ProjectEV+ Privacy Policy

Release Date: June 12, 2025
Effective Date: June 12, 2025

Shenzhen Atess Power Technology Co.,Ltd (hereinafter referred to as "we", "us", or the "Company") fully recognizes the importance of your personal information and is committed to protecting the security of your personal information in accordance with relevant laws and regulations. This Privacy Policy (hereinafter referred to as "this Policy") aims to clearly and transparently explain how we collect, use, store, share, transfer, and protect your personal information when you use our ProjectEV+ mobile application (APP) and related services (hereinafter referred to as "the Services"), as well as how you can manage your personal information.

Please read this Policy carefully and understand it fully before using the Services. When you start downloading, accessing, or using the Services, it means that you have agreed to our processing of your personal information in accordance with this Policy. If you do not agree to any terms of this Policy, please stop using the Services immediately.

How We Collect and Use Your Personal Information

We will only collect and use your personal information within the minimum necessary scope and for the purpose of achieving the business functions described below in this Policy. If you do not provide the corresponding information, you may be unable to use certain services or features, but this will generally not affect your use of the basic charging functions.

(1) Registration and Account Management

(2) Service Operation and Function Implementation

(3) Permissions Required for Specific Functions

During the provision of services, based on specific functional scenarios, we may require you to authorize the following device permissions. You can manage or revoke these authorizations at any time in your device system settings. Refusing authorization may render the related functions unavailable, but it will not affect your use of other functions that do not require that permission.

(4) Exceptions Requiring Prior Authorization

According to relevant laws, regulations, and national standards, your authorization and consent are not required for the collection and use of personal information in the following circumstances:

  1. Directly related to national security and national defense security;
  2. Directly related to public security, public health, and significant public interests;
  3. Directly related to criminal investigation, prosecution, trial, and execution of judgments, etc.;
  4. Necessary for safeguarding the life, property, and other significant legitimate rights and interests of you or another individual, where it is difficult to obtain the consent of the individual;
  5. Where the personal information collected is voluntarily disclosed by you to the public;
  6. Where personal information is collected from legally disclosed information, such as through lawful news reporting, government information disclosure, and other channels;
  7. Necessary for concluding or performing a contract at your request;
  8. Necessary for maintaining the safe and stable operation of the Services, such as discovering and handling failures of products or services;
  9. Other circumstances stipulated by laws and regulations.

How We Use Cookies and Similar Technologies

How We Share, Transfer, and Disclose Your Personal Information

We attach great importance to the confidentiality of your personal information. Without your separate consent, we will not share or transfer your personal information with any company, organization, or individual, nor will we publicly disclose your personal information, except in the following circumstances:

(1) Sharing

  1. Sharing after obtaining your explicit authorization or consent.
  2. Sharing under statutory circumstances: Sharing as required by laws and regulations, for resolving litigation disputes, or as mandated by competent government authorities such as administrative or judicial organs.
  3. Sharing with Authorized Partners: To achieve the purposes described in this Policy, we may engage authorized partners (such as suppliers providing data storage, server operation and maintenance, security protection, and data analysis services) to provide services on our behalf. We sign strict confidentiality agreements with them, requiring them to process personal information according to our instructions, this Policy, and any other relevant confidentiality and security measures, and prohibiting them from using the information for any other purpose. We only share personal information necessary to provide the services.
  4. Sharing with Affiliates: To facilitate providing services to you based on a unified account system, your personal information may be shared within our affiliates (i.e., companies that control us, are controlled by us, or are under common control with us). We will only share necessary personal information, and such sharing will be bound by the purposes described in this Policy. If an affiliate needs to change the processing purpose, it will seek your authorization and consent again.

(2) Transfer

We will not transfer your personal information to any company, organization, or individual, except in the following cases:

  1. Transfer after obtaining your explicit consent.
  2. In the event of a merger, acquisition, or bankruptcy liquidation: If a transfer of personal information is involved, we will require the new holder of your personal information to continue to be bound by this Policy; otherwise, we will require them to obtain your authorization and consent anew.

(3) Public Disclosure

We will only publicly disclose your personal information in the following circumstances:

  1. After obtaining your explicit consent.
  2. Based on legal requirements: When required by law, legal procedures, litigation, or mandatory requirements from government authorities.

(4) Exceptional Circumstances

According to laws and regulations, sharing, transferring, or publicly disclosing your personal information in the following circumstances does not require prior authorization and consent (the specific items correspond to items 1-6 listed in Chapter I(4)).

How We Protect Your Personal Information

We have adopted security protection measures that comply with industry standards and are reasonably feasible to protect your personal information from unauthorized access, public disclosure, use, modification, damage, or loss:

  1. Technical Measures: Using encryption technologies (such as SSL/TLS) to protect data transmission security; employing HTTPS secure browsing; encrypting stored personal information; deploying security protection mechanisms such as firewalls and intrusion detection; implementing strict access control to ensure only authorized personnel can access personal information; establishing data security audit mechanisms.
  2. Administrative Measures: Establishing specialized management systems, processes, and organizations to ensure information security; signing confidentiality agreements with employees and partners; regularly conducting security and privacy protection training to enhance employee awareness.
  3. Minimized Storage: We only store personal information necessary for the purposes described in this Policy and employ technical measures such as de-identification and anonymization. We only store your personal information for the period necessary to achieve the purposes described in this Policy and as required by laws and regulations, or for the reasonable period required by business functions. After the expiration of such periods, we will delete your personal information or anonymize it.
  4. Security Incident Response: Establishing an emergency response plan for personal information security incidents. In the unfortunate event of a security incident, we will promptly notify you in accordance with legal requirements, informing you of: the basic circumstances of the incident, possible impacts, measures taken or to be taken, preventive advice, remedial measures, etc. Notification methods include email, letter, phone, push notification, etc. If it is difficult to notify individuals one by one, we will issue warnings through reasonable and effective means such as announcements. Simultaneously, we will report the incident handling to regulators as required.
  5. Risk Notification: The internet environment is not absolutely secure. Although we strive to take security measures, we cannot guarantee 100% security. Please understand the information security risks inherent in using the Services (including communication via the internet) and pay attention to protecting account security (e.g., setting complex passwords, not disclosing verification codes).

Your Rights

You have the following rights regarding your personal information, which you can exercise through the following channels or by contacting us:

  1. Access Your Personal Information: You have the right to access the personal information we hold about you (except as provided by laws and regulations). You can view your account information by: Opening ProjectEV+ -> "Menu"/"Me" -> "Account Management".
  2. Correct Your Personal Information: If you discover that the personal information we process about you is incorrect or incomplete, you have the right to request correction. You can make modifications through the "Account Management" path mentioned above or contact us using the method in Chapter VIII.
  3. Delete Your Personal Information: You may request deletion in the following circumstances:
    1. Our processing of personal information violates laws or regulations;
    2. We collected or used your personal information without your consent;
    3. Our processing of personal information seriously violates agreements with you;
    4. You no longer use our products or services, or you proactively deactivate your account;
    5. We permanently cease providing products or services to you;

    Note: When responding to deletion requests, we need to verify your identity. Due to legal, regulatory, or technical constraints, information in backup systems may not be deleted immediately but will be securely stored until it can be deleted or anonymized.

  4. Change the Scope of Authorization or Withdraw Consent:
  5. Deactivate Account: You can deactivate your ProjectEV+ account at any time. Operation Path: Open ProjectEV+ -> "Menu"/"Me" -> "Account Management" -> "Deactivate Account".
  6. Responding to Your Requests:

How Your Personal Information is Stored and Transferred Across Borders

  1. Storage Location: In principle, the personal information we collect and generate within the territory of the People's Republic of China will be stored within the territory of the People's Republic of China.
  2. Storage Period: We only store your personal information for the period necessary to achieve the purposes described in this Policy and the minimum retention period required by laws and regulations. After the expiration of the above periods, we will delete your personal information or anonymize it. We may need to extend the storage period when necessary for purposes such as serving the public interest, scientific or historical research, as otherwise stipulated by laws and regulations, or with your separate authorization. Among them, account information will be retained for one year after cancellation; charging order records will be retained for three years after the transaction is completed; charger operation logs will be retained for six months after they are generated.
  3. Cross-Border Transfer:

How This Policy is Updated

  1. Our Privacy Policy may be revised and updated from time to time. We will not reduce your rights under this Policy without your explicit consent.
  2. The updated policy will be notified to you through reasonable means such as announcements within this APP, push notifications, and website updates, and the effective date will be specified. Please review this Policy periodically.
  3. For significant changes (defined below), we will provide more prominent notice (such as a pop-up prompt). Significant changes include but are not limited to:

    We will archive previous versions of this Policy for reference.

How to Contact Us

If you have any questions, comments, suggestions regarding this Policy, need to exercise your personal information rights, or wish to file a complaint, please contact us using the following methods:

Generally, we will verify and process your request within thirty (30) days of receiving it and verifying your identity. If laws and regulations impose stricter requirements on response times, we will comply with those time limits.

If you are dissatisfied with our response, especially if you believe our processing of personal information has infringed upon your legitimate rights and interests, you may also file a complaint or report with the relevant regulatory authorities (such as the Cyberspace Administration, telecommunications administration, public security bureau, and market supervision administration in your location), or file a lawsuit with the competent People's Court of the People's Republic of China in the place where the defendant is domiciled.