubleshooting, diagnosis, and statistical services
10)IP address, providing network location
11)GNSS information, obtaining satellite status, optimizing and judging satellite positioning effectiveness
12)Network type, used to identify the current network status (4G/5G or WiFi)
13)WiFi status, used to identify network status and information for auxiliary positioning
14)WiFi parameters, used to identify network status and information for auxiliary positioning
15)WiFi list, used to identify network status and information for auxiliary positioning
16)WiFi signal strength information is used to identify network status and information for auxiliary positioning
17)WiFi gateway address, used to identify network status and information for auxiliary positioning
18)SSID, Used to identify mobile hotspots and optimize positioning performance
19)BSSID, Used for network WiFi positioning on the server side
20)Base station information, used by the server for network base station positioning
21)Sensor information (vector, acceleration, pressure) used for auxiliary positioning
22)Equipment signal strength information helps improve network positioning accuracy
23)Longitude and latitude provide users with accurate location information
Data processing method: Through de identification, encrypted transmission, and other secure methods
Official website link: https://lbs.amap.com
Privacy Policy Link: https://lbs.amap.com/pages/privacy/

(11) SDK Name: Alibaba Cloud Number Authentication SDK
Third party entity: Alibaba Cloud Computing (Beijing) Co., Ltd
SDK purpose: to facilitate users to quickly log in with one click using their local phone number
Types of personal information collected by SDK: network type, device information (including IP address, device manufacturer, device model, mobile operating system, SIM card information, SIM State)
Data processing method: Through de identification, encrypted transmission, and other secure methods
Official website link: https://www.aliyun.com
Privacy Policy Link: https://terms.aliyun.com/legal-agreement/terms/suit_bu1_ali_cloud/suit_bu1_ali_cloud202112211045_86198.html?spm=a2c4g.11186623.0.0.1f3f68ccHXFco1

(12)SDK Name: 360 Reinforcement SDK (applicable to APK/HAP/APK plugins/SDK reinforcement)
Third party subject: Beijing 360 Zhiling Technology Co., Ltd
Scope of information collected by SDK:
1)Strengthen the package information, including the MD5 of the package name, version, and signature file of the application or SDK; Used for basic reinforcement services, as well as piracy monitoring, operational data analysis, crash log analysis, terminal environment detection, virus and Trojan detection services.
2)Basic device information, network type, system operating language environment, operating system version name, operating system version, model, system version, manufacturer, terminal motherboard name, brand, device memory size, phone screen resolution, operating environment; Used for basic reinforcement services, as well as piracy monitoring, operational data analysis, crash log analysis, and terminal environment detection services.
3)Network information, DNS server IP, whether VPN is enabled or not; Used for basic reinforcement services and terminal environment detection services.
4)Security information, security patch program level; Used for basic reinforcement services, as well as crash log analysis and terminal environment detection services.
5)Terminal environment information, Android ID、OAID,root、xposed、 be dismissed from public office and expelled from the Party frida、 Simulator environment; Used for basic reinforcement services, as well as terminal environment detection, risk equipment identification, and reinforcement program shell shedding adversarial detection.
SDK purpose: Used for detecting and diagnosing App malfunctions, App security reinforcement protection, piracy detection services, threat environment detection services, in order to help users quickly solve abnormal situations
Device permissions: none
The type of personal information collected by SDK: The authorization method is determined by the app developer, and it is activated when the end user agrees to authorize the developer's app for this permission
Data processing method: Through de identification, encrypted transmission, and other secure methods
Official website link: https://jiagu.360.cn
Privacy Policy Link: https://jiagu.360.cn/#/global/help/322

(13) SDK Name: PayPal Checkout SDK
Third party developer entity: Paypal Holdings, Inc.
Scope of information collected by SDK: 1)Payment related information: such as the user's PayPal account information, credit or debit card information (including card number, expiration date, security code, etc.), payment amount, currency type, etc. 2)User basic information: may include name, contact information (such as email address, phone number), etc., used to identify the user's identity and complete transactions. 3)Device information, such as device model, operating system version, device unique identifier (such as IMEI, Android ID, etc.), IP address, etc., helps to understand the device environment used by users, improve transaction security, and conduct risk assessments. 4)Transaction related information: such as transaction time, transaction location (based on IP address or GPS information), transaction status, etc., to facilitate tracking and management of the transaction process.
Purpose of SDK: To enable users to conveniently and quickly use PayPal accounts or credit cards for payments within Android applications, supporting scenarios such as single payment and future payments, and providing convenient payment solutions for applications
Data processing method: Through de identification, encrypted transmission, and other secure methods
Official website link: https://www.paypal.com
Privacy Policy Link: https://www.paypal.com/us/legalhub/paypal/privacy-full

[[Special] note]

Please read and fully understand this privacy policy before using our service. If you use or continue our service, it means that you fully understand all contents of this Privacy Policy and agree that we will handle your relevant information in accordance with this privacy policy.If you do not agree with this privacy policy or any part of it, please contact us for a satisfactory reply before you choose to agree.

Please note that this policy does not apply to other third party products / services (other third parties, including your trading partner, any third party website and third party service provider, etc.), accessed by you through our products / services, and refer to the privacy policy or similar statement of such third party.

This privacy policy will help you understand the following:

1、How do we collect and use your personal information

2、How do we use cookies and similar technologies

3、How do we share, transfer and publicly disclose your personal information

4、How do we protect and preserve your personal information

5、How do we store your personal information

6、How do you manage your personal information

7、How do we protect and process children's personal information

8、Cross border transmission of your personal information

9、Disclaimer

10、How to change this policy

11、How to contact us

Privacy policy text

1、How do we collect and use your personal information

When you use our services, you need to authorize or choose to authorize us to collect and use your personal information in scenarios including:

1. In order to provide you with the basic functions of services, you need to authorize us to collect and use the necessary information. If you refuse to provide the necessary information, you will not be able to use our services normally;

2. In order to ensure that the application is closed or in background running state can normally receive the broadcast information pushed by the client, the application must use (self-start) ability, there will be a certain frequency through the system to send broadcast to wake up the application self-start or associated start behavior, which is necessary to achieve the function and service.

3. When you open the content push message of the app, after obtaining your explicit consent, it will jump to the app to open the relevant content. Without your consent, there will be no associated start.

4. When you open the file downloaded from the app, it will be associated with the launch of the third-party app.

5. In order to provide you with the expanded functions of the service, you can choose to authorize us to collect and use the information. If you refuse to provide the above information, you will not be able to normally use the relevant additional functions or participate in specific activities, and will not be able to achieve the functional effects we intend to achieve, but it will not affect your normal use of the basic functions of our service.

(1) When you use the service, you need to be authorized to collect and use your personal information: we will follow the principle of "reasonable, relevant and necessary", and will only collect and use your personal information for the following purposes described in this privacy policy.

1)Login / registration function

In order to comply with the requirements of our laws and regulations, and to provide you convenient services, when you log in / register with our platform, when you register as our user, you need to provide at least your mobile phone number to create an account. You should ensure that the mobile phone number provided by opening this service is owned and valid by yourself, and authorize us to verify the authenticity and validity of the mobile phone number provided by you through a third party channel.

2)Security function

In order to enhance the security of your account, transaction and system operation, we will obtain your device information, including the device attributes, connection and status information, such asdevice model, unique device identifier (such as IMEI / androidID / IDFA / openudid / guid, SIM card IMSI information, etc.) and device information, with your authorization, after meeting the relevant requirements of laws and regulations and our agreement rules MAC address, software list, etc. Basic service function When you use our services, you need to provide your device information or software information, IP address, version and device identification number (IDFA / IMEI) of your mobile device, as well as configuration information used to access our services through web browser and mobile device. These are the basic information we must collect for providing services. If you refuse to provide the above information, you can't use some of our services properly.

(2) You can choose the scenario where we are authorized to collect and use personal information

To enhance your user experience, we may collect and use your personal information based on the relevant permissions of your authorized mobile device operating system. If you do not provide these personal information, it will not affect the basic features of your use of our platform. The relevant permissions and corresponding functions after opening are as follows:

1) Camera permission: after it is turned on, you can scan the device's QR code, take photos and upload information such as device defects;

2) Album permissions: after activation, it allows you to save pictures to your local phone album while viewing them;

3) Memory card permission / file storage function: after being turned on, it is used to save your login information and search records. It can avoid the problem of re login, quickly and automatically log in to the account, and view the search history;

4) Notification authority: after opening, it will obtain your application account list and provide you with message notification service, including equipment alarm information, patrol plan information and work order information;

5) Location permissions: after activation, your location will be obtained, allowing you to record your current location while inspecting work orders;

(3)Application Permission Application and Usage Description

1. To ensure the safe and stable operation of APP related products or services, we may apply for or use relevant permissions of the operating system;
1. To ensure the safe and stable operation of APP related products or services, we may apply for or use relevant permissions of the operating system; 2. To protect your right to know, we display the relevant operating system permissions that products or services may apply for and use through the following list. You can manage the relevant permissions according to your actual needs;
3. According to the upgrade of products or services, the types and purposes of permission applications and usage may change. We will adjust the list in a timely manner based on these changes to ensure that you are informed of the application and usage of permissions in a timely manner

Android operating system application permission list
1)android.permission.CAMERA
Collection field: shooting content
Collection method: Take videos, photos, scan codes
Collection frequency: using video shooting, taking photos, scanning codes, and
Complete video shooting, taking photos, and scanning codes

2)[Below Android 13 system] android.permission.WRITE_EXTERNAL_STORAGE,android.permission.READ_EXTERNAL_STORAGE
Collecting Fields: Photos
Collection method: Upload photos
Collection frequency: Use uploaded photos
Upload pictures for feedback and inspection work orders

3)android.permission.POST_NOTIFICATION
Collecting Fields: Notification
Collection method: Push notifications
Collection frequency: push notifications
Equipment alarm, inspection plan, work order push

4)android.permission.ACCESS_FINE_LOCATION
Collecting fields: precise location
Collection method: Obtain accurate geographic location through Global Positioning System (GPS) or network location information (such as base stations or WLAN)
Collection frequency: Collect according to the user's set frequency
When inspecting work orders, record the current location information

5)android.permission.ACCESS_COARSE_LOCATION
Collect fields: rough location
Collection method: Obtain approximate geographic location information through network location information (such as base stations or WLAN)
Collection frequency: Collect according to the user's set frequency
When inspecting work orders, record the current location information

6)android.permission.NFC
Collect fields: NFC
Collection method: Identify device information through NFC
Collection frequency: Collect according to the user's set frequency
When inspecting work orders, identify device information through NFC

7)android.permission.INTERNET
Access network permissions
Implement application networking

8)android.permission.ACCESS_WIFI_STATE
Obtain WiFi status permission
Monitor network changes and alert users to the current network environment

9)android.permission.ACCESS_NETWORK_STATE
Obtain network status permission
Monitor network changes and alert users to the current network environment

10)android.permission.CHANGE_WIFI_STATE
Change WiFi status permissions
Allow applications to change WiFi status


iOS operating system application permission list
1)NSCameraUsageDescription
Collection field: shooting content
Convenient for scanning the device QR code or taking photos to upload device images for you

2)NSLocationAlwaysAndWhenInUseUsageDescription(During the use of the app and always allowing location retrieval); NSLocationAlwaysUsageDescription(Always allow location retrieval);NSLocationWhenInUseUsageDescription(Allow location retrieval during app usage)
Collecting Fields: Location Information
Collection method: acquire precise or rough geographical location through satellite and network information (such as base station or WLAN), which can be adjusted in settings
Collection frequency: Collect according to the user's set frequency
Convenient for you to record your current location when inspecting work orders

4)NSPhotoLibraryAddUsageDescription(album);NSPhotoLibraryUsageDescription(Album Usage)
Collection fields: pictures
It is convenient to save pictures for you or upload device pictures

5)NSUserTrackingUsageDescription(IDFA)
Get advertisement identifier
Used to identify devices and recommend high-quality content for you


Application permission list of HarmonyOS operating system
1)ohos.permission.INTERNET
Allow Internet access
Enable Application Networking

2)ohos.permission.GET_NETWORK_INFO
Allow applications to obtain data network information.
Monitor network changes and prompt users of current network environment

3)ohos.permission.APPROXIMATELY_LOCATION(Fuzzy location)
Collection fields: rough location
Collection method: obtain approximate geographic location information through network location information (such as base station or WLAN)
Collection frequency: collect and confirm the user login environment according to the frequency set by the user, ensure the security of the user account, and roughly recommend products and/or services that can be delivered/delivered to you

4)ohos.permission.MEDIA_LOCATION
Collection fields: rough location
Collection method: obtain approximate geographic location information through network location information (such as base station or WLAN)
Collection frequency: collect and confirm the user login environment according to the frequency set by the user, ensure the security of the user account, and roughly recommend products and/or services that can be delivered/delivered to you

5)ohos.permission.LOCATION
Collection field: precise location
Collection method: obtain accurate geographical location through global positioning system (GPS) or network location information (such as base station or WLAN)
Collection frequency: automatically enter the receiving address according to the frequency set by the user and recommend products and/or services that can be delivered/delivered in the context of local retail
6)ohos.permission.READ_IMAGEVIDEO(Read picture)
Collection field: photo/video/audio
Collection method: upload photos/videos/audio
Collection frequency: use the photo shopping function when uploading photos/videos/audio and the list display, evaluation and question and answer functions

7)ohos.permission.WRITE_IMAGEVIDEO(Modify picture)
Collection field: photo/video/audio
Collection method: upload photos/videos/audio
Collection frequency: use the photo shopping function when uploading photos/videos/audio and the list display, evaluation and question and answer functions

8)ohos.permission.APP_TRACKING_CONSENT
Allow apps to read open anonymous device identifiers.
Used to identify devices to recommend quality content to you

9)ohos.permission.READ_PASTEBOARD(clipboard)
Read system clipboard contents
Copy and share product information, title, SMS verification code

10)ohos.permission.CAMERA
Collection field: shooting content
Collection method: take video, photos, scan code
Collection frequency: when using video capture, photographing, code scanning and face recognition to log in
Photo shopping function, list display, evaluation and Q&a function

11)ohos.permission.MICROPHONE
Collection field: recording content
Collection method: recording
Collection frequency: when using voice input, voice search and Internet telephone service
Identify your shopping needs, customer service and after-sales needs

12)ohos.permission.DISCOVER_BLUETOOTH
Allows applications to configure local Bluetooth, find and pair with remote devices.
Use of Bluetooth function in app

13)ohos.permission.USE_BLUETOOTH
Allow apps to view Bluetooth configuration.
Use of Bluetooth function in app

14)ohos.permission.ACCESS_BLUETOOTH
Allow applications to access Bluetooth and use Bluetooth capabilities, such as pairing, connecting peripheral devices, etc.
Use of Bluetooth function in app

15)ohos.permission.GET_BUNDLE_INFO
Allows you to query the basic information of the application.
Prompt users to update, improve user experience and ensure application security

16)ohos.permission.GET_WIFI_INFO
Allow apps to get Wi Fi information. Monitor network changes and prompt users of current network environment

17)ohos.permission.SET_NETWORK_INFO
Allows the application to configure the data network.
Allow apps to change network connection status

18)ohos.permission.PUBLISH_AGENT_REMINDER
Allow the app to use background proxy alerts.
Remind users to pay attention to promotional activities of specific products or rush to buy within a limited time

19)ohos.permission.NFC_TAG
Real name authentication read ID card
Scan user ID card with NFC capability to realize ID card information collection

2、 How do we use cookies and similar technologies

To ensure the normal operation of the website, we will store a small data file called cookie on your computer or mobile device. Cookies usually contain identifiers, site names, and some numbers and characters. With the help of cookies, websites can store your access preference data.

We will not use cookies for any purpose other than those described in this policy. You can manage or delete cookies based on your preferences. You can clear all cookies saved on your computer, and most web browsers have the function of blocking cookies. But if you do, you need to change the user settings yourself every time you visit our website.

3、How do we share, transfer and publicly disclose your personal information

(1) Share

[Third Party SDK List Information Sharing List]

(2) Assignment

We will not transfer your user information to any company, organization or individual, except for the following circumstances:

1. Transfer with explicit consent: after obtaining your explicit consent, we will transfer your user information to other parties;

2. In case of merger, acquisition or bankruptcy liquidation, if the transfer of user information is involved, we will require the new company or organization holding your user information to continue to be bound by this privacy policy, otherwise we will require the company or organization to seek your authorization again.

(3) Public disclosure

We will only publicly disclose your user information under the following circumstances:

1. With your explicit consent;

2. Law based disclosure: we may publicly disclose your user information when required by law, legal proceedings, litigation or government authorities.

4、 How do we protect and preserve your personal information

(1) We have used industry standard security measures to protect your personal information from unauthorized access, public disclosure, use, modification, damage or loss. We will take all reasonable and feasible measures to protect your personal information. For example, we will use encryption technology to ensure the confidentiality of data; we will use trusted protection mechanisms to prevent malicious attacks on data; we will deploy access control mechanisms to ensure that only authorized personnel can access personal information; and we will hold security and privacy protection training courses to enhance employees' awareness of the importance of protecting personal information.

(2) In the use of data, we strictly abide by the principle of minimum authorization for the operators who are authorized to access data, so that they can only access the minimum personal information required by their authority, and only have the minimum data operation authority required to complete their duties. In addition, we set the approval process for important data operations, and separate the roles of security management personnel, data operators, and auditors. In data transmission, we use strong encryption to protect the transmitted data, and we also use strong encryption to protect the localized stored procedure of data.

(3) We will take all reasonable and feasible measures to ensure that no irrelevant personal information is collected. We will only retain your personal information for the period required to achieve the purposes set forth in the cost privacy policy unless it is necessary to extend the retention period or be permitted by law.

(4) The Internet environment is not 100% secure. We will try our best to ensure or guarantee the security of any information you send to us. If our physical, technical, or management protection facilities are damaged due to the reasons attributable to us, resulting in unauthorized access, public disclosure, tampering, or destruction of information, resulting in damage to your legitimate rights and interests, we will bear the corresponding legal responsibility.

(5) After the unfortunate personal information security incident, we will timely inform you of the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, the suggestions that you can prevent and reduce the risk on your own, and the remedial measures for you in accordance with the requirements of laws and regulations. We will timely inform you of the relevant information of the event by mail, letter, telephone, push notice, etc. when it is difficult to inform the personal information subject one by one, we will take a reasonable and effective way to issue an announcement. At the same time, we will actively report the disposal of personal information security incidents in accordance with the requirements of regulatory authorities.

5、 How do we store your personal information

We do our best to store your personal information in a reliable and secure way, and we only process it when necessary.

Unless otherwise stipulated by laws and regulations, we will only keep your information for the period necessary to achieve the purpose stated in this policy. For example, the "e-commerce law of the people's Republic of China" requires that the storage time of commodity and service information and transaction information shall not be less than three years from the date of completion of the transaction. At the same time, we will judge the aforementioned period according to the following criteria:

1. Complete the transaction purpose related to you, maintain the corresponding transaction and business records, and deal with your possible inquiries or complaints;

2. Ensure the safety and quality of our services for you;

3. Whether you agree to a longer retention period;

4. Other special agreements on whether or not to be retained.

When you cancel the authorization, delete your personal information or cancel your account, we will delete your personal information according to the law, or anonymize it as permitted by the law. We do our best to store your personal information in a reliable and secure way, and we only process it when necessary.

6、 How do you manage your personal information

In accordance with relevant laws, regulations, standards and the common practices of other countries and regions, we guarantee that you can exercise the following rights to your personal information:

(1)Access and correct your personal information

You have the right to access and correct your personal information, except for exceptions stipulated by laws and regulations. You can visit and correct your personal information on the "I - related information" function page. You can't change your mobile phone number after you provide it to us. If you need to change it, please contact us through the contact information at the bottom of this privacy policy. We will respond to your request through customer service phone or email within 15 days.

(2)Delete your personal information or cancel your account

In the following cases, you can request us to delete your personal information:

1. If we collect and use personal information in violation of laws and regulations;

2. If we violate the agreement with the subject of personal information, collect and use personal information, violate the provisions of laws and regulations or the agreement with the subject of personal information, and publicly disclose personal information;

3. If you no longer use our products or services, or you cancel your account;

4. If we no longer provide products or services for you.

You can contact us at any time through the contact information announced at the bottom of this privacy policy to ask for the deletion of personal information or cancellation of your account. We will respond to your request by customer service telephone or email within 15 days.

(3)Change, withdraw the scope of your authorized consent and unsubscribe the commercial advertisement

You can contact us at any time through the contact information publicized at the bottom of this privacy policy. We will reply to your request to change the scope of authorization and unsubscribe from commercial advertisement through customer service telephone or email within 15 days. You may also choose to unsubscribe from the commercial according to our advertisement / promotion email / information.

(4) Under the following circumstances, we will not be able to respond to your request according to the requirements of laws and regulations:

1. Directly related to national security and national defense security;

2. Directly related to public safety, public health and major public interests;

3. Directly related to criminal investigation, prosecution, trial and execution of judgment, etc;

4. There is sufficient evidence to show that you have subjective malice or abuse of rights;

5. Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations;

6. Involving trade secrets.

7、 How do we protect and process children's personal information

We attach great importance to the protection of children's personal information. Our products, websites and services are mainly for adults. Children should not create their own user accounts without the consent of their parents or guardians. Although local laws and customs define children differently, we regard anyone under 14 as a child.

In the case of collecting children's user information with the consent of parents or guardians, we will only store, use or publicly disclose this information when it is permitted by law, explicitly agreed by parents or guardians, or necessary for the protection of children. Otherwise, we will try to delete the relevant data as soon as possible.

In view of the limitations of existing technology and business model, it is difficult for us to actively identify children's personal information. If you find that we have collected children's personal information without knowing it or obtaining the consent of a verifiable guardian in advance, you can contact us in time. We will try to delete it in time after we find it. If we find the above situation ourselves, I will We will delete them in time, except for those we are required to keep by law.

8、 Cross border transmission of your personal information

At present, our personal information collected and generated in the people's Republic of China will be stored in the people's Republic of China without any cross-border transmission.

9、 Disclaimer

This privacy policy only applies to the data we collect and use. We choose a reputable third-party company or website as our partner to provide users with information and services. We may provide links (including but not limited to SDK or API) to the above partners. Once you click into the partner's website, our privacy terms will no longer take effect. We suggest that you check the privacy terms of the partner's website and confirm Understand the partner's regulations on the collection, use and processing of your personal information.

10、 How to change this policy

(1)This privacy policy is updated with the effective date at the top of the page.

(2)When applicable laws and policies change, or our product or service functions change significantly, our privacy policy may change.

11、 How to contact us

If you have any questions, comments or complaints about this Privacy Policy and your privacy options, please contact us.

Company name: Henan Compere Smart Technology Co., Ltd.

Address: Unit 1, Building 38, Liandong U Valley, No. 352 Lianhua Street, High tech Industrial Development Zone, Zhengzhou City, Henan Province (450066)

Customer service hotline: 400-0371-828

Email: service@compere-power.com