Privacy Policy
Update date: 20220114
Introduction
Shenzhen Houwang Technology Co.,Ltd strictly abides by the related policies, respects and protects your personal privacy, and provides you with safer and more reliable services. In view of this, Shenzhen Houwang Technology Co.,Ltd. ("Onuof") has formulated this "Privacy Policy" (hereinafter referred to as "this Policy") to explain the issues about how to collect and process personal data and how to protect your privacy.
Note: Before using Onuof's products or services, please read this policy carefully, make sure you agree with the related pact. Once you start to use the Onuof service, it will be deemed as acceptance and approval of the content of this policy. If you have any questions,contact us through email:support@ihomvos.com.
Definition
Client applications: APP applications (such as APP) that are used to connect to Onuof wired platforms and remotely control smart devices.
Mobile device: refers to a mobile terminal (such as a mobile phone / tablet, etc.) that can install client applications.
Service provider: refers to Shenzhen Houwang Technology Co.,Ltd., which provides client applications.
Intelligent devices: terminal devices that can transmit data through wireless networks, including, but not limited to, webcams, visual doorbells, NVR/DVR, intelligent robots, intelligent floor sweeping robots, inductive alarms, etc.
Personal information: refers to all kinds of information that can be alone or combined with other information to identify a specific natural person or to reflect the activities of a specific natural person.
Business data: refers to the data generated and processed by users in the process of uploading, downloading and distributing using Onuof services.

Privacy policy.
Ⅰ.How to collect and use information.
Your personal information that we need / may need to collect and use in the course of using Onuof products and services includes:
1. Account registration information: for services that need to be used through an Onuof platform account, you need to provide your name, email address, phone number, verification code and account password to create an Onuof platform account.
Fill in the above information required during the use of the client application, and we will verify your identity according to the information you provide to ensure that you are providing services.
2. Non-account registration information: if you provide personal information necessary for non-registered accounts, such as nicknames and avatars, we will provide you with more humane services.
Your nickname and avatar are only used as supplementary information for your personal data and will not be displayed publicly.
3. User feedback: when you use the feedback and suggestion features in our products, we will collect your email address, mobile phone number and feedback content in order to deal with your problems and equipment failures in a timely manner.
4. Mobile device information: in order to identify the abnormal status of the account, understand the product suitability, and provide timely early warning message push and advertisement push notification, we may automatically collect your personal information during the use of our service, including:
1) basic information: we will receive and record information about the device you use (including device model, operating system version, device settings, unique device identifier, device environment, etc.), location of the device (including your authorized GPS location and sensor information such as WLAN access point, Bluetooth and base station) according to your specific operation in the installation and / or use of the software.
2) Service log information: when you use the products or services provided by our website or client, we will automatically collect your business data about our services and save them as service logs, including browsing, clicking to view, search queries, transactions, sharing information, as well as IP address, browser type, telecom operator, language of use, date and time of visit.
3) Authorization Information: in order to provide more user-friendly services, we use the following features in your enabling client applications, which may require the collection and use of your personal information.
If you do not provide this information, you will not be able to enable the relevant functions, but will not affect the normal use of the account.
Permission to enable camera / camera: when enabling client applications to remotely control smart devices, we need to obtain this permission on mobile devices to provide the ability to scan QR codes to add smart devices.
Access to photo albums (photo / video): to capture videos and pictures of smart devices in real time,we need to obtain this permission. The app will save the captured video files and pictures on the mobile devices so you can view and use later.
Permission to turn on microphone: to achieve voice function, one-way audio or two-way audio,we need this permission.
Permission to turn on loudspeaker: you can enable loudspeaker permission to achieve voice playback in order to monitor the voice of the smart device.
Access to system storage: in order to ensure the normal operation of the application and the space required for the storage of picture / video materials,we need the access to your system storage.
Access to location information: to provide security-related services for your geographic location,we need to know your location while you are installing the APP.
Access to notification: to obtain notification to ensure that you receive the alarm notification message sent by the intelligent device,we need to to obtain notification.
5. Smart device information: in order to remotely control smart devices through client applications, we will collect basic information of smart devices, including device name, device ID, device password, online status, network access information, firmware version, upgrade information, in order to provide you with connection services.
The above functions may require you to provide access of your location information (geographic location), camera, photo album (photo gallery), microphone (voice), speaker and system storage space information on your mobile device,to collect and use the information involved in these permissions. You can view the status of the above permissions item by item in the system settings of your mobile device, and decide whether these permissions are turned on or off at any time.
Please note that if you enable permission, which means you authorize us to collect and use relevant personal information to provide corresponding services for you. Once you stop to enable permission, which means that you cancel the authorization. We will no longer continue to collect and use relevant personal information based on the corresponding permission, nor will we be able to provide you with the corresponding services.
However, your decision to stop to enable permissions will not affect the collection and use of information based on your previous authorization.
Ⅱ.How to use Cookie and similar technologies.
Second, how to use Cookie and similar technologies.
1 、 Cookie.
To make it easier for you to access, we store Cookie, Flash Cookie, or other local storage provided by browsers (or associated applications) that usually contains identifiers, site names, and some numbers and characters (collectively, "Cookie") on your computer or mobile device.
With the help of Cookie, the website can store your login profile and other data.
If your browser or browser add-on service allows, you can modify the acceptance of Cookie or reject our Cookie.
However, if you do so, it may affect your secure access to our website in some cases, and you may need to change user settings each time you visit our website.
2. Similar technologies of Cookie.
In addition to Cookie, we will also use website beacons, pixel tags, ETag and other similar technologies on the website.
For example, the email we send to you may contain an address link to our website, and if you click on that link, we will follow the click to know more about your service preferences,which will helpful for us to improve our customer service experience.
A website beacon is usually a transparent image embedded in a website or email.
With the help of the pixel tags in the e-mail, we can know whether the e-mail has been opened or not.
If you do not want your activities to be tracked in this way, you can unsubscribe from our mailing list at any time.
ETag (entity tag) is a HTTP protocol header transmitted between an Internet browser and an Internet server, which can replace Cookie. ETag can help us avoid unnecessary server load, improve service efficiency, save resources and energy.At the same time, we may use ETag to record your identity, so we can improve our products or services better.
Most browsers provide users with the ability to clear browser cached data, which means you can perform corresponding data cleanup operations in the browser settings function.
However, if you disable ETag, you may not be able to enjoy a relatively better product or service experience.
Ⅲ.How to share, transfer and disclose information.
1. Share information.
We do not share your personal information with companies, organizations or individuals other than Onuof service providers, except in the following cases:
1) sharing under legal circumstances: we may share your personal information in accordance with laws and regulations, litigation, dispute resolution needs, or as required by administrative and judicial authorities in accordance with the law.
2) share with consent: with your consent, we will share your personal information with other parties.
3) sharing when you need: when you enable the sharing smart device feature through the client application, we will share the smart terminal information you added with your designated end users according to your choice.
2. Transfer information.
We will not transfer your personal information to any company, organization or individual, except in the following cases:
1) transfer with consent: with your consent, we will transfer your personal information to other parties.
2) in the event of a merger, acquisition or bankruptcy liquidation of an Onuof service provider, or other situations involving a merger, acquisition or bankruptcy liquidation, if the transfer of personal information is involved, we will require the new company or organization that holds your personal information to continue to be bound by this policy, otherwise we will require the company, organization and individual to re-seek authorization from you.
3. Disclosure of information.
We will only disclose your personal information under the following circumstances:
1) with your consent or based on your active choice, we may publicly disclose your personal information.
2) if we determine that you have violated laws and regulations or seriously violated the relevant agreements and rules of Onuof platform, or in order to protect the personal and property safety of Onuof platform users from infringement, we may disclose your personal information in accordance with laws and regulations or with your consent, including relevant violations and measures against Onuof platform.
4. Exceptions to the sharing, transfer and disclosure of information.
In the following cases, the sharing, transfer, and public disclosure of your personal information does not require your prior authorization:
1) related to national security and national defense security.
2) related to public safety, public health and major public interests.
3) relating to judicial or administrative law enforcement such as criminal investigation, prosecution, trial and judgment enforcement.
4) in order to protect your or other personal life, property and other important legitimate rights and interests, but it is difficult to get my consent.
5) personal information that you disclose to the public on your own.
6) collecting personal information from disclosed information legally publicly, such as legal news reports, government information disclosure and other channels.
Please be aware that, under applicable law, if we take technical and other necessary measures to deal with personal information so that the data recipient cannot re-identify a specific individual and cannot recover, then the sharing, transfer and public disclosure of such processed data do not need to be notified to you and your consent.
Ⅳ.How to protect and manage your information.
1. We have taken reasonable and feasible security measures in line with industry standards to protect your information from unauthorized access, public disclosure, use, modification, damage or loss.
For example:
1) We use HTTPS encrypted transfer protocol to transfer device data to the cloud.
2) data between devices are transmitted in 128/256-bit AES and XTEA encrypted mode.
3) automatically generate AES encryption key through ECDH.
4) use ECDSA digital signature to verify identity.
5) transmit image data by scrambling mechanism.
2. We have an advanced data security management system with data as the core and around the data life cycle, which improves the security of the whole system from the aspects of organization construction, system design, personnel management, product technology and so on. At present, our important information system conforms to the GDPR specification and has been certified by ISO27001.
3. Onuof continuously adjusts the existing working guidelines and procedures to ensure the confidentiality, integrity and availability of data, and can promptly notify authorities and users within 72 hours in accordance with the requirements of laws and regulations after the occurrence of personal privacy violations:
1) Import ISO 27001 / ISMS information security management system.
2) revise the policy of data protection and corporate privacy.
3) adjust data collection and use of consent form / declaration content.
4) update data leak handling procedures.
5) develop emergency response procedures for individual capital accidents.
Ⅴ.How to manage your information.
You can manage your information in the following ways:
1. Query and change your information: Through the client application or login to the website, click on the account settings to query and modify your account information.
2. Change the scope of your authorization: when you enable some features of the client application, we need to obtain your corresponding authorization on the mobile device, and you can modify the authorization agreement in the relevant system settings of the mobile device. When you withdraw your authorization consent, we will no longer process the corresponding personal information, and the corresponding features may not be enabled properly. However, your decision to withdraw your consent will not affect the previous processing of personal information based on your authorization.
3. Respond to your feedback request: in order to ensure security, we may require you to verify your identity before processing your request, so you are required to provide written proof or other relevant information that can prove your identity.
In the following cases, we will not be able to respond to your request in accordance with the requirements of laws and regulations:
1) related to national security and national defense security.
2) related to public safety, public health and major public interests.
3) relating to criminal investigation, prosecution, trial and enforcement of sentences, etc.
4) there is sufficient evidence to show that the subject of personal information has subjective malice or abuse of rights.
5) responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations.
6) involving trade secrets.
Ⅵ How to realize the transfer of information on a global scale
In response to the requirements of laws and regulations applicable to data security and protection in different countries, measures for the global transfer of information are as follows:
Personal information collected and generated in domestic operations shall be stored in the territory, except in the following cases:
1) there are clear provisions in the applicable law.
2) obtain your express authorization.
3) you conduct cross-border transactions and other personal initiatives through the Internet.
In view of the above, we will ensure that your personal information is adequately protected in accordance with this Privacy Policy.
Ⅶ How to update this privacy policy
1. We may revise the contents of this policy in time to meet the requirements of the latest laws and regulations.
2. We will notify you on the Onuof official website or other means before the change takes effect, so that you can read the complete content of the update in detail.
3. Under such circumstances, if you still choose to continue to use our services, which means you agree to the first revised policy constraints.
Ⅷ How to contact us.
If you have any questions, comments or suggestions about this policy or other related matters, you can feedback your questions by sending an email to support@ihomvos.com.
We will review your question as soon as possible and reply in time after verifying your identity.