Shenzhen Atess Power Technology Co.,Ltd (hereinafter referred to as "we", "us", or the "Company") fully recognizes the importance of your personal information and is committed to protecting the security of your personal information in accordance with relevant laws and regulations. This Privacy Policy (hereinafter referred to as "this Policy") aims to clearly and transparently explain how we collect, use, store, share, transfer, and protect your personal information when you use our ProjectEV+ mobile application (APP) and related services (hereinafter referred to as "the Services"), as well as how you can manage your personal information.
Please read this Policy carefully and understand it fully before using the Services. When you start downloading, accessing, or using the Services, it means that you have agreed to our processing of your personal information in accordance with this Policy. If you do not agree to any terms of this Policy, please stop using the Services immediately.
How We Collect and Use Your Personal Information
We will only collect and use your personal information within the minimum necessary scope and for the purpose of achieving the business functions described below in this Policy. If you do not provide the corresponding information, you may be unable to use certain services or features, but this will generally not affect your use of the basic charging functions.
(1) Registration and Account Management
- Collection Purpose: To create your ProjectEV+ account, verify your identity, and manage your account.
- Information Collected:
- Registration Email Address: Used for account registration, identity verification (by sending email verification codes), login, and receiving service notifications.
- Account Information (Optional): After successful registration, you can voluntarily supplement and set your profile picture, nickname, and login password.
- Usage Explanation: An email address is necessary information for registration and login. Supplementing account information helps personalize your experience and enhance account security. Not providing supplementary information does not affect the basic charging function.
(2) Service Operation and Function Implementation
- Collection Purpose: To ensure the normal operation of the Services, optimize the service experience, perform troubleshooting, and conduct security maintenance.
- Information Collected:
- Device Information and Log Information: When you use the Services, we automatically collect your device model, operating system type and version, unique device identifiers (such as IMEI/Android ID/IDFA/OAID/OpenUDID/GUID), IP address, method and type of network access, application operation log information, operation records, service access date and time.
- Location Information (Approximate Location - Optional): To facilitate your search for nearby charging piles on the map (if the feature is provided), we may obtain your approximate location information (based on IP or GPS/WiFi signals) after your authorization. You can revoke this authorization in your device settings.
- Usage Explanation: This information is necessary to ensure the stable operation of the APP, analyze service performance, diagnose problems, and prevent security risks.
(3) Permissions Required for Specific Functions
During the provision of services, based on specific functional scenarios, we may require you to authorize the following device permissions. You can manage or revoke these authorizations at any time in your device system settings. Refusing authorization may render the related functions unavailable, but it will not affect your use of other functions that do not require that permission.
- Camera Permission:
- Usage Scenario: Scanning a charging pile QR code to add a charging pile; taking photos to set or upload a profile picture.
- Purpose: To enable QR code scanning for device binding and personalize the account.
- Storage (Gallery/Files) Permission:
- Usage Scenario: Selecting photos from the gallery to set or upload a profile picture; selecting photos from the gallery for adding charging piles (e.g., if uploading image credentials is required).
- Purpose: To enable profile picture settings and image upload functions in specific scenarios.
(4) Exceptions Requiring Prior Authorization
According to relevant laws, regulations, and national standards, your authorization and consent are not required for the collection and use of personal information in the following circumstances:
- Directly related to national security and national defense security;
- Directly related to public security, public health, and significant public interests;
- Directly related to criminal investigation, prosecution, trial, and execution of judgments, etc.;
- Necessary for safeguarding the life, property, and other significant legitimate rights and interests of you or another individual, where it is difficult to obtain the consent of the individual;
- Where the personal information collected is voluntarily disclosed by you to the public;
- Where personal information is collected from legally disclosed information, such as through lawful news reporting, government information disclosure, and other channels;
- Necessary for concluding or performing a contract at your request;
- Necessary for maintaining the safe and stable operation of the Services, such as discovering and handling failures of products or services;
- Other circumstances stipulated by laws and regulations.
How We Use Cookies and Similar Technologies
- Cookies: To ensure the normal operation of the Services (especially when involving WebView or web content) or to optimize your experience, we may store small data files called Cookies on your device. Cookies usually contain identifiers, site names, and some characters. You can manage or delete Cookies based on your browser settings, but disabling Cookies may affect some service features.
- Similar Technologies: We may use technologies such as web beacons and pixel tags, primarily for traffic statistics, analyzing page visits, and understanding service usage (e.g., email open rate statistics, if email services are involved). You can usually refuse such tracking through browser settings or email client options.
- Do Not Track (DNT): If your browser has the DNT feature enabled, we will respect your choice.
How We Share, Transfer, and Disclose Your Personal Information
We attach great importance to the confidentiality of your personal information. Without your separate consent, we will not share or transfer your personal information with any company, organization, or individual, nor will we publicly disclose your personal information, except in the following circumstances:
(1) Sharing
- Sharing after obtaining your explicit authorization or consent.
- Sharing under statutory circumstances: Sharing as required by laws and regulations, for resolving litigation disputes, or as mandated by competent government authorities such as administrative or judicial organs.
- Sharing with Authorized Partners: To achieve the purposes described in this Policy, we may engage authorized partners (such as suppliers providing data storage, server operation and maintenance, security protection, and data analysis services) to provide services on our behalf. We sign strict confidentiality agreements with them, requiring them to process personal information according to our instructions, this Policy, and any other relevant confidentiality and security measures, and prohibiting them from using the information for any other purpose. We only share personal information necessary to provide the services.
- Sharing with Affiliates: To facilitate providing services to you based on a unified account system, your personal information may be shared within our affiliates (i.e., companies that control us, are controlled by us, or are under common control with us). We will only share necessary personal information, and such sharing will be bound by the purposes described in this Policy. If an affiliate needs to change the processing purpose, it will seek your authorization and consent again.
(2) Transfer
We will not transfer your personal information to any company, organization, or individual, except in the following cases:
- Transfer after obtaining your explicit consent.
- In the event of a merger, acquisition, or bankruptcy liquidation: If a transfer of personal information is involved, we will require the new holder of your personal information to continue to be bound by this Policy; otherwise, we will require them to obtain your authorization and consent anew.
(3) Public Disclosure
We will only publicly disclose your personal information in the following circumstances:
- After obtaining your explicit consent.
- Based on legal requirements: When required by law, legal procedures, litigation, or mandatory requirements from government authorities.
(4) Exceptional Circumstances
According to laws and regulations, sharing, transferring, or publicly disclosing your personal information in the following circumstances does not require prior authorization and consent (the specific items correspond to items 1-6 listed in Chapter I(4)).
How We Protect Your Personal Information
We have adopted security protection measures that comply with industry standards and are reasonably feasible to protect your personal information from unauthorized access, public disclosure, use, modification, damage, or loss:
- Technical Measures: Using encryption technologies (such as SSL/TLS) to protect data transmission security; employing HTTPS secure browsing; encrypting stored personal information; deploying security protection mechanisms such as firewalls and intrusion detection; implementing strict access control to ensure only authorized personnel can access personal information; establishing data security audit mechanisms.
- Administrative Measures: Establishing specialized management systems, processes, and organizations to ensure information security; signing confidentiality agreements with employees and partners; regularly conducting security and privacy protection training to enhance employee awareness.
- Minimized Storage: We only store personal information necessary for the purposes described in this Policy and employ technical measures such as de-identification and anonymization. We only store your personal information for the period necessary to achieve the purposes described in this Policy and as required by laws and regulations, or for the reasonable period required by business functions. After the expiration of such periods, we will delete your personal information or anonymize it.
- Security Incident Response: Establishing an emergency response plan for personal information security incidents. In the unfortunate event of a security incident, we will promptly notify you in accordance with legal requirements, informing you of: the basic circumstances of the incident, possible impacts, measures taken or to be taken, preventive advice, remedial measures, etc. Notification methods include email, letter, phone, push notification, etc. If it is difficult to notify individuals one by one, we will issue warnings through reasonable and effective means such as announcements. Simultaneously, we will report the incident handling to regulators as required.
- Risk Notification: The internet environment is not absolutely secure. Although we strive to take security measures, we cannot guarantee 100% security. Please understand the information security risks inherent in using the Services (including communication via the internet) and pay attention to protecting account security (e.g., setting complex passwords, not disclosing verification codes).
Your Rights
You have the following rights regarding your personal information, which you can exercise through the following channels or by contacting us:
- Access Your Personal Information: You have the right to access the personal information we hold about you (except as provided by laws and regulations). You can view your account information by: Opening ProjectEV+ -> "Menu"/"Me" -> "Account Management".
- Correct Your Personal Information: If you discover that the personal information we process about you is incorrect or incomplete, you have the right to request correction. You can make modifications through the "Account Management" path mentioned above or contact us using the method in Chapter VIII.
- Delete Your Personal Information: You may request deletion in the following circumstances:
- Our processing of personal information violates laws or regulations;
- We collected or used your personal information without your consent;
- Our processing of personal information seriously violates agreements with you;
- You no longer use our products or services, or you proactively deactivate your account;
- We permanently cease providing products or services to you;
Note: When responding to deletion requests, we need to verify your identity. Due to legal, regulatory, or technical constraints, information in backup systems may not be deleted immediately but will be securely stored until it can be deleted or anonymized.
- Change the Scope of Authorization or Withdraw Consent:
- You can turn off permissions like camera, storage, etc., at any time via Device Permission Settings to withdraw your authorization for us to collect the corresponding personal information.
- You can manage some privacy preferences in the APP settings.
- You can withdraw all authorization for us to continue collecting your personal information by deactivating your account.
- Consequences of Withdrawal: After withdrawing authorization, we will cease processing the corresponding personal information. However, your decision to withdraw will not affect the processing activities previously carried out based on your authorization. Withdrawing certain key authorizations may render related functions unusable.
- Deactivate Account: You can deactivate your ProjectEV+ account at any time. Operation Path: Open ProjectEV+ -> "Menu"/"Me" -> "Account Management" -> "Deactivate Account".
- Consequences of Deactivation: After deactivation, we will stop providing services to you and, subject to legal requirements, delete your personal information or anonymize it (except where otherwise stipulated by laws and regulations or where retention is necessary to fulfill dispute resolution or compliance obligations). Account deactivation is an irreversible operation that will result in you being unable to use that account and all related services and data. Please proceed with caution.
- Responding to Your Requests:
- To ensure security, we may require you to submit a written request or verify your identity (e.g., verifying account information). We will respond within 30 days of receiving the request and verifying your identity.
- We generally do not charge a fee for reasonable requests. However, for repeated requests beyond a reasonable limit, we may charge a cost fee at our discretion. We may refuse requests that are groundlessly repetitive, require excessive technical means, pose risks to the rights of others, or are impractical.
- In the following circumstances, we may be unable to respond to your request (we will explain the reason):
- Related to our fulfillment of obligations stipulated by laws and regulations;
- Directly related to national security or national defense security;
- Directly related to public security, public health, or significant public interests;
- Directly related to criminal investigation, prosecution, trial, or execution of judgments;
- There is sufficient evidence indicating you have subjective malice or are abusing your rights;
- Necessary for safeguarding the life, property, and other significant legitimate rights and interests of you or another individual, and it is difficult to obtain consent from the individual;
- Responding to the request would seriously harm the legitimate rights and interests of you, other individuals, or organizations;
- Involves trade secrets.
How Your Personal Information is Stored and Transferred Across Borders
- Storage Location: In principle, the personal information we collect and generate within the territory of the People's Republic of China will be stored within the territory of the People's Republic of China.
- Storage Period: We only store your personal information for the period necessary to achieve the purposes described in this Policy and the minimum retention period required by laws and regulations. After the expiration of the above periods, we will delete your personal information or anonymize it. We may need to extend the storage period when necessary for purposes such as serving the public interest, scientific or historical research, as otherwise stipulated by laws and regulations, or with your separate authorization. Among them, account information will be retained for one year after cancellation; charging order records will be retained for three years after the transaction is completed; charger operation logs will be retained for six months after they are generated.
- Cross-Border Transfer:
- As we provide the Services through resources and servers located globally (e.g., using infrastructure from overseas cloud service providers), with your authorization and consent, your personal information may be transferred to jurisdictions outside the country/region where you use the Services, or accessed by entities in these jurisdictions.
- Such jurisdictions may have different data protection laws. In such cases, we will take necessary measures (such as binding recipients through agreements, conducting security assessments, obtaining your separate consent, implementing data desensitization, etc.) in accordance with the requirements of this Policy and Chinese laws and regulations to ensure that your personal information receives protection equivalent to that within the territory of the People's Republic of China. We will strictly comply with Chinese laws and regulations regarding the cross-border transfer of personal information.
How This Policy is Updated
- Our Privacy Policy may be revised and updated from time to time. We will not reduce your rights under this Policy without your explicit consent.
- The updated policy will be notified to you through reasonable means such as announcements within this APP, push notifications, and website updates, and the effective date will be specified. Please review this Policy periodically.
- For significant changes (defined below), we will provide more prominent notice (such as a pop-up prompt). Significant changes include but are not limited to:
- Fundamental changes in our service model, the purposes for processing personal information, the types of personal information processed, or the methods of use;
- Significant changes in our ownership structure or organizational structure (e.g., mergers and acquisitions);
- Changes in the main recipients of personal information sharing, transfer, or public disclosure;
- Significant changes in the methods and mechanisms for you to exercise your personal information rights;
- Changes in the responsible department, contact methods, or complaint channels for our personal information security handling;
- When a personal information security impact assessment indicates a high risk exists;
We will archive previous versions of this Policy for reference.
How to Contact Us
If you have any questions, comments, suggestions regarding this Policy, need to exercise your personal information rights, or wish to file a complaint, please contact us using the following methods:
Generally, we will verify and process your request within thirty (30) days of receiving it and verifying your identity. If laws and regulations impose stricter requirements on response times, we will comply with those time limits.
If you are dissatisfied with our response, especially if you believe our processing of personal information has infringed upon your legitimate rights and interests, you may also file a complaint or report with the relevant regulatory authorities (such as the Cyberspace Administration, telecommunications administration, public security bureau, and market supervision administration in your location), or file a lawsuit with the competent People's Court of the People's Republic of China in the place where the defendant is domiciled.