Privacy Policy

Thank you for trusting and using ISafe. All your personal information is used solely to provide services to you. AegisNexus company will make every effort to protect your information security.

Please read the complete Terms of Service and Privacy Policy carefully.

This agreement involves AegisNexus company (hereinafter referred to as "AegisNexus"). Thank you for using ISafe. We have updated some content based on relevant laws, regulations, and technical standards, mainly including:

  1. Re-optimized the description of service functions in the "My" section.
  2. Re-optimized the description of service functions in the Home section.
  3. Re-optimized the description of service functions in the "Scenes" section.
  4. Re-optimized the description of service functions in the "Mall" section.
  5. Added disclosure regarding software licensing and user service agreements.
  6. Supplemented the information display, search, and push services for personalized needs.
  7. Added explanation for the retention period of product/service information and transaction data.
  8. Added the method for obtaining copies of personal information.
  9. Supplemented the explanation of the ISafe permission list.

Privacy Policy Summary

The service provider of the AegisNexus platform (or simply "we") deeply understands the importance of personal information to you. We will provide you with safer and more reliable services in accordance with legal requirements. To help you quickly understand the core content of the Privacy Policy, we will provide a simple and intuitive explanation of how we process and protect your personal information through the following summary. For more detailed rules on how we handle your personal information, please refer to the complete Privacy Policy.

1. How We Collect and Use Your Personal Information

We collect your information based on the principles of legality, reasonableness, and necessity. When providing you with a specific service, we will clearly inform you about the information to be collected and its purpose, in response to your specific service request. Depending on the service you choose, we may collect one or more types of your personal information. For details, please see the ISafe Collected Personal Information List.

To provide corresponding services, the ISafe platform may request permissions from your device. If you wish to know more, the following outlines the business functions corresponding to the requested permissions, the purpose of the request, and the circumstances under which permission is requested from you. Please read the ISafe Permission List. You can choose to turn off some or all permissions in the App settings or through the Android/iOS system settings to refuse our collection of the corresponding information. The display and closing methods of permissions may vary across different devices using Android/iOS systems. Please contact the device and system developer for specifics.

2. Sharing of Your Personal Information

To provide you with more professional and secure core business functions and additional business functions, our products or services incorporate third-party SDKs. Before you agree to the Privacy Policy, third-party SDKs will not collect your information. If you wish to learn more about the third-party SDKs we integrate, please see the ISafe Third-Party Personal Information Sharing List for details.

3. How You Can Manage Your Information

You can manage your personal information and exercise your rights as a data subject through the following means:

Contact Us: If you cannot perform operations independently through product features, you can contact us using the methods shown in Article 11 of the complete Privacy Policy.

Privacy Policy

Introduction

Your trust is crucial to us. We deeply understand the importance of your personal information. We will collect your personal information within a reasonable and necessary scope, in accordance with legal requirements. We will make every effort to use reasonable and effective information security technology and management processes, taking appropriate security protection measures to prevent your information from being leaked, damaged, or lost. In view of this, the service provider of the AegisNexus platform (or simply "we") formulates this Privacy Policy and draws your attention to the following:

This agreement applies to all products and services provided to you by the AegisNexus platform service provider via websites, clients, mini-programs, and new forms that emerge with technological development. The AegisNexus platform referred to in this agreement includes the ISafe client, ISafe WeChat mini-program, ISafe Service WeChat mini-program, ISafe Mall WeChat mini-program, AegisNexus Official Account, AegisNexus official website, and others operated by AegisNexus company and its affiliates.

It is important to remind you that AegisNexus provides a unified account system. Once you successfully register an account on any AegisNexus platform, you can use that account to log in to any AegisNexus platform and enjoy services provided by the relevant AegisNexus platforms, including but not limited to ISafe, ISafe Mall, ISafe Member, ISafe Service, AegisNexus Official Account, ISafe Alipay mini-program, AegisNexus official website, AegisNexus Service Account, and other AegisNexus-related platforms. AegisNexus provides you with a unified and convenient account service. Your account-related actions on any AegisNexus platform, such as account registration, cancellation, password modification, and bound phone number modification, will take effect on other AegisNexus platforms.

If our or our affiliates' products or services use AegisNexus platform products or services (e.g., using an AegisNexus platform account to log in) but do not have an independent privacy policy/agreement, then this policy/agreement also applies to that part of the product or service. If our or our affiliates' products or services provided to you have separate privacy policies/agreements, then those products or services are governed by their respective privacy policies/agreements. If a particular platform's separate privacy policy/agreement has incomplete provisions, the corresponding provisions of other relevant AegisNexus platform privacy policies/agreements may be referenced.

It is important to note that this agreement does not apply to services provided by third parties, such as when you are redirected from the AegisNexus platform to a third-party website, client, or program. The personal information you provide to that third-party service provider is not governed by this agreement.

Before using any product or service on the AegisNexus platform, please be sure to read this agreement carefully and understand it thoroughly, especially the terms marked in bold and underlined. You should read them carefully and start using the service only after fully understanding and agreeing to accept them. If you have any questions about this agreement, you can consult AegisNexus customer service (0755-82804466) or contact us using the methods published in Article 11 of this agreement.

If you are a minor under the age of 18, please read this agreement in the presence of your legal guardian, paying special attention to the terms regarding minors.

What This Policy Mainly Explains

1. Our Role

Our Role: We are the data controller of your data. This means we have the right to decide how to process your personal information and for what purposes. We understand that you care about how your data is used and shared, and we appreciate your trust. We will act prudently and sensibly.

2. What Information We Collect From You

We collect your information based on the principles of legality, reasonableness, and necessity. When providing you with a specific service, we will clearly inform you about the information to be collected and its purpose, in response to your specific service request. Depending on the services you choose, we may collect one or more of the following types of information in the following scenarios:

2.1 When logging in for the first time, you need to provide your mobile phone number to register your account and set your account password. You can also log in to the ISafe App via "WeChat Login," "QQ Login," "Apple Account," etc. If you choose the "WeChat Login," "QQ Login," or "Apple Account" method, we also need to obtain your avatar, nickname, and OpenID from the Tencent platform or your Apple ID to identify you within the ISafe App. You may choose from the aforementioned methods. If you do not provide relevant information, the AegisNexus platform will not be able to create an account for you and provide services. If you use the ISafe Lite WeChat mini-program, with your consent, we need to obtain your mobile phone number, avatar, nickname, and OpenID from the WeChat platform to identify you within the ISafe Lite WeChat mini-program. If you use the ISafe Alipay mini-program, with your consent, we need to obtain your mobile phone number, avatar, nickname, and OpenID from the Alipay platform to identify you within the ISafe Alipay mini-program.

2.2 After successful registration, in the App's personal profile section, you can optionally fill in your personal information, including your nickname, gender, birthday, address, avatar, and profile. This type of information belongs to your "Account Information." The supplementary account information you provide will help us provide you with a better shopping experience and personalized membership services. However, if you choose not to provide this supplementary information, it will not affect your use of basic functionalities.

2.3 When you choose to order products, arrange delivery, or request installation or repair services, we will ask you to fill in/provide your name, contact information, delivery address, installation address, repair address, and service time to process your order and after-sales issues. Relevant product order information will record the specific order number, order creation time, the amount you paid, and your notes corresponding to the product or service you purchased. We collect this information to complete your transaction smoothly, ensure the security of your transaction, facilitate your order service inquiries, provide after-sales customer service and installation services, and for other purposes we clearly inform you of. After purchasing a product, you can choose whether to enter the proof of purchase for the device (including order screenshots and electronic invoices) into the device management section of ISafe. The entered purchase information is used to calculate and verify the manufacturer's warranty period, in case the paper proof is lost and the start date of the manufacturer's warranty cannot be verified.

2.4 When you leave a message, comment, or post a status update on the ISafe platform, we need to collect and publicly disclose your nickname, avatar, message, comment, and status content. Your messages, comments, and statuses will be stored on the server. When you write a product review, we will de-identify your AegisNexus platform account and nickname before displaying them publicly. However, please note that the information you publicly disclose may involve your own or others' personal information, even sensitive personal information. For example, if you choose to upload images or text containing personal information when commenting, please consider more carefully whether to share or even publicly share such information when using our services.

2.5 When using ISafe App services, you can optionally fill in/provide the following information: gender, age, height, weight, areas of interest, hobbies, and other information you choose. The information you fill in/provide is only used to associate you with matching services. If you do not provide it, services may not align with your actual needs. You can also access, modify, and delete the information you filled in on the corresponding feature page.

2.6 When using ISafe App health management services, you can optionally fill in/provide the following information: gender, age, height, weight, activity level, dietary habits and preferences, food allergies, waist circumference, blood pressure/lipids/blood sugar/uric acid levels for family members and yourself, alcohol and smoking habits, education level, total cholesterol/LDL cholesterol/triglyceride values, various body data, and application scenarios. The information you fill in/provide is only used to assess the future risk of disease, associate you with matching health recommendations, and provide suggestions for habits like exercise, water intake, sleep, and emotions. If you do not provide it, the future risk of disease may not be accurately assessed, and the aforementioned services may not align with your actual needs.

2.7 When your IoT device connects to the network for the first time or changes its network environment, you need to go through the device network configuration process. To enable the connection between the application and smart devices, it is necessary to obtain the system's Wi-Fi network hotspot list. According to Android and iOS system permissions, the corresponding phone location permission must be requested, primarily to obtain the WLAN name and WLAN password. Please rest assured, this information is only used locally and is not uploaded to cloud servers. At the same time, to facilitate subsequent device binding, the AegisNexus platform locally encrypts and saves the Wi-Fi password for automatic filling during the next device network configuration, enabling quick device network connection. On the ISafe homepage and network configuration page, to discover devices around you faster, we will intermittently and automatically scan the Wi-Fi list near you based on your phone version. If you use the device feature in the ISafe App, unconfigured devices will automatically obtain the Wi-Fi name and password from already configured devices. The WLAN name and password will be automatically filled in for device binding (for example: when you have already bound one device, service rules are established through the backend server's rule engine, and we synchronize the Wi-Fi names and passwords of other configured smart appliances with unconfigured ones to provide faster device smart access services). To provide you with better network configuration service and promptly identify issues you encounter during the process, we collect information such as Mac address, configuration method, network status, and error messages during your configuration process. This information will be uploaded to AegisNexus servers for processing. If you use the ISafe Lite WeChat mini-program for network configuration, the aforementioned information will be uploaded to the WeChat backend and then synchronized to the ISafe Lite WeChat mini-program.

2.8 When you use AegisNexus smart services, IoT devices may collect data generated by measurement devices you have bound to ISafe, such as weight, body fat, body temperature, blood pressure, blood sugar, heart rate, sleep data, step count, environmental data (e.g., temperature, humidity, air quality), and other information. This data is used to provide you with intelligent services like health management and environmental optimization.

2.9 When you use location-based services, we collect your location information to provide you with nearby devices, service outlets, localized content recommendations, and other services.

2.10 To ensure the security of your use of our products and services, we collect your device information (including device model, operating system version, unique device identifier, network device hardware address, etc.), log information (including your operation logs when using services, service failure information, etc.), and IP address for fault analysis, security prevention, anti-fraud, and other purposes.

3. How We Use Your Information

3.1 We strictly comply with legal regulations and agreements with users, using the collected information for the following purposes:

(1) To provide you with various services and maintain and improve these services;

(2) To achieve the purposes described in Article 2 of this agreement;

(3) Security Assurance: For purposes such as verifying your identity, ensuring service security, and preventing risks;

(4) Personalized Recommendations: To provide you with more tailored content displays, product recommendations, and services based on your usage habits and preferences;

(5) Product Development and Service Optimization: To improve our products or services, we analyze usage information, perform data statistics, and conduct user research;

(6) Other purposes for which we have obtained your consent.

3.2 When we intend to use information for purposes not specified in this agreement, we will seek your consent in advance.

4. Under What Circumstances We Share or Transfer Your Information

4.1 Sharing: We will not share your personal information with any company, organization, or individual outside of AegisNexus, except in the following circumstances:

(1) With your explicit prior consent or authorization;

(2) As required by applicable laws and regulations, legal procedures, mandatory administrative or judicial requirements;

(3) When it is necessary, within the limits permitted by laws and regulations, to protect the interests, property, or safety of AegisNexus, its affiliates or partners, you or other AegisNexus users, or the public from damage;

(4) Only by sharing your information can we achieve the core functions of our product and/or service or provide the service you need;

(5) To handle disputes or controversies between you and others at your request;

(6) As provided in the relevant agreements you have signed with us (including electronically signed agreements and corresponding platform rules) or other legal documents;

(7) For academic research purposes;

(8) Based on social public interests that comply with laws and regulations.

4.2 Transfer: We will not transfer your personal information to any company, organization, or individual, except in the following circumstances:

(1) With your explicit prior consent or authorization;

(2) As required by applicable laws and regulations, legal procedures, mandatory administrative or judicial requirements;

(3) In the context of mergers, acquisitions, asset transfers, or similar transactions, if personal information transfer is involved, we will require the new holder of your personal information to continue to be bound by this agreement. Otherwise, we will require that company or organization to seek your authorization and consent again.

5. Public Disclosure

We will only publicly disclose your personal information under the following circumstances and with security protection measures that meet industry standards:

(1) At your request and with your explicit consent, disclose the specific personal information you designate;

(2) When required by laws, regulations, mandatory administrative law enforcement, or judicial requirements, we may publicly disclose your personal information in accordance with the required type and method of disclosure.

6. How We Store Your Information

6.1 Storage Location: Personal information collected and generated within the territory of the People's Republic of China will be stored within the territory of the People's Republic of China.

6.2 Storage Period: We retain your personal information only for the period necessary to achieve the service purposes, for example:

(1) Mobile Phone Number: If you need to use AegisNexus platform services, we need to retain your mobile phone number to ensure your normal use of the service;

(2) Order Information: When you use the order function, we need to retain your order information and transaction records for your subsequent queries. At the same time, in accordance with relevant legal requirements, we will retain relevant transaction information for no less than three years;

(3) Device Information: To ensure the normal operation of device services, we need to retain your device information and network configuration information;

(4) After exceeding the above retention periods, we will delete or anonymize your personal information.

7. How We Protect Your Information

7.1 We have taken security protection measures that meet industry standards to protect the personal information you provide, preventing data from unauthorized access, public disclosure, use, modification, damage, or loss.

7.2 We will take all reasonably feasible measures to ensure that irrelevant personal information is not collected. We will only retain your personal information for the period necessary to achieve the purposes described in this agreement, unless an extension of the retention period is required or permitted by law.

7.3 The internet is not an absolutely secure environment. Please use complex passwords to help us ensure the security of your account.

7.4 We will regularly update and publicly disclose security risks, personal information security impact assessment reports, and other related content, which you can obtain through official AegisNexus channels.

8. Your Rights

8.1 Access Your Personal Information: You have the right to access your personal information, except as otherwise provided by laws and regulations.

8.2 Correct Your Personal Information: When you find errors in the personal information we process about you, you have the right to request us to make corrections.

8.3 Delete Your Personal Information: Under the following circumstances, you can request us to delete personal information:

(1) If our processing of personal information violates laws and regulations;

(2) If we collect and use your personal information without obtaining your consent;

(3) If our processing of personal information violates our agreement with you;

(4) If you no longer use our products or services, or you have canceled your account;

(5) If we no longer provide you with products or services.

8.4 Change the Scope of Your Authorization and Consent: Each business function requires some basic personal information to be completed. For the collection and use of additional personal information, you can give or withdraw your authorization and consent at any time.

8.5 Obtain a Copy of Your Personal Information: You have the right to obtain a copy of your personal information. You can apply to obtain it through customer service channels.

8.6 Responding to Your Above Requests: For security purposes, you may need to provide a written request or prove your identity in other ways. We may ask you to verify your identity before processing your request.

9. Account Deletion by the Data Subject

9.1 You can delete your account in My -> Settings Center -> Delete Account.

9.2 After you actively delete your account, we will stop providing you with products or services, delete your personal information in accordance with applicable legal requirements, or anonymize it.

10. How We Protect Minors' Information

10.1 We place great importance on the protection of minors' personal information. If you are a minor under the age of 18, you should obtain the consent of your guardian before using our services.

10.2 We protect minors' personal information in accordance with relevant national laws and regulations. We will only collect, use, share, or disclose minors' personal information when permitted by law, with the explicit consent of parents or other guardians, or when necessary to protect minors.

10.3 If we discover that we have collected a minor's personal information without obtaining verifiable parental consent, we will try to delete the relevant information as soon as possible.

11. Policy Updates

11.1 Our Privacy Policy may be updated. We will not reduce your rights under this Privacy Policy without your explicit consent.

11.2 We will post any changes to this agreement on this page. For significant changes, we will also provide more prominent notice (including, for certain services, sending email notifications explaining the specific changes to the Privacy Policy).

11.3 Significant changes referred to in this agreement include but are not limited to:

(1) Significant changes in our service models. Such as the purpose of processing personal information, types of personal information processed, methods of using personal information, etc.;

(2) Significant changes in our ownership structure, organizational structure, etc. Such as changes in ownership due to business adjustments, bankruptcy, mergers, etc.;

(3) Changes in the main parties with whom personal information is shared, transferred, or publicly disclosed;

(4) Significant changes in your rights regarding personal information processing and how you exercise them;

(5) Changes in the department responsible for personal information security, contact information, and complaint channels within our company;

(6) When personal information security impact assessment reports indicate high risks.

11.4 If you do not agree to the modified Privacy Policy, you have the right to and should immediately stop using the services of the AegisNexus platform. If you continue to use the services of the AegisNexus platform, it will be deemed that you accept the modifications made by AegisNexus to the relevant terms of this agreement.

12. Rules for Third-Party SDK Information Collection

12.1 You can click here to view the rules for third-party SDK information collection.