Privacy Policy

Updated Date : December 22 , 2022

Introduction

Your agreement to the privacy policy means that you have understood the functions provided by the app and the necessary personal information required for the function to operate, and have given the corresponding collection and use authorization, but it does not mean that you have separately agreed to enable additional functions and process non-essential personal information. For enabling additional functions, processing non-essential personal information, and processing sensitive personal information, we will ask for your consent separately based on your actual usage.

 

① How we collect and use personal information

During your use of " Trail Cam_4G " software and services, we will collect information in accordance with the principles of legality, legitimacy and necessity. The information we collect or ask you to provide will be used to:

1.Guarantee the basic normal operation of the product;

2.Realize various functions and services;

3.Optimize and improve products and services;

4.Ensure the safety of products, services and users;

5.Comply with laws, regulations and national standards.

We will collect the information that you voluntarily provide when using the service, as well as the information that you generate during the use of functions or acceptance of the service, in the following ways:

1.  Provide you with shooting function

When you use " Trail Cam_4G " and related services:

( 1 ) Camera / webcampermissions are required for taking photos and recording videos. Please know that even if you have agreed to turn on the camera / webcampermission, we will only use the camera / webcamto obtain information when taking photos, recording videos, etc.

( 2 ) Need to provide album or storage permission to save photos and videos to the album.

( 3 ) Location information permission is required to write location information into photos and videos.

( 4 ) We will collect your hardware model, operating system version number, software version number, device information (Android ID, OAID, list of installed apps, MAC address, sensor information (gyroscope, gravity, direction, acceleration, linear acceleration) and other information. Please understand that this information is the basic information we must collect to provide services and ensure the normal operation of products.

( 5 ) This application integrates third-party SDKS, including (a message push SDK, mobile intelligent terminal supplementary device identification system unified call SDK) and other services. It is convenient for the app to push the device picture information to you in the first time and improve the application experience.

2.Log in to " Trail Cam_4G " and related services

You can choose to use your mobile number to authorize login in " Trail Cam_4G ". This information is only used for login-related purposes.

3. Message notification

When " Trail Cam_4G " releases new services or functions, we may also send you service information in the form of pop-up windows or push. If you do not want to receive our product or service information, you can turn off the push notification function of " Trail Cam_4G " in the system settings.In order to improve your user experience and facilitate the app to push device picture information to you in the first time, it will collect device identification code (OAID) as push identification code to push information to you. You can change the scope of your authorization at any time through relevant Settings in the mobile device system.

4.Guarantee the safety of products, services and users

In order to help us better understand the operation of " Trail Cam_4G " and related services, so as to ensure the safety of operation and service provision , we may record network log information (including purchase records, download records, IP addresses, client types, system types , system version, mobile phone model, language used, access date and time) , and the frequency of using the software and related services, crash data, overall installation, usage, performance data and other information.

② Use of cookies and similar technologies

Cookies  and similar technologies are commonly used technologies on the Internet. When you use " Trail Cam_4G " software and related services, we may use related technologies to send one or more cookies or anonymous identifiers to your device to collect and store information when you access and use this product. We may set cookies or anonymous identifiers for authentication and security to ensure the safe and efficient operation of products and services, help us improve service efficiency, and increase login and response speed.

 

③ Entrusted processing

We may entrust authorized partners to process your personal information so that authorized partners can provide you with certain services or perform functions on our behalf. We will only entrust them to process your information for the legal, legitimate, necessary, specific, and clear purposes stated in this policy. Authorized partners can only have access to the information they need to perform their duties, and we will require them not to Use this information for any other purpose beyond the entrustment. If the authorized partner uses your information for purposes not entrusted by us, it will obtain your consent separately.

Currently, our authorized partners include the following types:

Suppliers, Service Providers and Other Partners. We entrust the processing of information to suppliers, service providers and other partners who support our business, including technical infrastructure services commissioned by us, analysis of how our services are used, customer service, payment facilitation or academic conduct Research and investigate.

In order to ensure the stable operation and function realization of our client, so that you can use and enjoy more services and functions, our application will embed the SDK of authorized partners or other similar applications. We will conduct strict security checks on the application program interface ( API ) and software tool development kit ( SDK ) for authorized partners to obtain relevant information , and agree with authorized partners on strict data protection measures to make them comply with this policy and any other relevant confidentiality and security measures to process personal information.

 

④ How do we store personal information

(1) Where the information is stored

The personal information we generate or collect within the territory of the People's Republic of China is stored on servers within the territory of China. We will not provide any of your personal information overseas unless we obtainyour separate consent, or to perform the contract with you, or to comply with the obligations stipulated by laws and regulations.

(2) Storage period

We will only retain your personal information for the period necessary to achieve the purposes stated in this policy , unless there are mandatory retention requirements by law, such as requiring product and service information and transaction information according to the statute of limitations, and the storage time of transaction information is from the date of completion of the transaction not less than three years.

We judge the storage period of personal information mainly based on the following criteria:

1. Complete the transaction purpose related to you , maintain the corresponding transaction and business records, in order to respond to your possible inquiries or complaints;

2. Guarantee the safety and quality of the services we provide you;

3. Do you agree to a longer retention period;

4. Whether there are other special agreements or laws and regulations on the retention period.

After the retention period has expired, we will delete or anonymize your personal information as required by applicable law.

 

⑤ How do we share, transfer and publicly disclose personal information

We will not share, transfer or publicly disclose your personal information to third parties, unless you have authorized and agreed in advance, or the personal information shared, transferred or publicly disclosed is anonymized information, and the third party cannot The information re-identifies the natural person subject.

We will prudently evaluate the purpose of third parties using shared information, conduct a comprehensive assessment of the security capabilities of these partners, and require them to abide by cooperation legal agreements. We will conduct strict security monitoring on the software tool development kit ( SDK ) and application programming interface ( API ) used by partners to obtain information to protect data security.

1.  Sharing with third parties to realize related functions or services

When you use the payment function service provided by a third-party payment company, the third-party payment company needs to collect your name, bank card type and card number, expiration date and mobile phone number . The above information is personal sensitive information, and refusing to provide such information will only make you unable to use this function, but it will not affect your normal use of other functions.

2.  Transfer of personal information during acquisitions, mergers, and reorganizations

With the continuous development of our business, we may carry out mergers, acquisitions, and asset transfers, and your personal information may be transferred as a result. In the event of the aforementioned changes, we will continue to protect or require the successor of personal information to continue to protect your personal information in accordance with laws and regulations and the security standards not lower than the requirements of this privacy policy, otherwise we will require the successor to re-obtain Your authorization agrees.

3.  Statutory situations where consent is not required for sharing, transferring and publicly disclosing personal information

According to the laws and regulations of our country, in the following situations, we do not need to obtain your prior consent for sharing, transferring and publicly disclosing your personal information:

( 1 ) Related to our fulfillment of obligations stipulated by laws and regulations;

( 2 ) Directly related to national security and national defense security;

( 3 ) Directly related to public security, public health, and major public interests;

( 4 ) Directly related to criminal investigation, prosecution, trial and judgment execution;

( 5 ) It is difficult to obtain your authorization and consent for the purpose of safeguarding your or other people's life, property and other major legal rights and interests;

( 6 ) Personal information that you disclose to the public by yourself;

( 7 ) Personal information is collected from legally disclosed information, such as legal news reports, government information disclosure and other channels.

4.  Cessation of operations

If we stop operating products and / or services, we will stop collecting your personal information in time. We will deliver notices one by one or send you a notification of the cessation of operations in the form of an announcement, and delete or anonymize the personal information we hold about the products and / or services that have been shut down.

5.  Circumstances that are legally exempted from obtaining your authorization and consent

Please understand that in the following situations, according to laws, regulations and national standards, the partner uses, or we transfer and disclose your personal information without your authorization and consent:

(1)    Necessary to conclude or perform a contract at your request;

(2)    Necessary for the performance of statutory duties or obligations: We may share your personal information in accordance with the provisions of laws and regulations, the need for litigation, dispute resolution, or the legal requirements of administrative and judicial authorities, and the performance of other statutory obligations. Personal information;

(3)    It is necessary to respond to public health emergencies, or to protect the life, health and property safety of natural persons in emergency situations;

(4)    Implement news reports, public opinion supervision, etc. for the public interest, and process personal information within a reasonable range;

(5)    Process your self-disclosed personal information within a reasonable range, or other personal information that has been legally disclosed (such as legally disclosed personal information through legal news reports, government information disclosure, etc.);

(6)    Other circumstances stipulated by laws and regulations.

⑥ How do we protect the security of personal information

(1)    We attach great importance to the security of your personal information, and will strive to take reasonable security measures (including technical and management aspects) to protect your personal information and prevent the personal information you provide from being used improperly or without authorization. be accessed, publicly disclosed, used, modified, damaged, lost or leaked.

(2)    We will use reasonable and feasible means such as encryption technology and anonymization processing that are not inferior to those of industry peers to protect your personal information, and use security protection mechanisms to prevent your personal information from being maliciously attacked.

(3)    We will establish a dedicated security department, security management system, and data security process to ensure the security of your personal information. We adopt a strict data use and access system to ensure that only authorized personnel can access your personal information, and conduct security audits on data and technology in due course.

(4)    Although the above-mentioned reasonable and effective measures have been taken and the standards required by relevant laws have been complied with, please understand that due to technical limitations and possible malicious means, in the Internet industry, even if we do our best to strengthen It is impossible to always guarantee 100% security of information, and we will try our best to ensure the security of the personal information you provide to us. You know and understand that the system and communication network you use to access our services may have problems due to factors beyond our control. Therefore, we strongly recommend that you take active measures to protect the security of your personal information.

(5)    We will formulate an emergency response plan, and immediately activate the emergency plan when a user information security incident occurs, and strive to prevent the impact and consequences of such security incidents from expanding. Once a user information security incident (disclosure, loss, etc.) occurs, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, and you can independently Suggestions for preventing and reducing risks, remedial measures for you, etc. We will promptly inform you of the relevant circumstances of the event in the form of push notifications, emails, letters, text messages, etc. If it is difficult to inform you one by one, we will adopt reasonable and effective methods to issue announcements. At the same time, we will also report the handling of user information security incidents in accordance with the requirements of relevant regulatory authorities.

(6)    We would like to remind you that the personal information protection measures provided in this privacy policy are only applicable to the " Trail Cam_4G " software and related services. Once you leave " Trail Cam_4G " and related services, browse or use other websites, services and content resources, we have no ability and obligation to protect any personal information you submit on software and websites other than " Trail Cam_4G " software and related services , whether you log in, browse or use the above-mentioned software, whether the website is based on the link or guidance of " Trail Cam_4G ".

 

⑦ Your rights

(1) Query and copy your information

You can query and copy your personal information within the app.

(2) Change your information

You can directly change your mobile phone number information in " Trail Cam_4G " through the "Modify Mobile Number" function in the app. After modifying the mobile phone number information, the original mobile phone number will lose related services.

(3) Cancellation of your information

You can cancel your account on " Trail Cam_4G " by sending an email to DC31@dgomg.com . Before canceling the account, we will reply to you within 15 working days and verify your personal identity, security status, device information, etc., and reply and process after confirming the above information. You know and understand that the act of canceling your account is irreversible. Once you cancel your account, we will stop providing you with related services.

 

⑧ Terms for minors

If you are a minor under the age of 18 , you should read and agree to this Privacy Policy under the supervision and guidance of your parents or other guardians before using the " Trail Cam_4G " software and related services.

We protect the personal information of minors in accordance with relevant national laws and regulations, and will only collect, use, share or disclose personal information of minors when permitted by law, with the explicit consent of parents or other guardians, or when it is necessary to protect minors information; if we become aware that we have collected personal information about minors without prior verifiable parental consent, we will attempt to delete the information as soon as possible.

If you are the guardian of a minor, please contact us through the contact information published in this Privacy Policy when you have questions about the personal information of the minor under your guardianship.

 

⑨ Revision and notice of privacy policy

In order to provide you with better services, " Trail Cam_4G " software and related services will be updated and changed from time to time, and we will revise this Privacy Policy in due course. Such revisions constitute a part of this Privacy Policy and have the same effect as this Privacy Policy . However , without your explicit consent, we will not reduce your rights under the currently effective Privacy Policy.

For major changes, we will also provide more prominent notices (including we will notify you through public announcements or provide you with pop-up prompts ).

Major changes referred to in this policy include, but are not limited to:

1. The business model of the product has undergone major changes. Such as the purpose of processing personal information, the type of personal information processed, and the way the personal information is used;

2. Changes in the main body of the privacy policy caused by business adjustments, transaction mergers and acquisitions, and the receiver of the new main body changes the original processing purpose and processing method;

3. The main object of personal information sharing or public disclosure changes;

4. Significant changes have occurred in users' personal information rights and their exercise methods;

5. When the contact information and complaint channels of the person in charge of personal information protection change;

6. When the personal information protection impact assessment report shows that the existence of the product has a significant impact on personal rights and interests

 

⑩ How to contact us

If you have any questions, comments or suggestions about the content of this policy or have any questions about the protection of personal information, you can contact us by sending an email to DC31@dgomg.com . Under normal circumstances, we will reply you within 15 working days .

 

11 Others

(1) The titles in this "Privacy Policy" are for convenience and reading only, and do not affect the meaning or interpretation of any provision in this Privacy Policy.

(2) Definitions of related terms in this "Privacy Policy":

1.  " Trail Cam_4G " software and related services refer to the products and services provided to you by GD DIGITAL LTD. and its related parties through the legally owned and operated client application program labeled " Trail Cam_4G ".

2.  Affiliated parties refer to any companies, institutions and legal representatives of the above-mentioned companies or institutions that are currently or in the future controlled, controlled, or under common control by one party. "Control" means the possession, directly or indirectly, of the ability to influence the management of the company in question, whether through ownership, voting shares, contracts or otherwise as legally determined.