Last Updated: September 18, 2024
This Privacy Policy applies to the services provided by Rongta Technology (Xiamen) Group Co., Ltd. (hereinafter referred to as "Rongta"). It governs your access to and use of the APP platform and website developed by Rongta.
If you use third-party authorized logins, you must comply with the privacy policies of those third parties. We cannot understand or control their purposes for collecting and using information. Please exercise caution when accessing or using their services until you have reviewed and accepted their privacy policies.
Before using Rongta's products or services, please carefully read and understand this policy. You should only use the relevant products or services after confirming that you fully understand and agree to the terms. If you have any questions regarding this Privacy Policy, you can contact us through the contact information published by Rongta (market-01@rongtatech.com). If you do not agree with the contents of this Privacy Policy, you should stop using Rongta's services.
This Privacy Policy will help you understand the following:
1. How we collect and use your personal information and that of your end users.
2. How we store and protect this information.
3. How we share, transfer, and disclose your personal information and that of your end users.
4. How we manage the personal information of you and your end users.
5. How we handle the information of minors.
6. The scope of this policy and how we update it.
When you use the various functions of our products or services (hereinafter referred to as "Services"), we need to collect relevant information to provide you with better services, ensure the security of your information, and comply with national laws and regulations.
1. Account Registration and Login
When you register for our product or service account or use our services, you need to provide your email address as your account login name and set a password. If you use a third-party platform's account for authorization login, we will obtain relevant information (including ID, nickname, avatar) and authentication information from the third-party account with your authorization.
If you refuse to authorize the aforementioned information, you will not be able to use the third-party account to log into this APP, but you can register/login through other means.
2. Use of Products or Services
Since you need to connect specific models of printers via Bluetooth and enter information to be printed online for one-click printing, we may need to collect the following information:
① Personal Operation Information: When you use our services, we collect your usage data as user operation logs, including your printing content, information edits, search history, template usage history, IP address, printing devices used, language, service access date and time, personal operation records, and information obtained through cookies or other technologies. This helps us provide data storage, data recovery services, improve our products and services, and promptly identify and prevent security risks, thus enhancing your user experience.
② Device Information: To enhance user experience and resolve any functional issues, we will record the information of your mobile device in real-time, including the hardware model of your phone or printer, operating system type, operating system version number, device identification information (IMEI/MEID, IMSI, ICCID, Android ID, device MAC address, lists of specific types of sensors, hardware serial numbers), etc., describing the basic situation of your commonly used terminal devices.
③ Other Specific Service Information:
a. When you contact us, we may keep your communication/call records and content, or your contact information and related details to assist you in resolving issues or to record the solutions and results of related problems.
b. When you choose to participate in our promotional activities, we may collect your name, mailing address, contact information, and payment account based on the needs of the activity. This information is necessary for you to receive transfers or gifts. If you refuse to provide this information, we will be unable to transfer funds or issue gifts.
c. To avoid repeated notifications of important system updates, we need to collect your device identification information.
To provide you with services and ensure the security of your account information, Rongta needs to request the following permissions within a necessary scope. Please rest assured that we do not enable these permissions by default; we only collect your information through these permissions if you actively confirm to enable them. It is important to note that obtaining a specific permission does not mean we will necessarily collect your relevant information; even if you confirm enabling the relevant permissions, we will only collect your information within a legal, legitimate, and necessary range. Please refer to the permission settings guide for using corresponding functions and instructions or guidance from mobile device and system developers.
① Read Third-party Platform Account Information
Method Description: When you use a third-party platform's authorized login, we will obtain relevant information (including ID, nickname, avatar) and authentication information from the third-party account with your authorization.
Purpose Description: This is used for binding your APP account, perfecting account information, ensuring account security, and preventing security risks. If you refuse to provide this information, you will not be able to log in using the third-party account, but you can register/login through other means.
② Read Device ID
Method Description: When users click "Guest Login," with your authorization, we will obtain the current device ID (Android ID/iOS ID) to determine if a guest user ID exists. If it does, we will use the existing guest user ID to log in; if not, a new guest user ID will be assigned.
Purpose Description: To prevent the system from assigning multiple different guest user IDs when the same user repeatedly clicks "Guest Login," which would result in loss of guest user data.
③ Modify or Delete Contents on the Storage Card
Method Description: When you preview print files, this APP will cache the files locally.
Purpose Description: To save APP-related data and allow users to manage print history files, etc.
④ Access Location Information
Method Description: When connecting to a printer, this APP will obtain precise location information based on GPS, base stations, and Wi-Fi networks.
Purpose Description: This permission is necessary for configuring Wi-Fi networks for certain printers via Bluetooth; failure to provide it will result in connection errors.
⑤ Read Contents on the Storage Card
Method Description: When you use document printing or recently opened functions, this APP will read files on the storage card.
Purpose Description: To read file data from the storage card for displaying, managing, and printing files.
⑥ Camera Access
Method Description: When you use scanning or photo functions, this APP will request camera permissions.
Purpose Description: Used for implementing scan-to-print and photo printing functions.
⑦ Upload Print Files to the Server
Method Description: When using cloud printing/remote printing, this APP will upload print files to the server, which will then transmit them to your printer. If local or home printing fails, this APP will automatically switch to remote printing for a smoother experience.
Purpose Description: Used to implement remote printing. If you refuse to provide this, you will not be able to use the remote printing function.
⑧ Bluetooth Access
Method Description: When using the device connection function of this APP, we will request this permission.
Purpose Description: To complete pairing, connection, and printing functions for printers.
⑨ Network Permissions
Method Description: When using this APP, we will request this permission.
Purpose Description: To access the latest content and software updates we provide.
⑩ Gyroscope Sensor
Method Description: When you use the camera function, this app will call the gyroscope sensor.
Purpose Description: For anti-shake and angle recognition during photo taking.
① ZXing SDK
Purpose: For scanning and quickly generating QR codes for printing.
Usage scenario: Scan code.
Personal Information Types: Device serial number, acceleration sensor information.
Collection Method: SDK collection.
② WeChat SDK
Purpose: APP account binding, perfecting account information, ensuring account security, and preventing security risks.
Usage scenario: User registration/login, click to redirect to WeChat, authorize after agreeing to register/login; account binding, click to redirect to WeChat, authorize after agreeing to bind.
Personal Information Types: WeChat account authentication information.
Collection Method: SDK collection.
③ Google SDK
Purpose: APP account binding, perfecting account information, ensuring account security, and preventing security risks.
Usage scenario: User registration/login, click to redirect to Google, agree to authorize, and then register/login; account binding, click to redirect to Google, agree to authorize, and then bind.
Personal Information Types: Account authentication information.
Collection Method: SDK collection.
④ Facebook SDK
Purpose: APP account binding, perfecting account information, ensuring account security, and preventing security risks.
Usage scenario: User registration/login, click to redirect to Facebook, agree to authorize, and then register/login; account binding, click to redirect to Facebook, agree to authorize, and then bind.
Personal Information Types: Account authentication information.
Collection Method: SDK collection.
⑤ YouTube SDK
Purpose: APP account binding, perfecting account information, ensuring account security, and preventing security risks.
Usage scenario: User registration/login, click to redirect to YouTube, agree to authorize, and then register/login; account binding, click to redirect to YouTube, agree to authorize, and then bind.
Personal Information Types: Account authentication information.
Collection Method: SDK collection.
⑥ Twitter SDK
Purpose: APP account binding, perfecting account information, ensuring account security, and preventing security risks.
Usage scenario: User registration/login, click to redirect to Twitter, agree to authorize, and then register/login; account binding, click to redirect to Twitter, agree to authorize, and then bind.
Personal Information Types: Account authentication information.
Collection Method: SDK collection.
1. The information we produce and collect within the People's Republic of China will be stored within the borders of the People's Republic of China. If certain services involve overseas operations, we will carry out these activities in accordance with relevant laws and obtain your consent. If we are required by law to provide information overseas, we will ensure confidentiality through agreements and on-site inspections.
2. To protect your information, we will take various reasonable and necessary measures after collecting your information. For example, during technical development, we will only use anonymized information for statistical analysis; when providing research reports externally, we will de-identify the information included in the reports.
3. We commit to achieving a level of information security protection that meets industry-leading standards. To protect your information, we are dedicated to using various security technologies and complementary management systems to minimize risks of information leakage, damage, misuse, unauthorized access, disclosure, and alteration. For example:
① Use encrypted communication protocols to ensure data is transferred in a non-plain text manner.
② Conduct security reinforcement for applications to prevent sensitive information from being accessed during reverse engineering.
③ Implement industry-standard authorization mechanisms to ensure actions are initiated by the user.
④ Ensure all data storage is conducted internally without public access points.
⑤ Store sensitive user information (such as email, passwords, etc.) in encrypted form.
4. We have developed a personal information security incident emergency response plan and conduct regular training for relevant internal personnel to ensure they understand their responsibilities and emergency response strategies. In the unfortunate event of a data security incident, we will promptly inform you of the basic situation, potential impact, and the measures we have taken or will take, in accordance with legal requirements. We will communicate this information through the APP, email, etc.
5. Please take good care of your account, password, and related identity elements. When you use our services, we identify you through your login name or other identity information. If these details are leaked, you may suffer losses and face adverse consequences. If you find that your login name or other identity information has been compromised, please contact us immediately so we can take appropriate measures to avoid or reduce potential losses.
6. After you cease using our services, we will stop collecting and using your information, unless otherwise stipulated by law. If we stop operations, we will halt the collection of your personal information and notify you individually or publicly, and will delete or anonymize your personal information.
1. Sharing
① We may share your personal information with third parties only after obtaining your explicit consent, and necessary de-identification will be carried out.
② We may share your personal information with relevant third parties in accordance with legal regulations or supervisory requirements.
③ To achieve certain purposes stated in this policy, some of our services may be provided by third-party partners. We may share your personal information with third-party partners to enhance customer service and user experience. We will only share your personal information for legitimate, necessary, specific, and clearly defined purposes and will only share the information necessary to provide services. We will not use your personal information for purposes beyond the scope defined in this policy without your permission.
2. Transfer
We will not transfer your personal information to any company, organization, or individual, except in the following circumstances:
① With your prior explicit authorization or consent.
② To comply with legal regulations, legal procedures, or mandatory government requirements or judicial rulings.
If we or our affiliates are involved in mergers, divisions, liquidations, or acquisitions or sales of assets or businesses, your personal information may be transferred as part of such transactions. We will ensure the confidentiality of such information during the transfer and require the new entity holding your personal information to continue adhering to this policy and obtain your consent through specific means.
3. Public Disclosure
We will only disclose your personal information under the following circumstances:
① With your explicit consent.
② When announcing winners of a promotional event, we may display winning email addresses or account login names in a de-identified manner.
③ Based on legal regulations, legal procedures, litigation, or mandatory governmental requirements.
4. Exceptions to Prior Authorization for Sharing, Transfer, and Public Disclosure
Under the following circumstances, sharing, transferring, or publicly disclosing your personal information does not require prior authorization:
① Related to national security or national defense.
② Related to public safety, public health, or major public interests.
③ Related to criminal investigations, prosecutions, trials, or enforcement of judgments.
④ For protecting the life, property, or other major legal rights of individuals but where obtaining consent is difficult.
⑤ Personal information that you have publicly disclosed.
⑥ Personal information collected from legally publicly disclosed sources, such as lawful news reports or government information disclosures.
⑦ Necessary for signing and fulfilling contracts as requested by the personal information subject.
⑧ Essential for maintaining the security and stability of the products or services provided, such as identifying and addressing faults in products or services.
⑨ Other circumstances stipulated by laws and regulations.
You acknowledge and agree that sharing or transferring de-identified personal information, ensuring that the data recipient cannot restore and re-identify the personal information subject, is not considered external sharing, transfer, or public disclosure of personal information. Such storage and processing will not require further notification or your consent.
1. You can modify the scope of your authorization through the system application settings by canceling the relevant permissions. Please be aware that if you cancel the scope of authorization, it may affect your use of functions related to that authorization but will not impact other functionalities.
2. If you find that our collection and use of your personal information violates laws and regulations, you can contact us and request the deletion of relevant information. If you need to inquire about, modify, correct, or delete your personal information, or if you have any questions or complaints regarding your personal information protection, you can send an email to market-01@rongtatech.com, and we will address your concerns promptly and effectively.
3. Despite the above provisions, in accordance with national laws and regulatory requirements, we may not respond to your requests in the following situations:
① Related to national security.
② Related to public safety, public health, or major public interests.
③ Related to criminal investigations, prosecutions, trials, or enforcement of judgments.
④ When sufficient evidence indicates malice or abuse of rights on your part.
⑤ Responding to your request would severely damage the legal rights of other individuals or organizations.
⑥ Involving trade secrets.
⑦ Other circumstances stipulated by laws and regulations.
We take the protection of minors' information very seriously and do not intentionally collect or request personal information from individuals under the age of 18.
If you are under 18, please obtain the consent of your parents or guardians before using our products and services. We recommend that your parents or guardians read this policy carefully.
Once you download, install, or use any part or all of our products or services in any manner, it indicates that your parents or guardians consent to your use of our products or services and acknowledge the entirety of this policy. If parents or guardians have reason to believe that a minor has submitted personal information to us without their prior consent, please contact us to ensure the deletion of such personal information.
This policy applies to all our products or services unless there are specific agreements in separate privacy policies or corresponding user service agreements.
We will update this policy in a timely manner under the following circumstances:
① Changes in our basic situation, such as changes in ownership due to acquisitions, mergers, or reorganizations.
② Changes in the objects, scope, or purposes of information provision.
③ Changes in the scope, purposes, or rules for collecting, storing, or using personal information.
④ Changes in the methods for accessing and managing personal information.
⑤ Changes in user inquiry, complaint channels and mechanisms, and external dispute resolution institutions and contact information.
⑥ Other changes that may significantly affect your personal information rights.
If this policy is updated, we will notify you via APP pop-ups or other means. To ensure you receive timely notifications, we recommend that you inform us promptly of any changes to your contact information. If you continue to use our products or services after this policy is updated, it indicates that you have fully read, understood, and accepted the updated policy and are willing to comply with its provisions.
You can view the full text of this policy in the [My]-[Privacy Policy and User Agreement] section. We encourage you to review our privacy policy each time you use our products or services.