Privacy Policy This policy applies only to the product "FleetEye Monitoring Platform" and its related services of Wuxi Ninecosmos Science and Technology Co., Ltd. (hereinafter referred to as "we"). The security of your personal information is vital to us. We have always made every effort to protect the security of your personal information and have been committed to maintaining your trust in us. We will collect and use your personal information in accordance with relevant laws, regulations, and technical standards to help us provide you with better products and services. At the same time, we promise to keep your personal information and other data strictly confidential, ensuring the safety of your personal information. Please read this privacy policy (hereinafter referred to as "this policy") carefully before using our products and services. By starting to use the "FleetEye Monitoring Platform" product and related services, you agree to this policy. This privacy policy applies to our operation of this software and related services within the People's Republic of China. This privacy policy outlines the benchmarks for us to process, collect, use, and disclose any of your personal information when you access or use this software. This privacy policy applies to the functions and services of this software itself, and does not apply to other products or services provided through this software. You should fully understand the user agreements and privacy protection policies of third-party services before choosing to use them. Please properly protect your personal information and only provide it to third parties when necessary. In order to provide services to you, this software requires you to provide certain personal information. If you choose not to provide the data required by this software or a certain function, you will not be able to use this software or that function. Similarly, if we need to collect personal information in accordance with the law, but you do not provide the data, therefore, we may have to suspend or cancel your right to use the software. In such cases, we will notify you. If you choose not to share personal data without being required to do so, you will not be able to use the functions that require such data. The camera and storage permissions are not be enabled by default. They will only be used to achieve specific functions or services with your explicit authorization. You can also change the scope of consent or withdraw your authorization in the device operating system. After withdrawing the authorization, we will no longer collect information related to these permissions. It should be specifically noted that even if we obtain these sensitive permissions with your authorization, we will not collect your information when it is not required for the relevant functions or services. This policy will help you understand the following content. Please read it carefully. Important provisions regarding your personal information rights are highlighted in bold for your special attention. 1. Personal Information Collected within This Software When you use this software and related services, after obtaining your authorized consent, we will collect and process your personal information during your use of this software. 1.1 Personal Information Personal information refers to various information recorded in electronic or other ways that can identify the identity of a specific individual or reflect the activities of a specific individual., either alone or in combination with other information, In this privacy policy, it includes personal identitification information (name), contact phone number, network identity recognition information (including account name, email address), personal common device information, location information, etc. 1.2 Personal Information Provided During Your Use of This Software When you use our products or services, you may need to provide us with your personal information. When you register for an account, we may require you to provide your mobile phone number and set up an account, password, nickname, avatar, etc. When you use relevant functions or participate in related activities, we may need you to provide your mobile phone number, contact address, nickname, account, etc. You can also log in and use this software with a third-party account. You will authorize us to obtain the public information (avatar, nickname, and other information you authorize) registered on the third-party platform for binding with the account of this software, so that you can directly log in and use this software and related services. 1.3 Information Collected During Your Use of This Software When you use this software, in order to ensure the safe operation of this software and related services, we will automatically collect your hardware model, operating system version, unique device identifier, network device hardware address, and software version number. For the prevention of malicious programs and necessary for security operations, we will collect installed application information or running process information, overall application operation, usage, and frequency of applications, application crash situations, overall installation and usage situations, performance data, and application sources. 1.4 Cookies When you use this software and related services, in order to provide you with a more convenient access experience, we may use Cookies and other similar technologies (such as web beacons, Flash cookies, etc.) (referred to as "Cookies") to send one or more Cookies or anonymous identifiers to your device to collect and store information about you access and use this software. This is done to understand your usage habits, save you from repeating information input, or help assess the security of your account. At the same time, we may use the information collected by Cookies to understand your preferences, conduct consultations or data analysis, improve product services and user experience, identify and prevent security risks in a timely manner, and provide better services for users and partners. We will not use Cookies for purposes other than those described in this privacy policy. Most web browsers automatically accept Cookies. You can refuse or manage Cookies by changing the settings of web browser add-ons. However, please note that if you disable Cookies, you may not be able to enjoy the best service experience, and certain services may not function properly. Even without your consent, we may store absolutely necessary Cookies required for the operation of this software, including the Cookies that allow you to log in to the secure area of this software. The Cookies we store will expire when you terminate the website session or after 15 days. The act of storing absolutely necessary Cookies is an essential condition for us to provide core service content. If you do not agree to the relevant authorization, you will not be able to use any services of this software. 1.5 Application Analysis Data The application will collect device-related information for statistical usage purposes. When the application is running, it will use a third-party statistical SDK (Umeng SDK) to obtain information. This process may collect Android_ID, device MAC address, software installation list, etc., which are only used for analyzing the usage of the App and will not collect user content data. 2. How We Use Your Personal Information 2.1 We will use the collected personal information in accordance with the provisions of this privacy policy and for the purposes of achieving the functionalities of this software and its related services. 2.2 We will take reasonable and feasible measures to avoid collecting personal information that is irrelevant to the usage purpose as much as possible. If we use your personal information beyond the scope that is directly or reasonably related to the claimed usage purpose, we will inform you in advance and obtain your explicit consent before using your personal information. 3. How We Share, Transfer, and Publicly Disclose Your Personal Information 3.1 Why Your Personal Information May Be Shared Please understand that our products and services are not only provided by us. In some cases, in order to provide you with a better product experience, ensure operational efficiency and quality, and maintain operational security, with your consent, we may cooperate with our affiliates and third parties. Therefore, we may share your personal information during the process of jointly providing services with our affiliates and third parties. 3.2 Sharing Principles When sharing your personal information, we will adhere to the following principles: Authorization and Consent Principle: Without your consent, we will not share your personal information, unless the shared personal information has been anonymized and the third party cannot re-identify the individual subject of the information. If third parties use the information for purposes beyond the original authorized consent, they need to obtain your consent again. Legitimate, and Minimum Necessity Principle: The shared data must have lawful and legitimate purposes, and the shared data must be limited to what is necessary to achieve the purposes. Security and Prudence Principle: We will prudently assess the purposes for which third parties use the shared information, comprehensively evaluate their security protection capabilities, and require them to abide by the cooperation legal agreement. We will conduct strict security monitoring on the software development kits and application programming interfaces (APIs) through which partners obtain information to protect data security. 3.3 We May Share Personal Information with Affiliates and Third-Party Partners in the Following Circumstances To help you use product-related functions or services; To achieve advertising push and effect verification; For service operation quality, efficiency, and security of our related products; To protect your legitimate rights or safeguard the public interest; To comply with the relevant provisions of laws and regulations; To help you participate in promotional activities; When you authorize us to provide information to third parties to reach a legal agreement with them; Other purposes specified in the privacy policy. 3.4 Transfer of Personal Information in the Event of Mergers, Acquisitions, or Asset Transfers We will not transfer your personal information to any other third party unless we obtain your explicit consent. When transactions such as mergers, acquisitions, or asset transfers occur, resulting in the sharing of your personal information with third parties, we will, in accordance with the relevant provisions of laws and regulations, continue to properly protect or require the new data recipient to continue to protect your personal information. 3.5 Rules for Publicly Disclose Personal Information 3.5.1 We will not publicly disclose your information without your consent. However, in accordance with laws, regulations, mandatory administrative law enforcement, or judicial requirements, when it is necessary to provide your personal information, we may disclose your personal information to administrative law enforcement or judicial agencies in accordance with the required type of personal information and disclosure method. When we receive a disclosure request, under the premise of complying with laws and regulations, we require them to produce corresponding legal certification documents. We only provide the data that law enforcement departments have the legal right to obtain for specific investigation purposes. Under the premise permitted by laws and regulations, the disclosed documents are protected by encryption measures. 3.5.2 Please understand that in the following circumstances, in accordance with laws, regulations, and national standards, we do not need to obtain your authorized consent to share, transfer, or publicly disclose your personal information: (1) Directly related to national security and national defense security; (2) Directly related to public safety, public health, and major public interests; (3) Directly related to criminal investigation, prosecution, trial, and judgment execution, etc.; (4) To safeguard the major legitimate rights and interests of you or other individuals, but where consent is difficult to obtain; (5) Personal information you have voluntarily disclosed to the public; (6) Personal information collected from legally publicly disclosed sources, such as legal news reports, government information disclosure, and other channels; (7) Other circumstances stipulated by laws and regulations. 3.5.3 We especially remind you that if the information cannot identify your personal identity alone or in combination with other information, it does not belong to your personal information in the legal sense. When your information can identify your personal identity alone or in combination with other information, or when we combine data that cannot be associated with any specific personal information with other your personal information, during the period of combined use, such information will be processed and protected as your personal information in accordance with this privacy policy. According to the law, sharing and transferring de-identified personal information, and ensuring that the data recipient cannot restore or re-identify the personal information subject, does not belong to the external sharing, transfer, and public disclosure of personal information. The processing of such data will not require further notification to you and your consent. 4. How We Store Your Personal Information 4.1 Storage Location In accordance with the provisions of laws and regulations, we store the personal information collected within the People's Republic of China. Currently, we will not transfer the above mentioned information overseas. If we do transfer it overseas, we will comply with relevant national regulations or seek your consent. 4.2 Storage Period During your use of this software, we will continuously store your personal information. The storage period will be based on the principle of not exceeding the period necessary to provide you with this software and its services. After you terminate the use of this software, except as otherwise provided by laws and regulations for the retention period of specific information, we will delete your information or anonymize it. If we stop operating this software, we will delete or anonymize your personal information we hold within a reasonable period in accordance with applicable laws. 5. How We Protect Your Personal Information Security 5.1 We attach great importance to the security of your personal information. We strive to adopt reasonable physical, technical, and management security measures to protect your personal information from unauthorized access, modification, and to avoid data damage or loss. Our network services adopt encryption technologies such as the Transmission Layer Security Protocol to protect the security of your data during network transmission. 5.2 We adopt strict data processing permission controls to avoid the illegal use of data. We use a variety of data desensitization methods, such as masking and anonymization to enhance the security of personal information during use. We use encryption technologies widely applied in the industry to encrypt and store your personal information and isolate it through data isolation technology. For example, we encrypt all messages stored on our servers and your terminal devices. We always implement these technical measures and organizational management methods, which may be revised from time to time to enhance the overall security of the system. 5.3 Although having taken the above reasonable and effective measures and having complied with the standards set by relevant laws, please understand that due to technical limitations and possible malicious tactics, in the Internet industry, even if we do our best to strengthen security measures, it is impossible to guarantee 100% security of information. We will do our best to ensure the security of the personal information you provide to us. Please be aware and understand that the systems and communication networks you use to access our services may have problems due to factors beyond our control. Therefore, we strongly recommend that you take proactive measures to protect the security of personal information, including but not limited to using complex passwords, regularly changing passwords, and not disclosing your account passwords and other personal information to others. 5.4 In the event of a network security incident, we will take corresponding remedial measures in accordance with the network security incident emergency plan. If our physical facilities or technical protection measures are damaged, resulting in the leakage, illegal provision, or abuse of your personal information and causing damage to your legitimate rights and interests, we will strictly assume corresponding responsibilities in accordance with the law. 5.5 Upon becoming aware of an unfortunate incident involving the leakage, illegal provision, or misuse of your personal information, we will, in accordance with the requirements of laws and regulations, inform you in a timely manner within at least [10] days: the basic situation and possible impacts of the security incident, the disposal measures we have taken or will take, the suggestions for you to independently prevent and reduce risks, and the remedial measures for you, etc. We will inform you of the relevant situation of the incident through push notifications, emails, letters, text messages, etc. If it is difficult to inform each individual personally, we will take reasonable and effective ways to issue announcements. At the same time, we will report the disposal situation of personal information security incidents to regulatory authorities as required. 6. How You Can Delete Your Account You can apply for account deletion by sending an email to ops@ninecosmos.com. We will process your application as soon as possible within seven business days after receiving your account deletion application and verifying your user identity. After the account is deleted, except for the personal information that we are legally required to retain, your personal information will be removed from FleetEye Monitoring Platform. 7. Special Instructions on Products and/or Services Provided by Third Parties 7.1 How to Access and Correct Your Personal Information Once you have logged in to this software and undergone reasonable and necessary identity verification, you can query and access basic information such as your username and avatar in the "Personal Settings" of the "FleetEye Monitoring Platform" client. If you need to correct or delete your personal information, please contact our backend staff through the contact information provided in this privacy policy. Before you correct or modify the information, we may verify your identity to ensure the security of the information involved in the correction. 7.2 Notifications of Rights Upon Stopping Operations If we cease operations, we will promptly stop collecting your personal information. We will notify you of the cessation of operations by individual delivery or public announcement, and will delete or anonymize your personal information we hold in accordance with the applicable laws. 8. Minor’s Clause 8.1 If you are a minor under the age of 18, before using this software and related services, you should read and consent to this privacy policy under the supervision and guidance of your parents or other guardians. 8.2 We protect the personal information of minors in accordance with relevant national laws and regulations. We will only collect, use, store, share, transfer, or disclose the personal information of minors when it is permitted by law, with the explicit consent of parents or other guardians, or when it is necessary to protect minors. If we find that we have collected the personal information of minors without prior verifiable parental consent, we will take steps to delete the relevant information as soon as possible. 8.3 If you are the guardian of a minor and have any questions regarding the personal information of the minor you are supervising, please contact us through the contact information publicly disclosed in this privacy policy. 9. How the Privacy Policy is Updated and Notified In order to provide you with better services, this software and related services will be updated and changed from time to time. We will revise this privacy policy in a timely manner. Such revisions form part of this privacy policy and have the same effect as this privacy policy. Once any major changes occur to this privacy policy, we will make reasonable efforts to inform all users, for example, by posting a notice on this software. However, you should regularly check this privacy policy for any changes. Your continued access to or use of this software after the updates to this privacy policy will be deemed as acceptance of the updated privacy policy. If you do not agree with the updated privacy policy, you must stop accessing or using this software. Major changes include, but are not limited to: Major changes to our service model, such as the purpose of processing personal information, the types of personal information processed, and the way of using personal information. Major changes in our ownership structure, organizational structure, etc., such as changes in ownership caused by business adjustments, bankruptcies, mergers, and acquisitions. Major changes in the primary recipients of shared, transferred, or publicly disclosed personal information. Major changes in your rights related to processing personal information and methods of exercising those rights. Changes in the responsible department for personal information security and its contact information or complaint channels. High-risk findings in personal information security impact assessment reports. 10. How to Contact Us If you wish to raise objections or file complaints regarding the way we process your personal information, or if you have any questions, comments, or requests related to this policy, please contact us immediately by sending an email to ops@ninecosmos.com. We will process and respond to your requests within 15 days. 11. Security and Passwords When you register or log in to the "FleetEye Monitoring Platform", you need to use a username and password. You are fully responsible for the security and proper use of your password,which must always be kept confidential and not disclosed to anyone.. You should also take other proactive measures to ensure the security of your password, such as regularly changing it. If you believe your password has been compromised or used without authorization, you must notify us immediately. We will not be liable for any password leakage caused by your improper use or other reasons not attributable to us. 12. Liability and Disclaimer We have made every reasonable effort to ensure the accuracy of the information contained on this platform. However, we make no representations or guarantees regarding such information. You are responsible for evaluating the information on this platform and assume all risks arising from the use of the information, including but not limited to risks arising from reliance on the accuracy, completeness, or practicality of the information.