Our Privacy Policy was updated on September 2, 2021.
Please take some time to familiarize yourself with our privacy policy and contact us if you have any questions.
The introduction
Shenzhen CloudAge Technology Co., Ltd. (hereinafter referred to as “CloudAge” or “we”) attaches great importance to your privacy. WaveAIOT is a platform for intelligent device control and management provided by Cloud World Technology.
This Privacy Policy has been developed with your needs in mind, and it is vital that you fully understand our personal information collection and use practices, while ensuring that you ultimately have control over the personal information provided to us. This Privacy Policy sets out how we collect, use, disclose, process and store the information you provide to us when using our WaveAIOT. “Personal Information” under this Privacy Policy means data that identifies a particular individual either by itself or through association with other information. We will use this information strictly in accordance with this Privacy Policy.
What information do we collect and how do we use it
The purpose of collecting personal information is to provide products and/or services to you and to ensure that we comply with applicable laws, regulations and other regulatory documents. You have the right to provide this information at your discretion, but in most cases, if you do not, we may not be able to provide you with the appropriate services or respond to the questions you have. These features include:
1.1 Registration and Login
APP login account information: Before using the APP, you need to register a login account. We need a user name, password, phone number and email address (for retrieving the password) to create an account. We use this to identify your personal information to help you activate, manage and use WaveAIOT’s services;
1.2 Network Connection for smart Devices
To provide you with WaveAIOT’s services so that you can securely connect and manage smart devices, we may collect your Wi-Fi information, IP address, mobile phone information, smart device information, location information, login account information, and WaveAIOT account information associated with smart devices. This information will be used to provide you with intelligent device fast connection, connection, discovery of nearby devices and device management functions. The above information is listed as follows:
Logon account information: user name and password.
Buy a phone at a cost. Hardware device identifier (IMSI, IMEI, MEID, device hardware SERIAL number, SIM card identifier, OAID, Mac address, Android ID), phone model, system version information, system language, phone country or region, app store version number, phone screen size and resolution, CPU and display device information.
The information collected during connecting to a smart device at the cost of something: Depending on the type of smart device you need to connect to, we might collect the following information:
A) Smart devices connected through Wi-Fi: Wi-Fi information (SSID,BSSID, Wi-Fi Mac address, Wi-Fi password), device Mac address, device ID.
B) Smart devices connected through Wi-Fi after establishing local connection through Bluetooth: Wi-Fi information (SSID,BSSID, Wi-Fi Mac address, Wi-Fi password), device Mac address, and Device Bluetooth Mac address.
C) Smart devices connected through Bluetooth: Bluetooth Mac address and DEVICE ID.
D) Intelligent devices connected through Zig-Bee: Mac address and ID.
1.3 Home management of smart devices:
We may collect room setting information of smart devices provided by you for home management of smart devices, which will enable you to enjoy more convenient operation experience of smart devices (for example, when there are multiple types of lights, you can quickly locate the lamp in the bedroom instead of the lamp in the living room).
1.4 Device Sharing
We support you to share smart devices with others through WaveAIOT account. After sharing, the shared person can also control the smart device. To enjoy this feature, we may collect your account ID, shared account ID provided by you, shared device information (device ID, device name, device authentication key, shared device status) for you to share the device with other WaveAIOT accounts for common control and use. And for device list page to display sharing status.
1.5 Application and Intelligent Hardware Upgrade:
To keep you on the latest WaveAIOT service, we may use your WaveAIOT app version information and phone model to provide you with WaveAIOT app updates. At the same time, we may collect the list and version number of smart devices you have connected to provide you with the upgrade function of smart devices to ensure that you can use the latest version of the service (including the firmware version).
1.6 Intelligent Scenario (Intelligent Device Linkage) :
We support you to set certain rules to realize the linkage function between smart devices under specific conditions. To enjoy this feature, we may collect your location information, your rule Settings for the smart scene, read or edit the calendar, and the status of the device you specify, to implement the function of executing the device according to the execution commands you specify. (For example, the light comes on when the sensor detects someone passing by). Please rest assured that this function requires you to take the initiative to open and set rules.
1.7 Provide content support (such as articles) :
In order to help you better use smart devices, we will provide you with selected articles to introduce you to the content related to smart devices. We do not collect any information from you when reading this content.
1.8 WaveAIOT permission call description
In addition, the following device permissions may trigger when you use WaveAIOT. To enable you to better manage your information, we will inform you of the purpose of using this permission when applying for permission in the process of product use, and the possible impact on your use of the service if you do not enable this permission. Please check it carefully. Before using a specific function, you can choose whether to grant the following rights. Also, you can change the authorization status yourself at any time on the device Permission Settings page. The details of related functions and call permissions are listed below for your reference:
- Storage permission: To use the functions of selecting a picture from an album, changing your profile picture, and giving feedback, you need to obtain your storage permission to read files stored on the device.
- Location permission (Android and iOS versions) : used to scan the nearby WLAN list, search for nearby Bluetooth devices, and automate geo-fencing in smart scenarios. When the user is bound with a device that does not support GPS, such as smart running shoes or watches, the device provides functions such as step frequency calculation, accurate movement distance recording, and drawing of the user’s movement track. The purpose of collecting your current location information is to provide you with environmental services and equipment network services, and does not track your movements.
- Camera Permission (Android and iOS) : To add device functions and change the profile picture in your profile by scanning code, you need to obtain the camera permission.
- Enable WLAN permission (Android or iOS) : Used to connect to the WIFI provided by the device to communicate with the device.
- Enable Bluetooth permission (Android and iOS versions) : Used to connect the Bluetooth signal sent by the device to communicate with the device during fast connection. For smart devices connected via Bluetooth, Bluetooth permission is also required for communication.
- Period for storing information
We will retain your personal information for no longer than is reasonably necessary for the specific purpose for which it is processed. If you will or have consented to us processing your personal information, we will store and process the data until you withdraw your consent. Unless required or permitted by law to keep this information for a longer period, we will delete and destroy your data in a secure manner in accordance with our privacy policy.
Iii. How do we share, transfer and publicly disclose your personal Information
3.1 the Shared
Your personal information will be kept strictly confidential, and we will not share your personal information with any other company, organization or individual, except for the following circumstances:
① We will share your personal information with other parties with your express consent;
② Shared with our authorized employees and our branches worldwide for the following purposes: to provide further services to you, for internal management needs, to detect and deal with data breaches, illegal activities and fraud incidents, to maintain the integrity of the company’s INFORMATION technology systems, etc. We will only share necessary personal information for the purposes listed in this Privacy Policy;
③ Our third party service providers (or partners) assist us in providing or improving our services, including but not limited to: Information system technical support, logistics service, payment processing, customer service, order management, customer survey or satisfaction survey, logistical support, marketing support, etc., and we will involve all of the third party service providers (or partners) strict data processing agreement, ask them in accordance with the relevant laws and regulations and our requirements, Take certain security measures to handle your personal information and ensure the security of your personal information;
④ Share your personal information according to laws and regulations, or according to the mandatory requirements of the competent government departments.
Currently, our authorized partners are: suppliers, service providers and other partners. We send information to suppliers, service providers and other partners that support our business, including providing technical infrastructure services, analyzing how our services are used, measuring the effectiveness of our services, and providing customer service payment facilitation.
3.2 the transfer
We will not transfer your personal information to any company, organization or individual except for the following circumstances:
① Transfer with express consent: After obtaining your express consent, we will transfer your personal information to other parties;
(2) In the case of merger, acquisition or bankruptcy liquidation, if the transfer of personal information is involved, we will require the new company or organization that holds your personal information to continue to be bound by this personal information protection policy; otherwise, we will require the company or organization to seek authorization from you again.
3.3 Public Disclosure
We will only publicly disclose your personal information under the following circumstances:
(1) After obtaining your express consent;
② Based on the disclosure of laws, we may publicly disclose your personal information when required by laws, legal procedures, lawsuits or government authorities.
Iv. How do we protect your personal Information
We take your personal information very seriously and are committed to protecting it. We have applied a number of technical measures to protect the security of your personal information and minimize the risk of misuse, unauthorized access, unauthorized disclosure and inaccessibility. The security measures we use include but are not limited to identity authentication, data encryption, firewall and data access authorization control, etc. We will periodically check and update the security mechanism used to protect data to provide effective protection against data abuse. At the same time, we will conduct data security training to enhance employees’ awareness of the importance of protecting personal data.
We take all reasonably practicable steps to ensure that no irrelevant personal information is collected. We will only retain your personal information for as long as necessary to achieve the purposes set forth in this Privacy Policy, unless the retention period is extended or permitted by law.
The Internet is not an absolutely secure environment, and email, INSTANT messaging, social software and other ways of communicating with other users cannot be fully encrypted. We suggest that you use complex passwords when using such tools, and pay attention to the security of your personal information.
If our physical, technical or management protection facilities are damaged, resulting in unauthorized access, public disclosure, tampering or destruction of information, which results in damage to your legitimate rights and interests, we will bear the corresponding legal liabilities.
Unfortunately, after the occurrence of personal information security incidents, we will, in accordance with the requirements of laws and regulations, timely inform you of the basic situation and possible impact of security incidents, the disposal measures we have taken or will take, you can independently prevent and reduce the risk of recommendations, remedial measures for you, etc. We will timely inform you of the information related to the event by email, phone, push notification, etc. If it is difficult to inform the subject of personal information one by one, we will take a reasonable and effective way to release the announcement. We will also take the initiative to report the disposal of personal information security incidents in accordance with the requirements of regulatory authorities.
If you believe that the security of your data has been compromised, or if you would like more information about the measures we use to protect your data, please contact our Personal Information Protection Officer as provided in the last section of this Privacy Policy.
V. Your rights
5.1 Control Settings
We acknowledge that privacy concerns vary from person to person. You can also choose to disable some or all permissions in the Settings function of the device at any time to refuse to collect relevant personal information. The permission display and shutdown modes may vary with devices. For details, see the device and system developer’s instructions or guidelines.
5.2 Your rights to Your Personal Information
In accordance with applicable national or regional laws and regulations, you have the right to request access to, correction of or deletion of any personal information held by us related to you (hereinafter referred to as the request).
If you believe that any information we hold about you is incorrect or incomplete, you may request that personal information be corrected or perfected for use purposes.
Depending on your applicable laws and regulations, you may have the right to ask us to delete your personal data. We will evaluate your deletion request according to the relevant provisions, we will take the corresponding steps including technical means to process. When you or we assist you in deleting relevant information, due to applicable laws and security technologies, we may not be able to immediately remove the corresponding information from the backup system. We will securely store your personal information and isolate it from any further processing until the backup can be erased or anonymous. For example, according to the E-commerce Law of the People’s Republic of China, your commodity and service information and transaction information shall be kept for no less than three years from the date of transaction completion.
Vi. Changes to this Privacy Policy
If we decide to make changes to our Privacy Policy, we will post those changes in this Policy, on our website, and wherever we deem appropriate so that you can understand how we collect and use your personal Information, who has access to it, and under what circumstances we may disclose it.
The company reserves the right to modify this policy from time to time, so please check it regularly. The company will inform you of any major changes to this policy through a notice on its website.
How to contact us:
Shenzhen CloudAge Technology Co., LTD
Email address: info@cloudagetech.com
Address: 602B, Building 3A, Tongtai Times Center, Bao ‘an District, Shenzhen