iNUB App Privacy Policy
This policy applies solely to the Shanghai Yinji Technology Co., Ltd. product iNUB App.
Latest Update Date: April 3, 2025
Shanghai Yinji Technology Co., Ltd. (Address: Building 34, Lane 1387, Zhangdong Road,
Pudong New Area, Shanghai; hereinafter referred to as "we") attaches great importance to the protection of
your personal privacy. Thank you for your trust in us. When you use our iNUB App services, we will collect,
store, use, and disclose your information in accordance with the "iNUB App Privacy Protection Policy"
(hereinafter referred to as "this Privacy Policy"). We will also explain to you how to access, update, manage,
and protect this information. This Privacy Policy applies to the mobile client of the iNUB App platform and
other products that incorporate iNUB App functionality (including but not limited to the iNUB App). Please
carefully read this policy. You should only use our services after confirming that you fully understand and
agree to it. If you do not agree to any part of this Privacy Policy, you should immediately stop using our
services. When you start using our services, it indicates that you have agreed to our collection, storage,
use, sharing, and protection of your personal information in accordance with this policy.
This Privacy Policy mainly includes the following content:
This Privacy Policy will explain to you the scope of personal information that each function may
collect, the purpose and method of collection, and the possible consequences of refusing to provide personal
information. We will strictly adhere to the principles of legality, legitimacy, necessity, and minimization
when collecting and using your information.
This Privacy Policy will explain to you the mobile phone permissions we may need to invoke, the
corresponding business functions, the purpose of the invocation, whether we will ask for your permission
before the invocation, and how you can disable the corresponding permissions. After you agree to this
Privacy Policy, the corresponding mobile phone permissions will not be enabled by default. When it comes to
important or sensitive mobile phone permissions, we will pop up another window to ask for your consent again
before enabling them when you use the corresponding functions. After the permissions are enabled, you can
disable them at any time through the device settings.
The rules for using personal information, and the circumstances under which personal information may
be shared, transferred, and publicly disclosed. We will strictly use or share your personal information in
accordance with the scenarios described in this Privacy Policy. If we need to use or share your personal
information beyond the scope described in this Privacy Policy, we will inform you again and obtain your
explicit consent.
You can further understand the specific content of this Privacy Policy through the following table of
contents:
I. Definition of Personal Information
II. How We Collect Personal Information
III. How We Use Cookies and Similar Technologies
IV. How We Store and Protect Personal Information
V. How We Use Personal Information
VI. How We Disclose Personal Information to Third Parties
VII. How You Can Access and Manage Your Personal Information
VIII. How We Protect Minors' Information
IX. Updates to This Policy
X. How to Contact Us
I. Definition of Personal Information
1.1 Personal information refers to various information that is recorded electronically or otherwise and can
individually or in combination with other information identify the personal identity of a natural person or
reflect the personal activities of an individual.
1.2 Sensitive personal information refers to personal information that, once leaked, illegally provided, or
abused, may endanger personal and property safety, and may easily lead to damage to personal reputation,
physical and mental health, or discriminatory treatment.
1.3 Anonymized information refers to information that has been technically processed so that the personal
information subject cannot be identified and the information cannot be restored. Anonymized information does
not fall under the category of personal information.
1.4 Other information that cannot identify the identity of a specific natural person or reflect the activities
of a specific natural person does not fall under the category of personal information.
II. How We Collect Personal Information
2.1 We will explain in detail to you the personal information collected by each business function, the
collection methods and purposes, and the impacts of refusing to provide the information. The business
functions specifically include:
2.1.1 Core business functions: Account creation, vehicle control, vehicle positioning, data analysis, and
product development.
2.2 Account Registration
Before using our services, you need to create an account. Through your voluntary provision, we will collect
the following information from you:
2.2.1 You need to provide your corresponding mobile phone number when registering an account
and verify it with a SMS verification code. The aforementioned information is your sensitive personal
information. If you refuse to provide the above information, you will not be able to use our
services.
2.2.2 Vehicle positioning information. We will calculate your vehicle's location information in the cloud
through the Bluetooth signal from the Bluetooth module installed on the vehicle.
2.3 Security Management
In order to prevent operational risks, ensure the security of your account, meet legal requirements, conduct
data analysis, and improve the iNUB App services, we will collect your device information (device ID, device
model), mobile application list, and log information within the iNUB App (telecom operator, access date and
time). We will process the above information in accordance with the legal requirements for the retention
period.
2.4 When you use our services, we will also collect your vehicle control information:
2.4.1 Basic vehicle condition information. In order to provide you with the iNUB App services, we need to
obtain real-time basic vehicle condition information, including but not limited to door lock status,
door open/close status, etc. The iNUB App services rely on the feedback of the vehicle condition to
implement the unlocking and locking control of the vehicle.
2.5 According to laws, regulations, and national standards, in the following circumstances, we may
collect and use your personal information without your consent:
2.5.1 Directly related to national security or national defense security;
2.5.2 Directly related to public safety, public health, or major public interests;
2.5.3 Related to criminal investigation, prosecution, trial, and judgment execution;
2.5.4 Necessary to safeguard your or other individuals' major legitimate rights and interests such as life
and property, but it is difficult to obtain your consent;
2.5.5 The personal information collected is information that you have publicly disclosed to the
public;
2.5.6 Collected from legally publicly disclosed information, such as legal news reports, government
information disclosure, and other channels;
2.5.7 Necessary for academic research institutions to conduct statistics or academic research based on
public interests, and when providing academic research or descriptive results to the public, the personal
information contained in the results is de-identified;
2.5.8 Necessary to maintain the safe and stable operation of the products or services provided, such as
detecting and resolving product or service failures.
2.6 Device Permission Invocation
2.6.1 To ensure the normal provision of our digital key services, we may invoke some of your device
permissions. The following is the list of permissions, the corresponding business functions, the purposes of
our permission invocation, and whether we will ask for your permission before the invocation.
2.6.2 You can choose to disable some or all permissions in the settings function of your device to
refuse our collection of the corresponding personal information. However, we remind you that
disabling some permissions may affect the normal use of some functions. The display and disable methods of
permissions may vary among different devices using Android and iOS systems. Please refer to the specific
device disable methods or contact the device and system developers.
2.6.3 Device Permission Invocation List
Android System Permission List
| Device Permission |
Corresponding Business Function |
Purpose of Permission Invocation |
Whether to Ask |
Whether Users Can Disable the Permission |
Impact After Disabling the Permission |
| SMS |
All Functions |
Account Login |
No |
No |
|
| Read Location Information |
Bluetooth Connection |
Determine the distance between the user and the vehicle through Bluetooth to achieve intelligent
unlocking and locking |
No |
Yes |
Inability to connect to the vehicle via Bluetooth |
| Enable Mobile Data |
All Functions |
Connect to the Network |
No |
Yes |
Inability to connect to the network |
| Enable WLAN |
All Functions |
Connect to the Network |
No |
No |
|
| Bluetooth Permission |
Bluetooth Connection |
Establish a Bluetooth connection between the mobile phone and the digital key |
Yes |
Yes |
Inability to connect to the vehicle via Bluetooth |
iOS System Permission List
| Device Permission |
Corresponding Business Function |
Purpose of Permission Invocation |
Whether to Ask |
Whether Users Can Disable the Permission |
Impact After Disabling the Permission |
| Wireless Data |
All Functions |
Connect to the Network |
No |
Yes |
Inability to connect to the network |
| Bluetooth |
Bluetooth Connection |
Establish a Bluetooth connection between the mobile phone and the digital key |
Yes |
Yes |
Inability to connect to the vehicle via Bluetooth |
III. How We Use Cookies and Similar Technologies
3.1 We use cookies and other similar technologies to enhance your experience when using our services.
When you use our services, we may use these technologies to send one or more cookies or anonymous
identifiers to your device to collect and store information about your access and use of our services. We
promise that cookies will not be used for any purpose other than those described in this Privacy Policy. We
use cookies and similar technologies mainly to achieve the following functions or services: Ensure the safe
and efficient operation of our products and services: We may set authentication and security cookies or
anonymous identifiers to confirm whether you are safely logged into our services or whether there are any
acts of theft, fraud, or other illegal activities. These technologies also help us improve service
efficiency and enhance login and response speeds;
3.2 Most browsers provide users with the function to clear browser cache data. You can perform the
corresponding data clearing operations in the browser settings. If you clear the data, you may not be able
to use the services or corresponding functions provided by us that rely on cookies.
IV. Storage and Protection of Personal Information
4.1 Information Retention Period
4.1.1 During the period when you use our services, we will continuously retain your personal information.
4.1.2 When you voluntarily delete your personal information or cancel your account, we will retain your
existing personal information for the shortest period required by laws and regulations. When your personal
information exceeds the above retention period, we will process it in accordance with the requirements of laws
and regulations, including but not limited to deletion or anonymization.
(1) To cooperate with the people's procuratorates, public security organs, and national security organs in
investigating criminal acts that occur during the use of our services, when you voluntarily delete your
personal information or cancel your account, we will encrypt and isolate your personal information for
archiving within the criminal prosecution limitation period stipulated by the criminal law.
(2) If you seriously violate laws, regulations, user agreements, or other relevant provisions during the use
of the iNUB App services, your records of illegal or default activities and corresponding platform credit
records will be permanently retained.
4.2 Information Storage Location
4.2.1 The personal information we collect from you will be stored and used within the Chinese mainland.
4.3 Security Protection Measures
4.3.1 We will adopt strict security systems and industry-standard security technologies and procedures to
ensure that your personal information is not lost, leaked, damaged, or accessed or used without authorization.
4.3.2 We adopt the following security technical measures to protect your personal information:
(1) Your personal information is encrypted and stored in the server and stored using data isolation
technology.
(2) Use encrypted transmission protocols during data transmission.
(3) Strictly control data access permissions and establish a sound application and approval system for
sensitive data access permissions. We ensure that only authorized personnel can access personal information.
For employees who may have access to your information, we adopt different permission controls according to
their positions, sign confidentiality agreements with them, monitor their operations, and provide security and
privacy protection training courses.
(4) Establish a data security monitoring and auditing system to implement comprehensive data security
control.
(5) We have established a personal information protection responsibility department to conduct personal
information security assessments regarding the collection, use, and sharing of personal information.
4.4 Information Security Incident Handling
4.4.1 To address potential security risks such as the leakage, damage, or loss of personal information, we
have promulgated multiple internal systems to clarify the classification and grading standards for security
incidents and security vulnerabilities, as well as the internal handling procedures (including emergency
response procedures) and remedial measures for the above security incidents and vulnerabilities.
4.4.2 We have developed an emergency response plan for personal information security incidents and regularly
organize internal personnel to participate in emergency response training and drills. In the event of a
security incident, we will promptly inform you of the basic situation and risks of the incident, the measures
we have taken or will take, and suggestions on how you can reduce the risks yourself.
4.4.3 We will promptly notify you of the security incident situation by push notification, letter, or phone.
When it is difficult to notify you individually, we will issue a warning notice by publishing an announcement.
4.5 Discontinuation of Operations
4.5.1 If we discontinue our services, we will publish an announcement in the specific APP at least 30 days in
advance and promptly stop collecting personal information.
4.5.2 After the discontinuation of operations, we will process the collected personal information in
accordance with the requirements of laws and regulations after the shortest retention period required by laws
and regulations.
V. Use of Personal Information
5.1 To comply with relevant laws and regulations and provide you with services, we will use your personal
information in the following circumstances:
5.1.1 For the usage scenarios explicitly listed in the "Collection of Personal Information" clause of this
Privacy Policy.
5.1.2 We may design, develop, and promote new products and services based on your anonymized and
de-identified personal information statistical data.
5.1.3 We will conduct statistics on the usage of our services and may share these statistical information with
the public or third parties. However, these statistical information will not contain any of your identity
information.
5.2 When we use your information for purposes not listed in this policy, we will separately obtain your
consent in accordance with the provisions of laws and regulations.
VI. Sharing, Transfer, and Public Disclosure of Personal Information
6.1 Sharing refers to the process in which we provide personal information to other personal information
controllers, and both parties have independent control over the personal information. We promise to keep your
personal information confidential. Except as required by laws and regulations, we will not share your personal
information with third parties, except in the following circumstances:
6.1.1 Sharing with your explicit consent: After obtaining your explicit consent through a pop-up window or
other means in a specific scenario, we will share the information within the scope of your authorization with
the specified third party. We will evaluate the legality, legitimacy, and necessity of the third party's
collection of your information and require the third party to take necessary protective measures for your
personal information.
6.1.2 Sharing in statutory circumstances: We may share your personal information with third parties in
accordance with laws and regulations, judicial requirements, or administrative or judicial requests.
6.1.3 Information Sharing
(1) Alibaba Cloud Log Service
Purpose of use: Collect and统计 user operation logs for troubleshooting and positioning
Personal information involved: Device information (model, name), device identification information (IMEI,
IMSI), network information (WIFI information, network operator information, network type, network status), log
information
6.2 Transfer
We will not transfer your personal information to any company, organization, or individual except in the
following circumstances:
(1) After obtaining your explicit consent, we will transfer your personal information to other parties;
(2) In the event of a merger, acquisition, or bankruptcy liquidation, if personal information transfer is
involved, we will require the new company or organization that holds your personal information to continue to
be bound by this privacy policy. Otherwise, we will require the company or organization to obtain your
authorization and consent again;
(3) According to laws, regulations, or other mandatory requirements.
6.3 Public Disclosure
We promise not to publicly disclose your personal information. If public disclosure is indeed necessary, we
will obtain your explicit authorization and consent and inform you of the purpose and content of the
disclosure.
6.4 According to relevant laws, regulations, and national standards, in the following circumstances, we may
share, transfer, or publicly disclose personal information without your prior authorization and consent:
6.4.1 Directly related to national security or national defense security;
6.4.2 Directly related to public safety, public health, or major public interests;
6.4.3 Directly related to criminal investigation, prosecution, trial, and judgment execution;
6.4.4 Necessary to safeguard the life, property, or other major legitimate rights and interests of the
personal information subject or other individuals, but it is difficult to obtain the consent of the
individual;
6.4.5 The personal information collected is information that the personal information subject has publicly
disclosed to the public;
6.4.6 Collected from legally publicly disclosed information, such as legal news reports, government
information disclosure, and other channels.
VII. User Rights
7.1 You can view and access your personal information:
Account: You can access your personal information, including your mobile phone number, by
going to your personal homepage and clicking the edit button.
Privacy Policy: You can view and access this Privacy Policy by going to your personal center.
7.2 You have the right to change your personal information:
Settings: You can log out by going to your personal homepage.
Change Authorization Scope: You can view the status of the above permissions in the "Settings
- Application Permissions" of your device and decide to enable or disable these permissions at any time.
Please note that enabling any permission means that you authorize us to collect and use the relevant personal
information to provide you with the corresponding service. Once you disable any permission, it means that you
cancel the authorization. We will no longer collect and use the relevant personal information based on the
corresponding permission, and we will not be able to provide you with the service corresponding to that
permission. However, your decision to disable the permission will not affect the information collection and
use that has been carried out based on your previous authorization.
7.3 You have the right to cancel your account
You can contact our customer service at 400-100-2334. We will reply within 7 working days after receiving your
feedback.
VIII. Protection of Minors
8.1 Our iNUB App calibration test service is only available to adults who are at least 18 years old and have
obtained a driver's license. We will not knowingly collect personal information from minors (under 18 years
old).
8.2 If you are under 18 years old, please do not register an account or send your personal information such as
name, address, phone number, or email address to us. Minors should not provide us with personal information.
If we accidentally collect information from minors, we will delete it as soon as we become aware of it. If you
believe that we may improperly hold information about minors, please contact us.
IX. Changes
9.1 If the following changes occur to our services, we will promptly revise this Privacy Policy accordingly:
9.1.1 Changes to the business functions of the iNUB App.
9.1.2 Changes to the storage location of your personal information.
9.1.3 Changes to the usage rules of your personal information.
9.1.4 Changes to our contact information or complaint channels.
9.1.5 Other changes that may affect the security of your personal information or your privacy rights.
9.2 After the revision of the Privacy Policy, we will publish the latest version and notify you by pop-up
window or push notification so that you can promptly understand the latest version of the Privacy Policy.
9.3 Without your explicit consent, we will not reduce the rights you enjoy under this Privacy Policy.
X. How to Contact Us
If you have any questions, comments, or suggestions regarding this Privacy Policy, please contact us through
the following methods:
Company Name: Shanghai Yinji Technology Co., Ltd.
Contact Address: Building 34, Lane 1387, Zhangdong Road, Pudong New Area, Shanghai
You can call our customer service hotline at 400-100-2334 for any complaints, reports, comments, or
suggestions. We will process your comments or suggestions after verifying your identity. Generally, we will
reply immediately after receiving your reports or complaints. If we cannot reply immediately, we promise to
reply within 7 working days. If you are not satisfied, you can also file a complaint or report with regulatory
authorities such as the Cyberspace Administration, the Ministry of Industry and Information Technology, the
public security department, and the industry and commerce department.