FANG SHUSHENG. (hereinafter referred to as "we" or "Nilight") is well aware of the importance of personal information to you and will make every effort to protect your personal information from risks. We are committed to maintaining your trust in us and adhere to the following principles to protect your personal information: the principle of consistency of rights and responsibilities, the principle of clear purpose, the principle of voluntary consent, the principle of minimum use, the principle of ensuring security, the principle of subject participation, the principle of openness and transparency, etc. At the same time, we promise that we will adopt mature security solutions in the industry and take corresponding security protection measures to protect your personal information. Therefore, we have formulated this "Privacy Policy" (hereinafter referred to as "this policy / this privacy policy") and remind you:
This policy applies to products and related services.
It is particularly important to note that this policy does not apply to services provided to you by other third parties, nor does it apply to products or services that have independently set up privacy policies.
Please read and thoroughly understand this policy before registering or using our services, especially the terms marked in bold / bold underline. You should focus on reading them, and after confirming that you fully understand and agree, use the relevant products or services. To ensure the safe operation of the software and services, we will collect relevant device information and permissions when responding to functional triggers. If you have any questions, opinions, or suggestions about the content of this policy, you can contact us through the contact information we provide.
The developer of the "Nilight" application you use is FANG SHUSHENG, and the contact information protection is: shushengfang1988@gmail.com
Last updated: 2024.08.06.
Effective date: 2024.08.06.
If you have any questions or suggestions about this policy or related matters, you can contact us through the following complaint channels:
Report email: shushengfang1988@gmail.com
This privacy policy will help you understand the following content:
The following are our special reminders, please pay special attention:
1. For personal sensitive information, we use "bold italic" style to remind you to pay special attention when reading. Before you provide us with any of your personal sensitive information, you have carefully considered and confirm here that such provision is appropriate, and you agree here that your personal sensitive information can be processed for the purposes and methods described in this policy.
The implementation of personal information rights includes but is not limited to ways such as inquiry, copying, correction, supplementation, deletion, deregistration, withdrawal of authorization, requesting us to explain and clarify this policy, and timely response, to ensure that you can realize the control over your personal information.
We will strictly process your personal information in accordance with this policy and your consent. If you do not agree with this policy, you should stop using the product/service.
Please understand that after the App is updated, if you are a minor under the age of 18, please do not register the App.
This privacy policy will help you understand the following content:
0, Introduction
1, How we collect and use your personal information
2, How we use Cookies, similar technologies, and SDK technology
3, How we share, transfer, and publicly disclose your personal information
4, How we protect your personal information
5, How you can manage your personal information / your rights
6, How we handle the personal information of minors
7, The location and duration of storing information, and how your personal information is transferred globally
8, How this privacy policy is updated
9, How to contact us / user complaint channels and feedback mechanisms
10, Advertising / the messages we send to you
11, Scope of application
We keep the user information we collect strictly confidential and establish a sound system for the protection of user information, in order to provide reliable and worry-free services for every user:
1, Clear and explicit
We will try to use clear and easy-to-understand text to explain the privacy policy for you, so that you can more clearly understand how we protect and handle the information we collect from you.
2, Protect rights and interests
We will take full and reasonable measures to protect your privacy rights and interests.
3, Respect users
We respect the free exercise of users' rights to choose, know, and other rights, allowing you to manage your personal information.
4, Necessary security
We will only collect necessary information and use this information to provide you with safe and reliable services.
5, Timely and considerate
We will always listen to your inquiries and answer your questions as soon as possible.
To better illustrate, the following concepts in this policy refer to:
Personal commonly used device information: Refers to information describing the basic situation of personal commonly used devices, including hardware serial numbers, device MAC addresses, software lists, unique device identifiers (such as IMEI/android ID/ICCID/MEID/IDFA/OPENUDID/GUID, SIM card IMSI information, etc.), IP, etc.
The services we provide may require you to enable your local storage, Bluetooth, music permissions, camera (camera), album (picture library), microphone (voice) in your device to achieve the collection and use of information involved in these permissions. You can read the device permission list to understand the situation of applying for and using system permissions. The corresponding device permissions are not enabled by default, and when it involves important or sensitive device permissions, we will pop up again to obtain your consent when you use the corresponding business functions; You can check the status of the above permissions one by one in the device settings function, and you can decide to open or close these permissions at any time. **Please note that when you open any permission, it means that you authorize us to collect and use the relevant personal information to provide you with the corresponding service, and once you close any permission, it means that you have canceled the authorization, and we will no longer continue to collect and use the relevant personal information based on the corresponding permission, and we will not be able to provide you with the service corresponding to that permission. However, your decision to close the permission will not affect the information collection and use carried out based on your authorization before.
1. How We Use the Collected Information
We will use your information in accordance with the purposes stated above. When we want to use the information for purposes not stated in this policy, we will obtain your consent in advance. When we want to use the information collected for specific purposes for other purposes, we will obtain your consent in advance.
You fully understand and agree that we may collect and use your personal information without your authorization in the following situations, and we may not agree to your requests for correction/modification, deletion, cancellation, withdrawal of consent, or request for information:
Related to fulfilling our obligations under laws and regulations;
Related to national security or national defense security;
Related to public safety, public health, or significant public interest;
Related to criminal investigation, prosecution, trial, and execution of judgments;
To protect the life, property, and other significant legal rights and interests of the personal information subject or others, but it is difficult to obtain your consent;
The collected personal information is publicly disclosed by you;
Collecting personal information from legally disclosed information, such as legal news reports, government information disclosure, and other channels;
Necessary for signing a contract according to your request;
Necessary for maintaining the safe and stable operation of the products or services provided, such as discovering and handling faults in products or services;
Necessary for legal news reporting;
Necessary for academic research institutions to conduct statistics or academic research for public interest, and when providing academic research or descriptions, the personal information contained in the results is de-identified;
Other situations stipulated by laws and regulations.
Please be aware that according to applicable laws, if we take technical measures and other necessary measures to process personal information, making it impossible for the data recipient to re-identify and restore the personal information, or if we may conduct de-identified research, statistical analysis, and forecasting of the collected information for the purpose of improving content and layout, providing product or service support for business decisions, and improving our products and services, then the use of such processed data does not require further notice to you and obtaining your consent.
If we cease to operate a product or service, we will promptly stop the collection of your personal information activities, notify you of the cessation of operations through individual delivery or announcements, and delete or anonymize the personal information we hold.
2. How We Use Cookies, Similar Technologies, and SDK Technology
Cookies
To ensure the normal operation of the website, to provide you with a more convenient access experience, and to recommend content that may interest you, we may store small data files called Cookies on your computer or mobile device. Cookies usually contain identifiers, site names, and some numbers and characters. With the help of Cookies, websites can store your preferences and other data. You can perform corresponding data clearance operations in the browser. If you clear the data, you may not be able to use the services or corresponding functions provided by us that rely on Cookies.
SDK Technology
We have not yet integrated third-party SDKs.
3. How We Share, Transfer, and Publicly Disclose Your Personal Information
Sharing
We will not share your personal information with any company, organization, or individual other than service providers, except in the following cases:
1. Sharing with explicit consent: After obtaining your explicit consent, we will share your personal information with others;
2. Sharing under legal circumstances: We may share your personal information according to legal regulations, the need for litigation dispute resolution, or at the request of administrative or judicial authorities according to the law.
Transfer
We will not transfer your personal information to any company, organization, or individual, except in the following cases:
Transfer with explicit consent: After obtaining your explicit consent, we will transfer your personal information to others;
In the event of mergers, acquisitions, or bankruptcy liquidation, or other similar situations involving the transfer of personal information, we will require the new company or organization holding your personal information to continue to be bound by this policy, otherwise, we will request that the company, organization, and individual to re-seek your authorization and consent.
Public Disclosure
We will only publicly disclose your personal information in the following situations:
With your explicit consent or based on your active choice, we may publicly disclose your personal information;
If we determine that you have violated laws and regulations or seriously violated relevant agreement rules, or to protect the personal and property safety of our users or the public from harm, we may disclose your personal information, including relevant violations and measures taken against you, with your consent according to laws and regulations or relevant agreement rules.
Exception to Prior Consent for Sharing, Transfer, and Public Disclosure of Personal Information
In the following situations, sharing, transferring, and publicly disclosing your personal information does not require prior consent:
Related to fulfilling our obligations under laws and regulations;
Directly related to national security or national defense security;
Directly related to public safety, public health, or significant public interest;
Directly related to criminal investigation, prosecution, trial, and execution of judgments;
To protect your or another person's life, property, or other significant legal rights and interests, but it is difficult to obtain consent;
Personal information you have publicly disclosed to society;
Collecting personal information from legally disclosed information, such as legal news reports, government information disclosure, and other channels.
According to the law, sharing and transferring de-identified personal information, and ensuring that the data recipient cannot restore and re-identify the personal information subject, does not constitute an external sharing, transfer, and public disclosure of personal information. The preservation and processing of such data will not require separate notice to you and obtaining your consent.
4. How We Protect Your Personal Information
To protect the security of your information, we will strictly follow the technical measures and operational procedures required by laws and regulations and other normative documents to protect the secrecy of your information, and at the same time:
We have taken security protection measures that are in line with industry common solutions and reasonably feasible to protect the security of the personal information you provide, to prevent personal information from being accessed without authorization, publicly disclosed, used, modified, damaged, or lost. We will use encryption technology to enhance the security of personal information; we will use trusted protection mechanisms to prevent personal information from malicious attacks; we have established strict internal control systems, established sound and comprehensive management processes, we will deploy access control mechanisms, and strive to ensure that only authorized personnel can access personal information; and we will hold security and privacy protection training courses to strengthen employees' understanding of the importance of protecting personal information.
We have an industry-leading data security management system centered around the data life cycle, which enhances the security of the entire system from multiple dimensions such as organizational construction, system design, personnel management, and product technology.
We will take reasonable and feasible measures to avoid collecting irrelevant personal information as much as possible. We will only retain your personal information for the period required to achieve the purposes stated in this policy, unless it is necessary to extend the retention period or allowed by law.
The Internet is not an absolutely safe environment, and we strongly recommend that you do not use non-recommended communication methods to send personal information. You can establish contact and share with each other through our services. When you create communication, transactions, or sharing through our services, you can choose the objects of communication, transactions, or sharing, as a third party who can see your transaction content, contact information, communication information, or shared content, and other related information.
If you find that your personal information, especially your account or password, has been leaked, please contact customer service immediately so that we can take corresponding measures according to your application.
Please note that the information you voluntarily share or even publicly share when using our services may involve your or others' personal information or even sensitive personal information, such as when you choose to upload pictures containing personal information in public places such as dynamic publishing or group chats, and circles. Please think more carefully about whether to share or publicly share related information when using our services.
We will update and disclose the content of security risk and personal information security impact assessment reports as required by laws and regulations.
The Internet environment is not one hundred percent safe, and we will try our best to ensure or guarantee the security of any information you send to us. If our physical, technical, or management protection facilities are compromised, resulting in unauthorized access, public disclosure, tampering, or destruction of information, causing damage to your legitimate rights and interests, we will bear the corresponding legal responsibilities.
In the event of a personal information security incident, we will promptly inform you of the basic situation and possible impact of the security incident, the measures we have taken or will take, your suggestions for self-protection and risk reduction, and your remedies, in accordance with the requirements of laws and regulations. We will promptly inform you of the relevant situation of the incident in the form of push notifications and take reasonable and effective ways to send announcements.
At the same time, we will also take the initiative to report the handling of personal information security incidents to the regulatory authorities as required.
5. How You Can Manage Your Personal Information / Your Rights
Personal Information Inquiry
You have the right to access your personal information, except for the exceptions stipulated by laws and regulations. You can access your personal information in the following ways:
Account Information - If you wish to access or edit your personal information in your account, set the device access password, you can log in to the account by clicking "Edit Personal Information" to perform such operations.
Personal Information Deletion
You can delete some of your personal information through the methods stated in this "Personal Information Inquiry."
In the following situations, you can request us to delete your personal information:
If our handling of personal information violates laws and regulations;
If we collect and use your personal information without obtaining your explicit consent;
If our handling of personal information seriously violates the agreement with you;
If you no longer use our products or services, or if you have actively canceled your account;
If we no longer provide products or services to you permanently.
If we decide to respond to your deletion request, we will also notify the entities that have obtained your personal information from us as much as possible, and ask them to delete it in a timely manner, unless laws and regulations provide otherwise, or these entities have obtained your independent authorization.
When you or we assist you in deleting information from our services, according to the provisions of relevant laws and regulations, we may not immediately delete the corresponding information from the backup system, but we will delete or anonymize this information when the backup is updated.
Withdrawal of Consent
Each business function requires some basic personal information to be completed. In addition to this, for the collection and use of additional personal information, you can give or withdraw your consent on your own or contact customer service.
When you withdraw consent, we will no longer process the corresponding personal information. However, your decision to withdraw consent will not affect the personal information processing carried out based on your authorization before.
Restricting Automated Decision-Making by Information Systems
In some business functions, we may make decisions based solely on non-human automated decision-making mechanisms such as information systems and algorithms. If these decisions significantly affect your legitimate rights and interests, you have the right to request an explanation from us, and we will provide an appeal method without infringing on commercial secrets or the rights and interests of other users or the public interest.
Responding to Your Requests
To ensure security, you may need to provide a written request or prove your identity in other ways. We may first require you to verify your identity before processing your request.
We will respond within 15 days. If you are not satisfied with our response, you can also initiate a complaint through customer service.
For your reasonable requests, we will not charge a fee in principle, but for multiple repeated or unreasonable requests, we will charge a certain cost fee according to the situation. For requests that are frivolous, require a lot of technical means (for example, need to develop a new system or fundamentally change current practices), pose a risk to the legitimate rights and interests of others, or are very impractical, we may refuse.
Relevant Restrictions
In the following situations, according to the requirements of laws and regulations, we will not be able to respond to your request:
Related to fulfilling our obligations under laws and regulations;
Directly related to national security or national defense security;
Directly related to public safety, public health, or significant public interest;
Directly related to criminal investigation, prosecution, trial, and execution of judgments;
There is sufficient evidence that you have subjective malice or abuse of rights;
To protect your or another person's life, property, or other significant legal rights and interests, but it is difficult to obtain consent;
Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations;
Involving trade secrets.
6. How We Handle the Personal Information of Minors
This software prohibits minors from registering and using it. If we find that we have collected the personal information of minors, we will try to delete the relevant data as soon as possible.
7. How This Privacy Policy is Updated
Our privacy policy may change. If there are changes in business functions, usage purposes, contact methods of the person responsible for personal information protection, etc., we will revise the privacy policy accordingly.
Without your explicit consent, we will not limit the rights you should have under this privacy policy. For significant changes, we will provide a noticeable notice (including we will notify through public announcements, and even provide pop-up reminders to you). You can also regularly check this privacy policy to obtain the latest terms.
The significant changes referred to in this policy include but are not limited to:
There are major changes in our service model. Such as the purpose of processing personal information, the types of personal information processed, the way personal information is used, etc.;
There are major changes in our control. Such as changes in ownership caused by mergers and reorganizations, etc.;
There are major changes in the main objects of personal information sharing, transfer, or public disclosure;
There are major changes in your rights and the ways to exercise them in the processing of personal information;
Changes in the department responsible for personal information processing, contact methods, and complaint channels;
The personal information security impact assessment report indicates high risk.
If you choose to continue using our services after receiving the notice, it means you agree to be bound by the revised policy. If you refuse the updated policy, you can only enter as a guest for browsing.
We will also archive the old version of this policy for your review, and you can apply to us for review through the aforementioned contact methods.
8. How to Contact Us/User Complaint Channels and Feedback Mechanisms
If you have any questions or suggestions about this policy or related matters, we have established a dedicated department for personal information protection, and you can contact us through the following complaint channels:
Report email: shushengfang1988@gmail.com
We will properly handle and promptly feedback your complaints and respond within fifteen days after verifying your user identity.
If you are not satisfied with our response, especially if you believe that our personal information processing behavior has damaged your legitimate rights and interests, you can also seek a solution by filing a lawsuit in the court with jurisdiction over the defendant's residence.
9. Advertising / The Messages We Send to You
We may use your relevant information to send you commercial advertisements on related websites, applications, and other channels.
If you do not want to receive the commercial advertisements we send to you, you can cancel at any time through the corresponding product opt-out feature.
10. Scope of Application
All services provided by Nilight use this privacy policy. However, please note that this privacy policy does not apply to services provided by other companies or individuals, and those services are subject to the privacy policies of other companies or individuals.
Appendix I Permission Application and Application Scenarios
Permission Name | Permission Function Description | Permission Usage Scenario or Purpose |
Location Permission | Access to the geographical location information of the device through the Global Positioning System (GPS) or network location information (such as base stations and WLAN) | Used to discover and connect to nearby lights and devices, and to control the mode, brightness, and other functions of the lights |
Storage/Album Permission | Read/write content in the device's external storage/memory/album | Read the photos/videos you select to achieve the effect of controlling the lights; save crash logs and other information |
Recording/Microphone Permission | Use the microphone to record audio | Used to achieve the function of lights syncing with the received sound |
Bluetooth Permission | Discover nearby Bluetooth devices | Used to discover and connect to nearby lights and devices, and to control the mode, brightness, and other functions of the lights |
Notification Permission | System notifications | APP-related message push |