Privacy protocol

We respects and protects user information and will treat it with a high degree of diligence and prudence. When you use the services provided by the GEEK platform, we will collect, process and disclose your information in accordance with this privacy policy. We hope to provide you with a clear introduction to our handling of your information through this privacy policy, so we recommend that you read this privacy policy completely to help you understand the way you maintain your right to privacy.

If you have any questions, comments or suggestions, please contact us through the various contact information provided by GEEK.

This policy will help you understand the following:

1, scope of application

2. Collection and use of user information

3. Sharing, transfer, and public disclosure of user information

4. User business data and public information

5, user information management

6, cookies and similar technologies

7. Update of privacy policy

8, how to contact us

I. scope of application

1.1. This privacy policy applies to all services of the GEEK platform. Services include mobile APP, page browsing, website login services, and technical services provided to you through the GEEK platform.

1.2. This privacy policy does not apply to services provided to you by other third parties. For example, when a service provider in the GEEK service market relies on the GEEK platform to provide services to you, the information you provide to the service provider does not apply to this privacy policy.

1.3. In particular, as a GEEK user, if you take advantage of GEEK's technical services to provide services to your users, because your business data belongs to you, you should agree with your users on a separate privacy policy. And bear all legal liability for data disclosure caused by your own reasons.

II. Collection and use of user information

2.1. To help you become our member.

2.1.1. When you create an account on the GEEK platform, you must provide us with the membership name, settings, confirm your login password, and provide your mobile phone number or email address (in the United States of America). The mobile phone number / email you submit is used for your registration, login, binding account, password recovery to accept the verification code, and as one of the contact information you specify with GEEK, to receive related business notifications (such as new products online, service changes, etc.).

2.1.2. After you have signed up for your GEEK account, you can continue to fill in your information in the "basic information" column of the account, including (1) your membership type (individual, business), and the name of your unit (if you have completed your real name authentication). The name of the unit will be based on your real name authentication information), business year, size of the enterprise, engaged in industry, main business, major products, website domain name, (2) contact information (country, region, street, contact phone number, E-mail, etc. If you do not provide this information, it will not affect your use of a specific technical service. Article (1) of this article provided by youClass information will help us understand your requirements for GEEK services, so that GEEK can be targeted to promote and introduce products to you; GEEK may use the above method to promote, publicize products, mail business notices (including bills) or communicate with you in the category (2) information provided by you.

2.1.3. After you sign up for the GEEK account, you need to submit contact information at the account's administrative console, including the email address, mobile phone number and contact position where you specify the contact. GEEK will promote and introduce the product to you through the above information. Send business notice (including bill) or communicate with you.

2.1.4. If you only need to use basic services such as browsing information, you do not need to register as our member and provide the above information.

2.2. To provide you with technical services

The information you have provided to us includes:

2.2.1. According to the law of the United States of America, when you use specific technical services, you should provide your true identity information through your account. If you provide real identity information through your GEEK account, GEEK provides you with a variety of ways to help you provide information, and you should choose the appropriate way according to your identity properties.

2.2.2. Before accepting the service, according to the law of the United States of America, GEEK will show you the information you need to submit through the GEEK platform page, subject to the display of the website page, and if you do not use certain services, you do not need to provide relevant information.

The information we collect as you use the service:

2.2.3. Device information: according to the specific permissions you grant in the installation and use of the software, we will receive and record the device-related information you use (such as device model, operating system version, device settings, Unique device identifiers and other hardware and software characteristic information), device location related information (such as IP address, GPS location and Wi-Fi access point, Bluetooth and base station sensor information that can provide relevant information). We may associate the first two types of information so that we can provide you with consistent services on different devices.

2.2.4. Log information: when you use the services provided by our website or client, we will automatically collect your detailed use of our services as relevant web logs. For example, your search query content, IP address, browser type, telecom operator, language used, access date and time and web page records you visit, etc.

2.2.5. Please note that individual device information, log information, etc., are information that does not identify a particular natural person. If we combine such non-personal information with other information to identify a particular natural person or use it with personal information, such non-personal information will be regarded as personal information during the combined use. Unless authorized by you or otherwise provided by laws and regulations, we will anonymize and deidentify this kind of personal information.

2.2.6. User Account Support Information:Based on the user consultation records, reporting records and troubleshooting procedures(such as communication, call records, online communication, questions, etc.)generated by you using the GEEK service, GEEK will analyze this information to respond to your help request in a more timely manner and to improve the service.

2.3. We use your submission and the user information we collect for the following purposes:

2.3.1. In order to provide you with services (such as cell phone number, enterprise information, contact information, real name authentication information, etc., which are used to accept the verification code, etc.) are the prerequisites for continuing to obtain the service);

2.3.2. In order to maintain, improve the service (such as your submitted business contact phone, email, etc., used to receive business notifications and business communication);

2.3.3. On the premise that laws and regulations allow, to promote and introduce products and services to you;

2.3.4. In order to improve the security of your use of us and our affiliated companies, partners to provide services, protect your or other users or the public from personal and property violations, and better prevent phishing sites, fraud, network vulnerabilities, computer viruses, Network attacks, network intrusion and other security risks, more accurately identify violations of laws and regulations or GEEK related protocols, rules, we may use your membership information, and integrate device information, related network logs and our affiliated companies, Information shared by partners to determine your account and transaction risks, authentication, security incident detection, andPrevent and take necessary record, audit, analysis and disposal measures according to law;

2.3.5. Other uses with your permission.

2.3.6. At the same time, according to different application products and services, GeekSmart will collect corresponding and necessary personal information in order to provide you with products and services.

Information Collected Based on Additional Features Offered

In order to provide you with more convenient and better products and/or services and strive to improve your experience, we will collect and use your personal information in the following additional services provided to you. If you do not provide this information, it will not affect your basic services using the GeekSmart application, but you cannot get the user experience that these additional services bring to you. These additional services include:

Additional services based on location information:
When you enable the positioning function of your mobile device through the system authorization and use the services provided based on the location, we will collect and use your location information so that you can use the GeekSmart application to configure the network with the smart device. And when you use our specific products or services (weather services/home management), based on your consent, we collect real-time precise or non-precise geolocation information about you, generated by creating scenarios when you use the geofencing feature When the location changes, we will apply for the permission to collect the background location, the purpose is to locate the user's location to complete the automatic ability of user pre-review. You can turn off location services in the system of your mobile device to stop our collection of your location information. To add a device function, you need to obtain the positioning permission (only Android system), enter the add device, and you need to perform a Bluetooth scan based on the function of searching for nearby devices. Bluetooth needs to apply for positioning, otherwise it will affect the user's device addition.
Through [Settings] - [GeekSmart] - Turn off/on the [Location Information] permission

Additional services for photo/video access and upload based on albums (photo library/video library):
You can use this function to upload your photos/pictures/videos after enabling the album permission to realize the function of reporting device usage problems and providing proof. When you report a problem with your device, we will use the photos/images you upload to locate your problem.
Through [Settings] - [GeekSmart] - Turn off/on the [Album] permission

Additional services based on storage permissions (Android):
We apply to you for this permission in order to ensure the stable operation of the client. After you enable us to read/write the storage of your device, we will read or write the necessary information for pictures, files, and crash log information from the storage space of your device to provide you with information release Or the ability to record crash log information locally.
Through [Settings] - [GeekSmart] - turn off/on the [Storage] permission

Additional features based on "floating window" (Android):
We apply for this permission from you. When you bind the camera in the application, it can be used to display the live view of the camera in the floating window.
Turn off/on the [floating window] permission through the permission management settings of your mobile phone system

Additional services related to Bluetooth technology:
You can enable Bluetooth functions after enabling Bluetooth permissions, including device control, device status acquisition, device discovery, and device network configuration. In these functions, we will communicate with terminal devices through Bluetooth. Please know that even if you have agreed to enable Bluetooth permissions, we will only use Bluetooth for communication in these scenarios: display device status on the home page and device panel; device control on the home page and device panel; For device discovery and device distribution
Through [Settings] - [GeekSmart] - Turn off/on the [Bluetooth] permission

Additional services based on HealthKit technology (iOS only):
After you enable HealthKit permission, you can use related functions, including statistics of weight, height data, statistics of running and swimming, among these functions, we will exchange data with the [Health] App that comes with the iOS system through HealthKit. Please know that even if you have agreed to enable HealthKit permission, we will only use it in these scenarios: body fat scales, wristbands, and watch devices write data to HealthKit; read data to HealthKit in the health center
Through [Settings] - [Privacy] - [Health] - [Current App] - Turn off/on the [HealthKit] permission

Additional functionality based on permissions bound to the notification listener service (Android only)
We apply for this permission from you, the purpose is that after the smart device is connected to the App, by monitoring the messages in the notification bar of the App, the App messages are sent to the mobile smart device synchronously to be displayed to you.
Through [Device Panel] - [Settings] - [Message Push] - Enable/Disable Permissions (default disabled)

You understand and agree that the above additional services need to be turned on in your device, and you can turn on or turn off these permissions at your own discretion.

Please note that when you open any permission, you authorize us to collect and use relevant personal information to provide you with corresponding services. Once you close any permission, it means that you cancel the authorization, and we will no longer continue to collect based on the corresponding permission. and the use of related personal information, it cannot provide you with the services corresponding to this permission. However, your decision to close the permission will not affect the previous collection and use of information based on your authorization.

III. Sharing, transfer and public disclosure of user information

3.1. Share

We do not share your user information with other organizations and individuals, except in the following cases:

3.1.1. Sharing with express consent: after obtaining your express consent, we will share your user information with other parties;

3.1.2. Sharing under legal circumstances: we may share your user information according to laws and regulations, litigation, arbitration, or according to the requirements of the administrative and judicial organs in accordance with the law;

3.1.3. In order to facilitate a transaction or assist in resolving disputes, in some cases, only by sharing your user information can you facilitate a transaction or resolve a dispute or dispute with others, for example, in a transaction created in the GEEK services market. If either party to the transaction has fulfilled or partially fulfilled its transaction obligations and made a request for information disclosure, GEEK shall have the right to decide to provide the user with the necessary information, such as the contact information of the other party to the transaction, in order to facilitate the completion of the transaction;

3.1.4. Share with authorized partners: we may entrust trusted partners to provide services, so we may share some of your user information with partners to provide better customer service and optimize the user experience. We will only share your user information for legitimate, necessary, specific, and clear purposes, and will only share the user information necessary to provide the service. Our partners do not have the right to use shared user information for any other purpose.

At present, our authorized partners include the following types: suppliers, service providers and other partners. We send information to suppliers, service providers and other partners who support our business, including the provision of basic technical services, consulting, analysis and other professional services.

For the companies, organizations and individuals with which we share user information, we will sign strict confidentiality agreements and information protection agreements with them, requiring them to follow our instructions. This privacy policy and any other relevant confidentiality and security measures deal with user information.

3.2. Transfer

We will not transfer your user information to any company, organization, or individual except in the following cases:

3.2.1. Transfer with express consent: after obtaining your express consent, we will transfer your user information to other parties;

3.2.2. In the event of a merger, acquisition or bankruptcy liquidation between GEEK and other legal entities, or in other cases involving merger, acquisition or liquidation, if the transfer of user information is involved, we will request a new company that holds your user information. The organization continues to be bound by this policy, otherwise we will require the company, organization and individual to seek your authorization and consent again.

3.3. Public disclosure

We will only publicly disclose your user information if:

3.3.1. With your express consent or on your own initiative, we may publicly disclose your user information;

3.3.2. Or in order to protect the personal and property safety of GEEK platform and its affiliated company users or the public, we may disclose information about your users in accordance with applicable laws or GEEK platform agreements. For example, if you sell counterfeit or pirated goods as a service market service provider, we may publicly disclose your store subject information and penalties.

3.4. Exceptions to prior authorized consent when sharing, transferring, or publicly disclosing user information

In the following cases, sharing, transferring, and publicly disclosing your user information do not require the prior consent of your authorization:

3.4.1. Relating to national security and national defense security;

3.4.2. Relating to public safety, public health and major public interests;

3.4.3. Relating to the investigation, prosecution, trial and enforcement of sentences, etc.;

3.4.4. In order to safeguard your or other personal life, property and other major legitimate rights and interests, but it is difficult to obtain my consent;

3.4.5. Personal information that you disclose to the public on your own;

3.4.6. Collecting personal information from legally publicly disclosed information, such as legitimate news reports, government information disclosure and other channels.

IV. User business data and public information

Unlike your user information, GEEK will process user business data and public information as follows:

4.1. User business data

4.1.1. The data you provide through GEEK, processing, storing, uploading, downloading, distributing, and otherwise processing are all your user business data, and you fully own your user business data. GEEK as a cloud service provider, We will only strictly follow your instructions to process your business data and do not make any unauthorized use or disclosure of your business data except as required by agreement with you or by clear laws and regulations.

4.1.2. You are responsible for the source and content of your user's business data, and GEEK prompts you to carefully judge the legitimacy of the source and content of the data. All results and responsibilities arising from violations of laws and regulations, departmental regulations or national policies due to the content of your user's business data are borne by you.

4.1.3. In accordance with your agreement with GEEK, GEEK stores user business data in the data center of your choice. GEEK adheres to its security commitments to users and protects the data stored by users in the GEEK data center in accordance with applicable laws.

4.2. Public information

4.2.1. Public Information means any information that you share publicly, which anyone can view or access during the use and non-use of GEEK platform services.

4.2.2. In order to use the GEEK platform service, there may be information that you must share publicly. For example, in order to build a good faith trading environment, your credit evaluation information (star rating, customer evaluation) needs to be shared publicly. If you are a service provider (seller), you should publicly share the relevant information of the enterprise or natural person operator according to the applicable laws and regulations and GEEK service market rules.

4.2.3. When you trade in a service market using the GEEK platform, it is inevitable that you will disclose your personal information, such as contact information or postal address, to the counterparty or potential counterparty. Please protect your personal information and provide it to others only if necessary. You can also establish contact and share with each other through our services. When you create communication, transaction or sharing through our service, you can choose the object of communication, transaction or sharing as a third party who can see your contact information, exchange information or share content and other related information. If you find your own person,Information leakage, especially if your account or password is leaked, please contact GEEK customer service immediately so that GEEK can take appropriate measures.

V. Management of user information

5.1. You can log on to the GEEK platform or client to query, manage (change, delete) the basic business information (basic information) and contact information submitted when using the GEEK service.

5.2. You can ask us to delete user information in the following situations:

5.2.1. If our handling of user information violates laws and regulations;

5.2.2. If we collect and use your user information without your express consent;

5.2.3. If our handling of personal information seriously violates our agreement with you.

To ensure security, you may need to provide a written request or otherwise prove your identity. We may ask you to authenticate yourself before processing your request.

6. The use of cookies and similar technologies.

6.1. To ensure that the site works properly and gives you an easier access experience and recommends content that you may be interested in, we store a small data file called Cookie on your computer or mobile device. Cookie usually contains identifiers. Site name and some numbers and characters. GEEK can only read the cookies. provided by GEEK

6.2. With the help of Cookie, you can store data such as your preferences or items on the purchase list. The next time you visit again, we will display the information you need, or GEEK will identify your source site through the cookies file so that GEEK can track the advertising effects of GEEK.

6.3. You can manage Cookie, according to your preferences. You can also clear all Cookie. saved on your computer. Most web browsers have the ability to block Cookie. But if you do, you need to change user settings every time you visit our site. To learn more about how to change browser settings, visit the settings page for the browser you use.

6.4. In addition to Cookie, we will also use site beacons and pixel tags and other similar technologies. For example, the e-mail we sent you may contain an address link to the content of our website, and if you click on that link, we will track the click. Help us understand your product or service preferences so that we can proactively improve our customer service experience. A website beacon is usually a transparent image embedded in a website or e-mail. With pixel tags in e-mail, we can tell if the e-mail is open. If you don't want your activities in this way,Tracked, we can unsubscribe from our mailing list at any time.

VII. Security of user information

7.1. GEEK attaches great importance to your information security. We strive to take a variety of reasonable physical, electronic and management security measures to protect your user information. Prevent unauthorized access, public disclosure, use, modification, damage or loss of user information. We will use encryption technology to improve the security of user information; we will use trusted protection mechanism to prevent malicious attacks on user information; we will deploy access control mechanism to try our best to ensure that only authorized personnel can access user information; And we will hold training courses on security and privacy to enhance the importance of employees in protecting user information.Of the

7.2. We will take reasonable and feasible measures to avoid collecting irrelevant user information. We will only retain your user information for such period as may be necessary to achieve the purposes set forth in this Policy, unless an extension of the retention period is required or is permitted by law. After the above user information storage period is exceeded, we will delete or anonymize your personal information.

7.3. Please use a complex password to help us ensure the security of your account. We will try our best to ensure the security of any information you send us. If our physical, technical or management protection facilities are damaged, resulting in unauthorized access, public disclosure, tampering or destruction of information, resulting in damage to your legitimate rights and interests, we will bear the corresponding legal liability.

7.4. In the event of unfortunate user information security incidents (disclosure, loss, etc.), we will inform you in a timely manner of the basic information and possible impact of the security incident, as required by laws and regulations, and the measures we have taken or will take to deal with it. You can independently prevent and reduce the risk of suggestions, your remedial measures, and so on. We will inform you in time of the event related information by mail, letter, telephone, push notice and so on. When it is difficult to inform the user information subject one by one, we will issue the announcement in a reasonable and effective manner.

7.5. At the same time, we will also report user information security incidents in accordance with regulatory requirements.

7.6. We will store your user information in the United States of America, and we will obtain your prior consent if personal information is transmitted to a third party outside the country as a result of business requirements in accordance with the applicable law. And to inform you of the purpose of the user information exit, recipient, security measures, security risks and so on. However, we have the right to synchronize your user information between GEEK associated sites.

7.7. If GEEK products and services stop operating, we will take reasonable measures to protect your user information security, including timely stop the activities to continue to collect user information; The notice of suspension will be delivered or announced one by one to the user; and the personal information held will be deleted or anonymously processed.

7.8. If we use user information beyond the stated purpose of collecting user information or beyond the scope of direct or reasonable association, we will inform you again with your express consent.

VIII. Update of privacy policy

8.1. Our privacy policy may be revised.

8.2. We will not limit your rights under this Privacy Policy without your express consent. We will post any changes to the privacy policy on a special page.

8.3. For major revisions, we will also provide more significant notifications (including, for certain services, we will inform you of specific changes to our privacy policy by way of website publicity).

8.4. Significant changes referred to in this policy include, but are not limited to:

8.4.1. Great changes have taken place in our service model. Such as the purpose of processing user information, the type of user information processed, the use of user information, and so on;

8.4.2. We have undergone major changes in control, organizational structure and so on. Such as business adjustment, bankruptcy mergers and acquisitions caused by the owner change, and so on;

8.4.3. The main object of user information sharing, transfer or public disclosure has changed;

8.4.4. Significant changes have taken place in your right to participate in the processing of user information and the way you exercise it;

8.4.5. We are responsible for dealing with the responsible department of user information security, when the contact mode and complaint channels change;

8.4.6. The user information security impact assessment report indicates that there is a high risk.

8.5. We recommend that you consult this page regularly for up-to-date information on our privacy practices. Your continued use of products and websites, mobile phones and / or services on any other device will be considered to be subject to updated privacy policies.

Nine, how to contact us?

You have any questions and comments on the contents of this statement and policy, or you have any questions and comments on GEEK's practice and operation of this privacy policy. You can contact us through GEEK questions or customer service telephone calls.