Home > Privacy Policy

Privacy Policy


Shenzhen Conex Intelligent Technology Co., Ltd.. (”Conex”, “our”, “we” or “us”) wants you to be familiar with how we collect, use and disclose Personal Information. This Privacy Notice is meant to help you understand our privacy practices, including what Personal Information we collect, what we do with it, and how we protect it, as well as your individual rights.Before you read the following carefully to understand how we handle your personal information and our actual operating methods, we first briefly inform you of the basic structure of this privacy policy. You can click on the corresponding title to directly view the content you care about.

1、What personal information do we collect

2、How we use your personal information

3、How do we share, transfer and publicly disclose your personal information

4、How we protect your Personal Information

5、Your rights and choices available to you

6、Special information for parents

7、Changes to this policy

8、How can you contact us

9、Others


1、What personal information do we collect

When you use the services of this platform, we may collect the following types of personal information:

 

1. Basic personal information: name, profile picture, country, city, phone number, email address;

2. Personal work information: organization name or company, department, position;

3. Network identification information: account, IP address;

4. Personal communication information: messages uploaded, published, submitted or sent, chats, files, calendar information;

5. Contact information: mobile phone address book, friend list, group list.

 

Please note that some of the information types listed above may be used alone, such as operation log information that cannot identify specific natural persons. If we combine this type of non-personal information with other information to identify the identity of a specific natural person, or combine it with personal information, during the combined use period, this type of non-personal information may be treated as personal information. Unless otherwise provided by your authorization or laws and regulations, we will anonymize and not Unrecognized such personal information.


2、How we use your personal information

The basic business functions of the platform need to rely on some information to operate normally and safely, so you need to provide us or allow us to collect the following information.


1. Authentication functions

When you use this platform, you need to provide your mobile phone number and/or email address. The above information is necessary to use the platform. If you do not provide such information, you will not be able to use the platform normally. After you log in to your account, you can also choose whether to upload an avatar to enhance your personalized display. But if you only need to browse and search for the introduction of Conex products, functions, and services displayed on the official website of this platform, you do not need to register an account and provide the above information.

 

2. Safety monitoring

In order to improve the security of your use of this platform, protect the personal and property safety of you or other users or the public from infringement, and better prevent security risks such as phishing websites, fraud, network vulnerabilities, computer viruses, network attacks, and network intrusion, Accurately identify violations of laws and regulations. When you use this platform, we will automatically collect your IP address, device unique identifier, hardware model and settings, operating system and application functions (such as MAC address), and your Detailed usages of our services, such as browsing history, time zone, region and language settings, server logs (including access date and time), application crash information to comprehensively judge your account and transaction risks, perform identity verification, detect and prevent security incidents, And take necessary recording, auditing, analysis, and disposal measures in accordance with the law.


3、How do we share, transfer and publicly disclose your personal information


1. Sharing of personal information

 

(1) We will not share or transfer your personal information to third parties unless you have obtained your prior authorization or consent, or the personal information shared or transferred is information that has been Unrecognized, and the third party cannot re-identify such information.

 

(2) To share your personal information, we will follow the following principles:Authorization and consent principle: Without your consent, we will not share your personal information, unless the shared personal information is Unrecognized information, and the shared third party cannot re-identify the natural person subject of such information. If the third party uses the information for a purpose beyond the scope of the original authorization and consent, they need to obtain your consent again. The principle of legality and minimum necessity: the shared data must have a legitimate and legitimate purpose, and the shared data is limited to the extent necessary to achieve the purpose. Security and prudence principle: We will carefully evaluate the purpose of third parties using shared information, conduct a comprehensive assessment of the security capabilities of these partners, and require them to comply with cooperative legal agreements. We will conduct strict security monitoring on the software tool development kit (SDK) and application program interface (API) used by the partners to obtain information to protect data security.

 

(3) Realize sharing information of functions or services. If you choose to use the services provided by third-party service providers on this platform (including applications in the Philips EasyKey App Store), the third-party service providers may share some of your information with us. You can check the privacy policies of third-party services to understand the content of data that may be shared with us.

 

a. If you are an employee of an enterprise user, when the enterprise user administrator of your company chooses to open, manage and use third-party products or services through this platform, you will agree to our provision of you to the third-party application service provider Personal basic information (account, name, avatar, corporate phone number, corporate email, departmental organization structure) and basic permissions of the user, otherwise you cannot use third-party application services. Enterprise user administrators need to read and fully understand and abide by the product features and privacy protection policies of third-party services when they subscribe to use third-party application services. If you, as an individual user, choose to open, manage and use a third-party product or service through this platform, you agree that we will provide the third-party application service provider with your personal information (account, name, avatar, corporate phone number, corporate Email, departmental organization structure) and basic permissions, otherwise you cannot use third-party application services. When you subscribe to use third-party application services, you must read and fully understand and abide by the third-party service’s product features and privacy protection policies.

 

b. Log in and bind products on this platform: With your consent, when you use a Conex account to log in to third-party products or services(including applications in the Philips EasyKey App Store), or combine your account with other With three-party account binding, we will share your basic information (name, profile picture) and other information authorized by you with the aforementioned products or services.

 

c. Location service provider (AutoNavi Map): We will transfer your Unrecognized location information to the location service provider (AutoNavi Map) to provide you with more accurate positioning in the calendar function.

d. Associated companies: We promise not to share your personal information with any associated companies under any unnecessary circumstances. Exceptionally necessary situations include: only sharing your information to provide the services you need, but in order to better provide you with related services, we will use more complete tools provided by affiliated companies based on the use of this platform The purpose of your personal information is to process your personal information. Specific tools include [Byte Cloud provided by ByteDance] and related [function plug-ins] to store, transmit, and process your personal information.

 

e. Other auxiliary processing program supporters: You understand and agree that in order to ensure the realization of the platform's related functions and the safe and stable operation of the application, we may access the software development kit (SDK) provided by a third party for related purposes. We will conduct strict security monitoring on the software tool development kit (SDK) used by our partners to obtain information to protect data security. The relevant third-party SDKs we access are listed in the catalog. We will only share information necessary to achieve the purpose with third parties, and you understand and authorize our information sharing behavior in this case. If a third party really needs to use personal information beyond the aforementioned purposes for business needs, the third party will need to seek your consent again. Before cooperating with a third party, the company will make commercially reasonable efforts to test the security capabilities of the third party, evaluate the legitimate and legal necessity of sharing relevant information with the third party, and sign a confidentiality agreement with the third party to conduct its inquiry. Technical monitoring, and use commercially reasonable efforts to urge third parties to comply with the confidentiality and security measures stipulated in laws, regulations, and agreements when using user information.


2. Transfer of personal information

With the continuous development of our business, we may carry out mergers, acquisitions, and asset transfers, and your personal information may 

be transferred as a result. In the event of the aforementioned changes, we will continue to protect or require the successor of personal information to continue to protect your personal information in accordance with laws and regulations and security standards not lower than this privacy policy, otherwise, we will require the successor to re-acquire Your authorization agrees.

 

3. Public disclosure of personal information

We will not publicly disclose your information unless we obtain your consent. However, in accordance with laws, regulations, rules, other normative documents, mandatory administrative law enforcement or judicial requirements, when you must provide your personal information, we may report to administrative law enforcement or judicial authorities based on the required personal information type and disclosure method Disclose your personal information. When we receive a disclosure request, under the premise of complying with laws and regulations, we require it to produce corresponding legal documents. We only provide data obtained by law enforcement and judicial departments for specific investigation purposes and have legal powers. As permitted by laws and regulations, the documents we disclose are protected by encryption measures. Please understand that in the following circumstances, in accordance with laws, regulations, and national standards, we do not need your authorization to share, transfer, and publicly disclose your personal information:

 

(1) Directly related to national security and national defense security;

(2) It is directly related to public safety, public health, and major public interests;

(3) Directly related to the criminal investigation, prosecution, trial, and execution of judgments;

(4) In order to protect your or other individuals’ major legal rights and interests, such as life and property, but it is difficult to obtain the consent of the person, except in situations expressly prohibited by laws and regulations;

(5) Your personal information disclosed to the public by yourself;

(6) Collect personal information from legally publicly disclosed information, such as legal news reports, government information disclosure, and other channels.

 

According to laws and regulations, sharing and transferring personal information that has been Unrecognized, and ensuring that the data recipient cannot recover and re-identify the subject of personal information does not belong to the external sharing, transfer, and public disclosure of personal information. The processing will not be required to notify you and obtain your consent.


4、How we protect your Personal Information

(1) We adopt strict data processing authority control to prevent data from being used in violation of regulations; we adopt multiple data desensitization methods such as Unrecognized technologies such as coding and shielding to enhance the security of personal information in use; we adopt extensive industry applications The encryption Robotics encrypts and saves your personal information, and isolates it through data isolation Robotics. For example, we encrypt all messages stored on our servers and on your terminal device. We always implement these technical measures and organizational management methods, and may revise and improve them from time to time to improve the overall security of the system.

 

(2) Although the above reasonable and effective measures have been taken, and the standards required by relevant laws and regulations have been 

complied with, please understand that due to technical limitations and various malicious methods that may exist, in the Internet industry, even if you do your best to strengthen Security measures, it is impossible to always guarantee the security of information 100%, we will try our best to ensure the security of the personal information you provide to us. Please be aware and understand that the system and communication network you use to access our services may have problems due to factors beyond our control. Therefore, we strongly recommend that you take active measures to protect the security of personal information, including but not limited to using complex passwords, regularly changing passwords, and not disclosing personal information such as your account password to others.


(3) In the event of an incident that endangers network security, we will take corresponding remedial measures in a timely manner in accordance with the network security incident emergency plan. If our physical facilities or technical protection measures are damaged, causing your personal information to be leaked, illegally provided or abused, causing damage to your legitimate rights and interests, we will assume corresponding responsibilities in strict accordance with the provisions of the law.

 

(4) After we learn that your personal information has unfortunately been leaked, illegally provided or misused, we will notify you in time in accordance with the requirements of laws and regulations within [10] days at the latest: Security The basic situation and possible impact of the incident, the disposal measures we have taken or will take, suggestions that you can independently prevent and reduce risks, and remedial measures for you. We will inform you of the incident-related situation by means of push notifications on the platform. When it is difficult to inform the personal information subjects one by one, we will adopt a reasonable and effective way to publish an announcement. At the same time, we will also report the handling of personal information security incidents in accordance with the requirements of the regulatory authorities.


5、Your rights and choices available to you

(1) How to access and correct your personal information

1. Access to personal information: access to avatar, name, work status, department, direct superior, email, mobile phone number. Enter [Personal Profile Picture in the upper left corner of "Conex"] to access personal information.

2. If you are an employee of an enterprise user, you can submit an application for correction of information to your employer and the enterprise user administrator will process it.

(2) Delete your information

You can delete some of your information by the methods listed in "(1) Access and Correction of Your Information" above.In the following situations, you can request us to delete personal information:

 

1. If our handling of personal information violates laws and regulations;

2. If we collect and use your personal information without obtaining your explicit consent;

3. If our handling of personal information seriously violates our agreement with you;

4. If you no longer use our products or services, or you actively cancel your account;

5. If we no longer provide you with products or services forever.

 

If we decide to respond to your deletion request, we will also notify the subjects who obtained your personal information from us as much as possible at the same time and require them to delete them in time (unless laws and regulations provide otherwise, or these subjects have independently obtained your authorization). When you or we assist you in deleting relevant information, we may not be able to delete the corresponding information from the backup system immediately due to applicable laws and security technologies. We will safely store your personal information and isolate it from any further processing. Until the backup can be cleared or made anonymous.


6、Special information for parents

The Conex Pages are not directed to children, as defined under applicable law, and we do not knowingly collect Personal Data from children. It is, however, Conex policy to comply with the law when it requires parent or guardian permission before collecting, using or disclosing Personal Data of children. We are committed to protecting the privacy needs of children and we strongly encourage parents and guardians to take an active role in their children’s online activities and interests. If a parent or guardian becomes aware that his or her child has provided us with his or her Personal Data without their consent, please contact us via our contact form. If we become aware that a child has provided us with Personal Data, we will delete his/her data from our files.


7、Changes to this policy

We may update this privacy notice from time to time in response to changing legal, regulatory, or operational requirements. We will take appropriate and feasible steps to notify users of any such changes (including when they will take effect). The latest version of our Privacy Policy is available through our website. Your continued use of the “service” after any such updates take effect will constitute acceptance of those changes. If you do not accept any updates to this privacy notice, you should stop using this digital “service.” We will make good faith efforts to resolve any requests to correct inaccurate personal data except where (1) the request is unreasonable, (2) requires disproportionate technical effort or expense, (3) jeopardizes the privacy of others or would be impractical. We will comply with the specific time required in the applicable law to address your concerns, free of charge if possible for the business and the allowed number of times, under applicable law guidance.


8、How can you contact us

Please send any questions, comments or requests related to this policy to export@cone-x.com. Under normal circumstances, we will reply within [15] days after receiving your relevant contact information and verifying your identity. For your reasonable request, we do not charge a fee in principle, but for repeated requests that exceed a reasonable limit, we will charge a fee as appropriate. For information that is not directly related to your identity, unreasonable duplication of information, or excessive technical means (for example, the need to develop a new system or fundamentally change current practices), bring risks to the legitimate rights and interests of others, or unrealistic requests , We may refuse.


9、Others


(1) This privacy policy only applies to situations where you use the platform services in mainland China (for the purpose of this clause only, excluding Hong Kong, Macau, and Taiwan). This privacy policy may exist in multiple languages. If the terms of each language version are inconsistent or conflicted, the Chinese version shall prevail.


(2) The headings in this privacy policy are provided for convenience and reading only, and do not affect the meaning or interpretation of any provisions in this privacy policy.