Privacy Policy

Updated: Nov. 15, 2021

Prompt terms:

Welcome to use products and services!

Your trust is very important to us. We are well aware of the importance of personal information to you. We will fully protect your personal information security in accordance with legal and regulatory requirements and with reference to industry best practices. Therefore, the service provider (“we” or “us” ) this privacy policy (refer to the policy , which term includes any applicable country specific addendums) to help you fully understand how we collect, use, store and protect your personal information and how you can manage your personal information as you use products/services. Prior to use our products and services, please carefully read and understand this policy, in particular, you should focus on reading the terms we clearly mark/underline, to ensure that you fully understand and agree before starting to use. The professional vocabulary involved in this policy, we try to explain to you in a concise and popular expression, in order to facilitate your understanding.If you have any questions, comments or suggestions about the content of this policy, you can contact us through the various contact information provided by this policy.

This Privacy Policy section will help you understand the following:

I. Definition and scope of application

II. How we collect and use your information

III. How we use cookies or the like

IV. How we share, transfer, and publicly disclose your information

V. How we protect your information

VI. How we store your information

VII. How you manage your information

VIII. How we process information of minors

IX. How to update this privacy policy

X. How to contact us

I. Definition and scope of application

(a) The definition

1) service provider: it refers to the research, development and provision of products and services legal subject,, Ltd. (Registered address: ), hereinafter referred to as “ Company” or “We” or “us” .

2) personal user: it refers to an individual user who registers a account, including an individual user with the user administrator authority of the enterprise organization and an individual user who is a member of the enterprise organization user and does not have the administrator authority of the enterprise organization, hereinafter referred to as "You".

3) Personal information: it refers to various information recorded electronically or otherwise that can identify the identity of a specific natural person or reflect the activities of a specific natural person, either alone or in combination with other information.

4) Sensitive personal information: it refers to personal information that may endanger personal and property safety once leaked, illegally provided or abused, and can easily lead to damage to personal reputation, physical and mental health or discriminatory treatment. The personal sensitive information of Service includes mobile phone numbers, emails, etc. (We will clearly mark the sensitive information of specific individual in this privacy policy).

5) Deletion of personal information: it refers to the act of removing personal information from a system involved in the implementation of daily business functions so that it remains unsearchable and accessible.

6) Anonymization of personal information: it refers to the process through the technical processing of personal information, the main body of personal information cannot be identified, and the processed information cannot be restored.

7) Personal Information Controller: an organization or individual that has the right to determine the purpose, manner, etc. of personal information processing. Part of the personal information controller in this Service agreement, which is Enterprise/Organization User.

8) The enterprise/organization user: it Refers to the registration of a user through an authorized administrator of an enterprise or other organization or directly through a legal representative, and uploads the enterprise/organization employee to build an enterprise organizational structure through the management platform as an administrator, and then opens, manages and uses the service on behalf of the enterprise organization. enterprise/organization users include but are not limited to legal persons, government agencies, other organizations, partnerships or privately or individually-owned business.

9) The Administrator of enterprise/organization: it refers to the authorization or designation of the user of the enterprise organization, and has the operation authority of the user management platform system of the enterprise organization, and the individual user who opens, manages and uses the service on behalf of the enterprise organization.

Unless otherwise agreed, the definitions used in this policy have the same meaning as those defined in the Service Agreement.

*(b) The scope of application *

This policy is applicable to our self-operated products and services, including . If our Affiliates (refer to the Definition hereunder) use products or services provided by for their own products or services but no separate privacy policy has been formulated, this Policy shall also apply to such products or services.

It should be especially noted that, this Policy shall not apply to apply to the services provided directly by other third parties through the foregoing Services platform(collectively referred to as "Third Party Service"), Before choosing to use the Third Party Services, you should read and fully understand the Third Party Services’ product function, service agreement and privacy policy before choose and use the Third Party Services and you are also binding with the third party user agreements if there are any.

II. How we collect and use your information

Our App products are developed based on DCloud uni-app(5+App/Wap2App). During the application run, you need to collect your device unique identification code (IMEI/android ID/VICE_ID/IDFA, SIM card IMSI information) to provide statistical analysis services, and pass should Improve performance and user experience with startup data and exception log analysis to provide better service to users.

When you use products/Services, we need/may need to collect and use your personal information in the following two ways:

1) In order to provide. you with the basic functions of our products and/or services, you must authorize us to collect and use your necessary information. If you refuse to provide relevant information, you will not be able to use our products and/or services normally;

2) In order to provide. you with additional functions of our products and/or services, you can choose to authorize us to collect and use your information. If you refuse to provide, you will not be able to use the relevant additional functions normally or achieve the function effect we intend to achieve, but it will not affect your normal use of the basic functions of our products and/or services.

3) The platform will collect or obtain your camera, album permission information, etc. after your explicit authorization or consent, but the above information or permissions will not be opened or authorized by default, and the collection or acquisition of the above information or permissions are used to: implement specific functions or services, apply for permissions in the process of app use, and we will specify the purpose of the permissions to facilitate your judgment. Camera: used for photo upload, such as scanning the two-dimensional code of the device; Album: Used to select images to upload, such as scanning the QR code of the device. At the same time, you can also withdraw your authorization. In particular, even if the Platform obtains these sensitive information or permissions with your authorization, it will not collect your information when the relevant functions or services are not needed.

You understand and agree that:

1) We are committed to creating a variety of products and services to meet your needs. Because we provide you with a wide range of products and services, and different users choose to use different specific products/services, corresponding, basic/additional functions and the type and scope of personal information collected and used will be different, please refer to the specific product/service functions;

2) In order to bring you a better product and service experience, we are constantly striving to improve our technology, and then we may launch new or optimized functions from time to time, and may need to collect and use new personal information or change the purpose or method of using personal information. In this regard, we will update this Policy, pop-up window, page prompt and other ways to separately explain the collection purpose, scope and usage of the corresponding information to you, and provide you with the way of independent choice and consent, and collect and use it with your express consent. In this process, if you have any questions, opinions or suggestions, you can contact us through various contact information provided herein, and we will get back to you as soon as possible.

In order to provide Services to you and Enterprise/organization Users, to maintain the normal operation of Service, improve and optimize our service experience and ensure your account security, we will collect information that you actively provide, authorize or provide based on the requirements of your company/organization, together with information generated when you use Service and based on the following purposes and methods of this Policy:

(a) Help you to become our registered user of

1) Register as a personal user of

In order to register as a personal user of , so that we can provide you with basic services, such as device binding, device maintenance, alarm message reception and other functions, you need to collect your Mobile phone number and SMS verification code to register and create a account, After registering as a user, you can independently enter basic information such as name, avatar, nickname, mobile phone number and email address. If you only need to browse and search for the introduction of products, functions and services displayed by official website, you do not need to register as a user and provide the above information.

2) Register as a user of enterprise/organization

In order to register as a user of Enterprise Organization, so that we can provide services based on the employment and management behavior of your enterprise organization, such as enterprise equipment maintenance and equipment transfer, you need to provide your Enterprise/organization name, email address to create a enterprise/organization account, otherwise you will not be able to use service based on enterprise organization management behavior. After registering as a enterprise organization users, you must further provide the enterprise organization name, enterprise abbreviation,Contact name, contact telephone number, etc.

(b) Collecting information during the use of the service

When you are using the service, you can provide you with service, interactive display, search results, identify account abnormal status, maintain the normal operation of service, improve and optimize your experience of cloud services and the security of your account, including your use of service and how to use it. And correlate the information:

1) Use information

We collect information submitted or generated when you use services as a personal user of , and information submitted or generated when you use services as an end user of enterprise/organization users. If you use your account to log in, we need to record your Equipment information. In order to check whether to log in at other terminals, receive device binding results, receive device alarm messages, etc.; if you are editing the device location, we need Locate your location. In order to realize the automatic positioning of the setting position or display the address list of the location.

2) Equipment information

We will receive and record your use based on the specific permissions you have granted during the installation and use of the software device related information includes device identifier (IMEI, IDFA, Android ID, MAC, OAID, IMSI and other related information), application information (application crash information, notification switch status, software list and other related information), device parameters and system information (device type, Device model, operating system and hardware related information), information about the location of the device (such as IP address, GPS/Beidou location information and the ability to provide Sensor information such as Wi-Fi access points, Bluetooth, and base stations for related information).

3) Information you provided to us

During the use of Service, you can give feedback on the experience of our products, functions, applications and services, help us better understand your experience and needs of using our products or services, and improve our products or services. We will record your contact information, feedback questions or suggestions so that we can further contact you for feedback on our handling opinions.

4) Information provided to us in the third direction

We will collect information about you when other users perform operations related to you, and may also obtain your personal data information from a partner third party or through other legal means. For example, in order to complete your account registration, you agree to the operator based on your personal Mobile phone number to send to SMS verification code. Otherwise, you cannot register for the account.

5) Customer service and dispute settlement

When you contact us or apply for after-sales and dispute resolution in the sale, in order to protect your account and system security, we need you to provide the necessary personal information to verify your registration account identity.

In order to facilitate contact with you, help you solve the problem as soon as possible, or record the treatment plan and results of related problems, we may keep your communication /call records and related content with us (including account information, work order information, you provide to prove the relevant facts). Other information, or contact information you left), if you consult, complain or provide advice on specific orders. We will use your account information and work order information.

In order to provide services and improve the quality of service reasonable needs, we may also use your other information, including your contact with customer service when you provide the relevant information, you participate in the questionnaire survey sent to us when the questionnaire response information.

You can view the status of each permission in your Device “Setting”, and can decide to open or close these permissions at any time.

Please note that the above permissions by default closed, open any permissions that you represent your authorization we can collect and use personal information to provide corresponding service for you, once you close any permissions that represents your cancel the authorization, we will no longer be based on corresponding permission to continue to collect and use personal information, also is unable to provide you with the permission of the service. However, your decision to close your permission does not affect the collection and use of information previously obtained under your license

If we stop operating products and / or services, we will stop collecting your personal information in a timely manner, and notify you of the suspension of operations in the form of an announcement 30 days in advance, and delete or anonymize your personal information in accordance with applicable laws.

III. How we use cookies or the like

(a) The use of cookies

To provide you with better user experience, when you use products or services, we may collect and store data relevant with your visit to service by employing various technologies. In this way, when you visit or revisit service, we will be able to identify you and provide better and more services to you through analyzing the data. This will include verifying your identity through small data files, so that we will be able to understand your habits and help you avoid repeated input of account information or help assess the security of your account. These data files may be Cookie, Flash Cookie or other local storage provided by your browser or relevant applications (collectively, “Cookie”). Please understand that some of our services are only available through use of “Cookie”. ***If permitted by your browser or additional browser services, you may change your acceptance level to Cookie or reject Cookie of *, but under certain circumstances, such rejection may render you unable to use certain functions of which rely on Cookie.

(b) The use of sdk

In order to ensure the stable operation and function implementation of our client, so that you can use and enjoy more services and functions, our application will be embedded in the authorized partner's SDK or other similar applications:

1) In order to visualize the equipment on the map and set the location of the equipment, we use the Amap & location plug-in (com.amap.api, com.loc, com.autonavi)
Types of Personal Information Possible to Obtain: IMEI, openid, location information Permissions for the device being invoked: Get network status, access Wi-Fi status, location information, access rough location, access precise location, read phone status and identity SDK privacy policy link: https://lbs.amap.com/agreement/compliance

2) In order to realize the functions of device binding, device binding application, real-time push of alarm messages, etc., we use Aurora push plug-in: List of system permissions that this plug-in needs to apply for: Android "${applicationId}.permission.JPUSH_MESSAGE", "android.permission.RECEIVE_USER_PRESENT", "android.permission.INTERNET", "android.permission.READ_PHONE_STATE", "android.permission.WRITE_EXTERNAL_STORAGE", "android.permission.READ_EXTERNAL_STORAGE", "android.permission.WRITE_SETTINGS", "android.permission.MOUNT_UNMOUNT_FILESYSTEMS", "android.permission.ACCESS_NETWORK_STATE", "android.permission.ACCESS_WIFI_STATE", "com.huawei.android.launcher.permission.CHANGE_BADGE", "android.permission.VIBRATE", "android.permission.SYSTEM_ALERT_WINDOW", "android.permission.ACCESS_COARSE_LOCATION", "android.permission.CHANGE_WIFI_STATE", "android.permission.ACCESS_FINE_LOCATION", "android.permission.ACCESS_BACKGROUND_LOCATION", "android.permission.ACCESS_LOCATION_EXTRA_COMMANDS", "android.permission.CHANGE_NETWORK_STATE", "android.permission.GET_TASKS", "android.permission.QUERY_ALL_PACKAGES", "${applicationId}.permission.MIPUSH_RECEIVE", "com.coloros.mcs.permission.RECIEVE_MCS_MESSAGE", "com.heytap.mcs.permission.RECIEVE_MCS_MESSAGE"

The data collected by this plug-in, the server address sent, and the data usage description: The Android and iOS SDK used by the plug-in will collect data. For details, please refer to: https://www.jiguang.cn/license/privacy

3) In order to achieve the device scanning code binding and other code scanning related functions, and optimize the code scanning experience, recognition speed, recognition rate, We use the Alipay Native Scanning Plugin mPaaS (com.alipay):
List of system permissions that this plug-in needs to apply for: Camera Permissions
Privacy Policy:https://terms.aliyun.com/

4) The application also integrates the following SDKs: com. igexin. push (individual push; individual verification; individual image), com. gssdk (individual push; individual verification; individual image), com. getui. gs (individual push; individual verification; individual image) and other SDKs.

We conduct rigorous security testing of application program interfaces (APIs) and software tool development kits (SDKs) for authorized partners to obtain information, and agree with authorized partners on strict data protection measures in accordance with this policy and any other related Confidentiality and security measures to handle personal information. IV. How we share, transfer, and publicly disclose your information

(a) Share

We will not share your Personal Information with companies, organizations or individuals other than Service Providers, except in the following circumstances:

1) Sharing with explicit consent: We will share your Personal Information with other parties with your explicit consent;

2) Sharing as required by laws: We may share your Personal Information as required by laws, regulations, litigation, dispute resolution, or by administrative or judicial authority in accordance with laws;

3) Sharing when you actively choose to share: only by sharing your personal information and personal sensitive information can you have the third-party products and services you require, For example:

(1) Sharing to process infringement complaint: When a complaint is made by others against you of infringing upon intellectual property rights or other lawful interests, we need to disclose your information as necessary to the complainer for settlement of complaint; (2) Sharing with our Affiliates: In order to facilitate joint service on the basis of connected account, recommend the information that you may be interested in or protect personal and property safety of the Affiliates of , other users or the public, your Personal Information may be shared with our Affiliates. We will only share necessary Personal Information (for example, in order to facilitate your use of the products or services of our Affiliate with your account, we will share your necessary account information with such Affiliate) and if we intend to share your Sensitive Personal Information or the Affiliate changes the purpose of using and processing Personal Information, we will obtain your authorization and consent again.

(b) Transfer

We will not transfer your Personal Information to any company, organization or individual, except in the following circumstances:

1) Transfer with explicit consent: We will transfer your Personal Information to other parties with your explicit consent;

2) In case of any acquisition, merger or insolvency liquidation, or other circumstances involving merger, acquisition or insolvency liquidation, of Service Providers, if transfer of Personal Information is involved, we will require the new company, organization or individual in possession of your Personal Information to continue to be bound by this Policy, or we will require such company, organization and individual to obtain your authorization and consent again.

(c) Public disclosure

We will disclose your Personal Information to the public only under the following circumstances:

1) We may disclose your Personal Information to the public with your explicit consent or at your voluntary option;

2) If we determine that you have violated laws and regulations, or have a material breach of the agreements with or regulations of , or we intend to protect ’s and its Affiliates’ users or the general public from damages to their personal and property safety, we may disclose your Personal Information in accordance with laws and regulations, or the agreements with and regulations of after obtaining your consent, including the relevant violation and measures taken by against you.

(d) Exceptions to obtaining prior authorization and consent for sharing, transferring and disclosing Personal Information

Unless otherwise stated in a country specific addendum, your Personal Information may be shared, transferred or disclosed to the public without your authorization and consent under the following circumstances: 1) National safety and national defense security are involved;

2) Public security, public health, or major public interests are involved;

3) Criminal investigation, prosecution, judgment and enforcement are involved;

4) For the purpose of protecting your or other individual’s life, property and other major lawful rights and interests, where it is hard to obtain your or such individual’s prior consent;

5) The Personal Information is disclosed voluntarily by you to the public;

6) The Personal Information is collected from the information disclosed through lawful channels, such as lawful news reports or information disclosure by government.

Please be noted that pursuant to laws, sharing and transfer of anonymized data which cannot be recovered by the recipient to re-identify the subjects of such personal information does not constitute sharing, transfer and disclosure of personal information to the public, and therefore it may be stored and processed without notice to you and without your consent.

V. How we protect your information

(a) Technical safety protection

To protect your information security, we have adopted industry standards, reasonable and feasible security measures to protect your information, to prevent unauthorized access to personal information, public disclosure, use, modification, damage or loss. For example, the exchange of data between your and the server is protected by SSL protocol encryption; we also provide HTTPS protocol secure browsing methods for ; we will use encryption technology to improve the security of your personal information; we will use trusted protection mechanism to prevent personal information from malicious attacks; we will deploy access control mechanism to try our best to ensure that only authorized personnel can access personal information; and we will hold security and privacy protection training courses to enhance our employees' awareness of the importance of protecting your personal information.

(b) Safety system certification

has established an industry-leading data security management system which centers on data and is implemented based on data life cycle, and has made efforts to improve the security of the entire system from multiple aspects, including organizational structure, system design, personnel management and product technology

(c) Personnel safety management

We have also taken strict management on the employees or outsourcing personnel who may come into contact with your information, including but not limited to taking different rights control according to different positions, signing confidentiality agreements with them, monitoring their operation, etc. We will provide corresponding security measures according to the existing technology to protect your information and provide reasonable security. We will try our best to make your information not be leaked, damaged or lost. We will hold security and privacy protection training courses to enhance employees' awareness of the importance of protecting personal information.

(d) Password protection

The Internet is not an absolutely secure environment. Please use a complex password when using the Products or Service to help us ensure the security of your account. We will do our commercial reasonable effort to ensure the security of any information you send us. If our physical, technical or management protection facilities are damaged, resulting in unauthorized access, public disclosure, tampering or destruction of your information, which resulting in damage to your legitimate rights and interests, we will bear the corresponding legal responsibility.

(e) Handling of information security incidents

In case of personal information security incident, we will inform you of the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, the suggestions that you can prevent and reduce the risk independently, and the remedial measures for you in accordance with the requirements of laws and regulations (no later than 30 natural days). We will inform you of the event by mail, letter, telephone, and push notice, etc., if it is difficult to inform the personal information subject one by one, we will take a reasonable and effective way to publish the announcement . At the same time, we will also report the disposal of personal information security incidents the regulatory authorities according to relevant laws and regulations.

Given the fact that Internet environment is not completely secure, although we have those security measures in place, please bear in mind that there is no “perfect security measure” on the Internet, and we will use our commercial reasonable efforts to ensure the security of your information.

VI. How we store your information

You can access and manage your information by:

(a) inquire, correct and supplement your information

1) personal users

As a personal user, you have the right to query, correct or supplement your information by:

Log in to app, you can query and correct personal information and personal account related information by operating "Me-Edit Information": nickname, phone number, email address and other information.

(b) Delete your information You can delete part of your information by the way listed in "(1) inquire, correct and supplement your information" above. You can request us to delete your personal information in the following circumstances: 1) If we deal with personal information in violation of laws and regulations;

2) If we collect and use your personal information without your explicit consent;

3) If our handling of personal information seriously violates the agreement with you;

4) If you no longer use products or services, or you actively cancel the account;

5) If we terminate to provide you with Services.

If we decide to respond to your information deletion request, we will also notify the subject who obtains your personal information from us as much as possible and ask them to delete it in time (unless otherwise specified by laws and regulations, or these subjects have obtained your authorization independently). When you or we assist you in deleting the relevant information, we may not be able to delete the corresponding information from the backup system immediately due to the applicable laws and security technologies. We will store your personal information securely and isolate it from any further processing until the backup can be cleared or anonymous.

(c)Log out of your account

When you decide not to use the platform services, the platform provides account cancellation function, you can send the cancellation request + corresponding account to the mailbox or telephone contact: , we will communicate with you within 10 working days to deal with it. After you voluntarily cancel your account, the Platform will stop providing you with products or services, delete your personal information in accordance with the requirements of applicable law, or anonymize it.

(d)Automatic decision making of constraint information system

In some of Service functions, we may only make decisions based on non-manual automatic decision-making mechanisms such as information systems, algorithms, etc. If these decisions significantly affect your legitimate rights and interests, you have the right to ask us to make an explanation, and we will also provide a method of appeal on the premise of not infringing the trade secret or other users' rights and interests, social and public interests.

(e) Respond to your above request For security, you may need to provide a written request or otherwise prove your identity. We may ask you to verify your identity before processing your request. We will reply within 15 days. If you are not satisfied, you can also send a complaint through customer service by online or hotline service. In principle, we will not charge you for your reasonable requests, but we will charge you for repeated requests beyond the reasonable limit. We may reject requests for information that is not directly related to your identity, for unprovoked duplication of information, or that require too many technical means (for example, the need to develop new systems or fundamentally change existing practices), pose risks to the legitimate rights and interests of others, or are impractical. We will not be able to respond to your request in accordance with laws and regulations in the following cases:

1) Related to national security and national defense security;

2) Related to public safety, public health and major public interests;

3) Related to criminal investigation, prosecution, trial and execution of judgment;

4) There is sufficient evidence that the subject of personal information has subjective malice or abuse of rights;

5) Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations;

6) Involving the business secrets of the Service Provide and/or enterprise/organization users.

VII. How you manage your information

(a) Storage location

We store personal information (name, contact number, email) collected and generated in the service within and outside the territory of the People's Republic of China in the territory of the People's Republic of China , otherwise you cannot use the existing products and services. In the following cases, we will provide your personal information to overseas entities after fulfilling our obligations under the law:

1) The applicable law has clear provisions;

2) Obtain your explicit authorization;

3) You conduct personal initiatives such as cross-border transactions through the Internet.

In response to the above circumstances, we will ensure that your personal information is protected to a degree not lower than that stipulated in this policy through contracts and other forms.

(b) Storage period

We will take reasonable and feasible measures to store your personal information and try our best to avoid collecting irrelevant personal information. We will retain your personal information only for the period required to achieve the purposes stated in this policy and for the period required by applicable laws and regulations. For example, will keep relevant network logs for your use of application services for not less than six months in accordance with the requirements of the network security law of the people's republic of China. The criteria for our judgment of the aforementioned period include:

1) Complete the service objectives related to you, maintain corresponding service and business records, and respond to your possible inquiries or complaints;

2) Ensure the safety and quality of our services for you;

3) Do you agree to a longer retention period;

4) Whether there are other special agreements on the retention period.

After your personal information exceeds the retention period, we will delete your personal information or anonymize it as required by applicable law.

VIII. How we process information of minors

products or services attach great importance to the protection of personal information of minors. If you are a minor under the age of 18, you must sign this agreement, use products or services or provide personal information to with the consent of your guardian. If your guardian does not agree with you to carry out the above operations, please immediately stop using our services and notify us in time so that we can take appropriate measures. If you are a guardian of a minor and believe that your guardian has used products or services or provided us with personal information without consent, please also inform us in time, we will close the account or delete the information according to your request. Wait for the operation.

IX. How to update this privacy policy

Our Policy may change from time to time. Without your explicit consent, we will not reduce and/or restrict the rights you are entitled to under this Policy. We will publish any change to this Policy on , if changes are significant, prominent, we will also provide a more prominent notice (including using to collect opinions and make publicity, or by providing you notice with popup window within official homepage). Significant changes to this Policy are included but not limited to the follows:

1) our service pattern changes greatly. Such as the purpose of dealing with user’s personal information, the type of processing your personal information, and the way of using your information, etc.;

2) our control and organization structure changed greatly, such as the change of controller by merger and acquisition, etc.;

3) our user’s Personal Information sharing, transfer or public disclosure main target change;

4) Your right to participate in the processing of personal information and the way you exercise it have changed significantly;

5) our internal department charging the security, its contact information, and complaints channels change;

6) any user information security impact assessment indicates that there is a high risk.

X. How to contact us

If you have any questions, comments or suggestions about 's privacy policy or data processing, you can contact us through "Mobile APP-Me-Feedback" (7 * 24 hours).

You can also contact us by writing or e-mail as follows:

Address:,

Email:

Generally, we will revert to you upon the receipt of your query and verify within Fifteen (15) working day. Should you have any complaint to our feedback, especially you thought that our collecting of your Personal Information may infringe your legitimate rights, you may bring a lawsuit against us at the jurisdiction of People’s Court of for disputes resolution, if any. (End)