Privacy Policy

Updated: June 20 , 2025

Shenzhen Ysair Technology Co., Ltd. (hereinafter referred to as "we", "us") is well aware of the importance of privacy to you and will respect your privacy. The " SVBONY Privacy Policy" (hereinafter referred to as "this Policy") applies to the products and services we provide and their extended functions, including the SVBONY app and the various products and services provided to you in new forms that emerge with the development of technology (hereinafter referred to as "our platform"). If a product or service we provide has a separate privacy policy or user service agreement, the privacy policy or user service agreement of that product or service will take precedence. Content not covered by the privacy policy and user service agreement of that product or service shall be subject to the content of this policy. If the products or services of our affiliated companies use the products or services we provide but do not set up an independent privacy policy, this policy also applies to those products or services. Unless otherwise agreed, the terms used in this policy have the same meaning as those in the " SVBONY User Service Agreement".

f you are a minor or a person who does not have full civil capacity (hereinafter referred to as a "minor") according to the laws of the jurisdiction where you live, please read this Agreement carefully and fully understand it in the presence of your legal guardian, and use SVBONY products and services only after obtaining the consent of your legal guardian.

This policy will help you understand the following:

1. How do we collect and use your user information?

2. How do we use cookies and similar technologies?

3. How do we share, transfer, and publicly disclose your user information?

4. How do we protect your user information?

5. Your Rights

6. How do we handle children’s personal information?

7. How is your user information stored and transferred globally

8. How to update this policy

9. How to contact us

We are fully aware of the importance of user information to you and will do our best to protect your user information. We are committed to maintaining your trust in us and abiding by the following principles to protect your user information: the principle of consistency of rights and responsibilities, the principle of clear purpose, the principle of choice and consent, the principle of minimum sufficiency, the principle of ensuring safety, the principle of subject participation, the principle of openness and transparency, etc. At the same time, we promise that we will take corresponding security measures to protect your user information in accordance with the mature security standards of the industry.

Please read and understand this Privacy Policy carefully before using our products (or services).

1. How do we collect and use your user information?

1.1. Information we collect and use when you use our products or services

We will only collect and use your user information for the business functions described in this policy. The purpose of collecting user information is to provide you with products or services. You have the right to choose whether to provide this information. However, in most cases, if you do not provide it, we may not be able to provide you with the corresponding services or respond to the questions you encounter:

1. Improve or optimize our services
When you visit our platform webpage or use our platform services through mobile electronic devices, we may read your device's geographic environment and location information, and mobile device-related information, such as device model, device identification code, operating system, resolution, telecom operator, Android ID, Android SD card data, etc., in order to improve or optimize our services.

2. Provide basic services and improve security

When you use our products or services, we need to collect information such as the usage log records generated thereby.

When you visit our web pages through a computer, or visit our mobile web pages through a smart mobile terminal, download and use our or our affiliates' client software to use our services, we may read information related to your device, such as media access control (MAC) address, browser name and version, language, geographic location information, device manufacturer and model, device identification code, operating system, resolution, telecom operator, etc.

To improve the security of your use of our services and to more accurately prevent phishing scams and Trojan viruses, we may determine the risk of your account by understanding your network usage habits, your user behavior data, basic device information, URL access records (such as device terminal type, device terminal screen resolution, device network operator, etc.), and may record some URLs that we believe are risky.

3. Other information you send to us in addition to the above information The above information you provide will continue to be authorized for us to use during your use of this service. When you stop using the push service, we will stop using and delete the above information.

We guarantee that we will de-identify or anonymize the collected user information in accordance with the law. Information that cannot identify a natural person alone or in combination with other information does not constitute personal information in the legal sense. If we combine non-personal information with other information to identify you personally, or use it in combination with your personal information, we will treat such information as your personal information during the period of combined use and process and protect it in accordance with this Privacy Policy.

In order to better operate and improve our technology and services, or due to changes in business strategies, when the collection, use, and processing of user information required for the products or services we provide exceeds the above scope or the collected user information is to be used for other purposes not specified in this Privacy Policy, or when we want to use information collected for specific purposes for other purposes, we will notify you within a reasonable period after obtaining the user information or before processing the user information, and obtain your authorization and consent.

1.2. Device Permission Call

To achieve the above purposes, we may need you to give us access to your device in your device:

Permission Name Types of systems involved Purpose of access
(type of personal informationcollected or function achieved)
Network permissions IOS / Android Control and manage cameras
Album permissions IOS / Android Download and export files from camera
Local network permissions IOS / Android APP and camera communication
Network permissions IOS / Android Control and manage cameras
Notification permissions IOS / Android Receive APP reminders in time
Location permissions IOS / Android Find nearby Wi-Fi devices and view maps
Personalized recommendations and targeted push notifications IOS / Android Community work recommendations and information notifications
storage IOS / Android Download and export files from camera

1.3 Exceptions to obtaining authorization and consent

Please understand that according to laws, regulations and relevant national standards, we do not need your authorization to collect and use your user information in the following circumstances:

1. Directly related to national security and national defense security;

2. Directly related to public safety, public health, and major public interests;

3. Directly related to criminal investigation, prosecution, trial and execution of judgment;

4. To protect your or other individuals’ life, property and other major legal rights and interests, but it is difficult to obtain their consent;

5. The user information collected is disclosed to the public by you on your own initiative;

6. Your user information collected from legally disclosed information, such as legal news reports, government information disclosure and other channels;

7. Necessary for signing or performing a contract according to your requirements;

8. Necessary for maintaining the safe and stable operation of the software and related services, such as discovering and handling failures in the software and related services;

9. The controller of personal information is a news organization and it is necessary for it to carry out legitimate news reporting;

10. When academic research institutions conduct statistical or academic research based on public interests and provide the results of academic research or descriptions to the outside, they shall de-identify the personal information contained in the results.

11. Other circumstances prescribed by laws and regulations.

2. How do we use cookies and similar technologies?

2.1. Cookies

To ensure the normal operation of the website, we will store small data files called cookies on your computer or mobile device. Cookies usually contain identifiers, site names, and some numbers and characters. With cookies, the website can store your access preference data.

We will not use cookies for any purpose other than those described in this policy. You can manage or delete cookies according to your preferences. You can clear all cookies saved on your computer, and most web browsers have the function of blocking cookies. However, if you do this, you will need to change the user settings yourself every time you visit our website.

2.2. Web beacons and pixel tags

In addition to Cookies, we also use other similar technologies such as web beacons and pixel tags on our websites. For example, the email we send to you may contain a click URL that links to the content of our website.

If you click on the link, we will track the click to help us understand your product or service preferences and improve customer service. Web beacons are usually transparent images embedded in websites or emails. With the help of pixel tags in emails, we can know whether the email has been opened. If you do not want your activities to be tracked in this way, you can unsubscribe from our mailing list at any time.

3. How do we share, transfer, and publicly disclose your user information?

3.1. Sharing

We will not share your user information with any other company, organization or individual, except in the following circumstances:

1. Sharing with explicit consent: After obtaining your explicit consent, we will share your user information with other parties.

2. We may share your user information with external parties in accordance with laws and regulations or the mandatory requirements of government authorities.

3. Sharing with our affiliates: Your user information may be shared with our affiliates. We will only share necessary user information and will be subject to the purposes stated in this Privacy Policy. If an affiliate wants to change the purpose of processing user information, it will ask for your authorization again.

4. Sharing with authorized partners: Some of our services will be provided by authorized partners only for the purposes stated in this policy. We may share some of your user information with partners to provide better customer service and user experience. We will only share your user information for legitimate, legal, necessary, specific and clear purposes, and will only share user information necessary to provide services. In order to better operate and improve technology and services, you agree that we and authorized partners may use the collected information for other services and purposes in compliance with relevant laws and regulations.

The following lists specific authorized partners and provides links to the privacy policies of the third parties. We recommend that you read the privacy policies of the third parties:

SDK name: MapBox SDK Service type: Realize the motion camera trajectory playback function The types of personal information collected by the SDK: location information (latitude and longitude, precise location, rough location) [through IP address, GNSS information, WiFi status, WiFi parameters, WiFi list, SSID, BSSID, base station information, signal strength information, Bluetooth information, sensor information (vector, acceleration, pressure, direction, geomagnetism), device signal strength information acquisition, external storage directory], device identification information (IMEI, IDFA, IDFV, Android ID, MEID, MAC address, OAID, IMSI, ICCID, hardware serial number), current application information (application name, application version number), device parameters and system information (system properties, device model, operating system, operator information). Amap privacy policy link: https://lbs.amap.com/pages/privacy/ SDK name: Huawei unified code scanning SDK (Android version) Service type: Provide QR code scanning service Privacy Policy link: https://developer.huawei.com/consumer/cn/doc/HMSCore-Guides/sdk-data-security-0000001050043971 SDK name: Firebase Crashlytics SDK Service type: Collect application crash data Types of personal information collected: Network status information, device information Privacy Policy link:

We will sign strict confidentiality agreements with companies, organizations and individuals with whom we share user information, requiring them to handle user information in accordance with our instructions, this Privacy Policy and any other relevant confidentiality and security measures.

3.2. Transfer

We will not transfer your user information to any company, organization or individual, except in the following circumstances:

1. Transfer with explicit consent: We will transfer your user information to other parties with your explicit consent;

2. In the event of a merger, acquisition or bankruptcy liquidation, if user information is transferred, we will require the new company or organization that holds your user information to continue to be bound by this Privacy Policy. Otherwise, we will require the company or organization to re-solicit your authorization and consent.

3.3. Public Disclosure

We will only publicly disclose your user information in the following circumstances:

1. After obtaining your explicit consent;

2. Disclosure based on law: We may disclose your user information publicly when required by law, legal procedures, litigation or government authorities.

3.4. Exceptions to prior authorization and consent when sharing, transferring, or publicly disclosing information

Please understand that according to laws, regulations and relevant national standards, we do not need your authorization or consent to share, transfer or publicly disclose your user information in the following circumstances:

1. Directly related to national security and national defense security

2. Directly related to public safety, public health, and major public interests;

3. Directly related to criminal investigation, prosecution, trial and execution of judgment;

4. To protect your or other individuals’ life, property and other major legal rights and interests, but it is difficult to obtain their consent;

5. Information that you disclose to the public on your own initiative;

6. Collected from information disclosed legally, such as legal news reports, government information disclosure and other channels.

4. How do we protect your user information?

4.1. We have used security measures that meet industry standards to protect the user information you provide and prevent data from being accessed, disclosed, used, modified, damaged or lost without authorization. We will take all reasonable and feasible measures to protect your user information. For example, when exchanging data between your browser and the "Service", it is protected by SSL encryption; we also provide https secure browsing for the website; we will use encryption technology to ensure the confidentiality of data; we will use trusted protection mechanisms to prevent data from being maliciously attacked; we will deploy access control mechanisms to ensure that only authorized personnel can access user information; and we will hold security and privacy protection training courses to enhance employees' awareness of the importance of protecting user information.

4.2. We will take all reasonable and feasible measures to ensure that no irrelevant user information is collected. We will only retain your user information for the period necessary to achieve the purposes stated in this policy, unless the retention period needs to be extended or is permitted by law.

4.3. The Internet is not an absolutely secure environment, and emails, instant messaging, and communication with other users are not encrypted. We strongly recommend that you do not send user information through such means.

4.4. The Internet environment is not 100% secure. We will do our best to ensure the security of any information you send to us. Even if we make great efforts and take all reasonable and necessary measures, it is still possible that we cannot prevent your user information from being illegally accessed, illegally stolen, illegally tampered with or destroyed, resulting in damage to your legal rights and interests. Please understand the above risks of the information network and voluntarily bear them.

4.5. After a user information security incident unfortunately occurs, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, suggestions for you to prevent and reduce risks on your own, and remedial measures for you, etc. We will promptly inform you of the relevant situation of the incident by email, letter, phone, push notification, etc. When it is difficult to inform the user information subject one by one, we will take reasonable and effective ways to issue an announcement. At the same time, we will also proactively report the disposal of the user information security incident in accordance with the requirements of the regulatory authorities.

5. Your Rights

In accordance with relevant Chinese laws, regulations, and standards, as well as common practices in other countries and regions, we guarantee that you can exercise the following rights over your user information:

5.1. Access your user information

You have the right to access your personal information under the provisions of laws and regulations.

5.2. Correcting your user information

If you find that we have made an error in processing your personal information, you have the right to ask us to make corrections. You can contact us at any time through the contact information provided on the website or App, or send an email to support@svbony.com at any time .

5.3. Deleting your user information

In the following circumstances, you may request us to delete user information:

1. If our handling of user information violates laws and regulations;

2. If we collect and use your user information without your consent;

3. If our handling of user information violates the agreement with you;

4. If you no longer use our products or services;

5. If we no longer provide products or services to you.

We will evaluate your deletion request and take appropriate steps to process it if it meets the relevant regulations. When you make a deletion request to us, we may ask you to authenticate your identity to ensure the security of your account. When you delete information from our services, we may not immediately delete the corresponding information from the backup system due to applicable laws and security technologies. We will store your information securely until the backup can be cleared or anonymized.

5.4. Changing the scope of your authorization

Each business function requires some basic user information to be completed (see "Part I" of this policy). You can give or withdraw your authorization consent for the collection and use of user information at any time. You can do it yourself in the following ways: send an email to support@svbony.com .

Once you withdraw your consent, we will no longer process the corresponding user information. Please also note that your withdrawal of authorization may lead to certain consequences, such as we may not be able to continue to provide you with the corresponding services or specific functions, but your decision to withdraw your consent will not affect the user information processing previously carried out based on your authorization.

5.5. User Information Subject Obtains a Copy of User Information the right to obtain a copy of your user information, which you can do by yourself in the following ways: You can send an email to support@svbony.com and we will respond with a copy of your user information.

Where technically feasible, such as data interface matching, we may also transfer a copy of your user information directly to a third party designated by you upon your request.

5.6. Constraining information system automatic decision- making

In certain business functions, we may make decisions solely based on non-manual automatic decision-making mechanisms, including information systems, algorithms, etc. If these decisions significantly affect your legal rights and interests, you have the right to ask us for an explanation, and we will provide appropriate relief.

5.7. Responding to your above requests/p>

For security reasons, you may need to provide a written request or prove your identity in other ways. We may ask you to verify your identity before processing your request.

In principle, we do not charge any fees for your reasonable requests, but we will charge a certain cost for repeated requests that exceed reasonable limits. We may reject requests that are unreasonably repeated, require too many technical means (for example, the development of new systems or fundamental changes to current practices), pose risks to the legitimate rights and interests of others, or are extremely impractical. Please also understand that for security reasons, the requirements of relevant laws and regulations, or technical limitations, we may not be able to respond to some of your requests, such as the following situations:

1. Related to the user information controller's performance of obligations prescribed by laws and regulations;

2. Directly related to national security and national defense security;

3. Directly related to public safety, public health, and major public interests;

4. Directly related to criminal investigation, prosecution, trial and execution of judgment;

5. The user information controller has sufficient evidence to show that the user information subject has subjective malice or abuses rights;

6. For the purpose of protecting the life, property and other major legal rights and interests of the user information subject or other individuals, but it is difficult to obtain the consent of the individual;

7. Responding to the request of the user information subject will cause serious damage to the legitimate rights and interests of the user information subject or other individuals or organizations;

8. Involving commercial secrets.

6. How do we handle children’s personal information?

We attach great importance to the protection of children's personal information. Our products, websites and services are mainly for adults. Although local laws and customs have different definitions of children, we regard anyone under the age of 14 as a child.

When collecting information about child users with the consent of their parents or guardians, we will only store, use or disclose this information when permitted by law, with the explicit consent of their parents or guardians, or when necessary to protect children. Otherwise, we will try to delete the relevant data as soon as possible.

Given the limitations of existing technology and business models, it is difficult for us to proactively identify children’s personal information. If you find that we have collected children’s personal information without their knowledge or without obtaining prior verifiable guardian consent, you can contact us in a timely manner and we will try to delete it promptly upon discovery. If we discover the aforementioned circumstances ourselves, we will also delete it promptly, unless we are required by law to retain it.

7. How is your user information stored and transferred globally

In principle, the user information we collect and generate within the territory of the People's Republic of China will be stored within the territory of the People's Republic of China. We will only retain your user information for the period required for the purposes and uses described in this policy and the shortest period required by laws and regulations. After the above retention period, we will delete your user information or anonymize it in accordance with the requirements of applicable laws and regulations. Unless otherwise provided by laws and regulations, or for the purpose of public interest, scientific and historical research, etc., or with your separate authorization and consent, we may need to retain relevant data for a longer period of time.

Because we provide products or services through resources and servers around the world, this means that, after obtaining your authorization and consent, your user information may be transferred to jurisdictions outside the country/region where you use the products or services, or be accessed from these jurisdictions.

Such jurisdictions may have different data protection laws or even no relevant laws. In such cases, we will ensure that your user information is adequately protected in the People's Republic of China. For example, we will ask for your consent to the cross-border transfer of user information, or implement security measures such as data de-identification before cross-border data transfer.

8. How to update this policy

Our Privacy Policy may change. We will not reduce your rights under this Privacy Policy without your explicit consent. We will post any changes to this Policy on this page.

For major changes, we will also provide a more prominent notice. Major changes referred to in this policy include but are not limited to:

1. Our service model has undergone major changes, such as the purpose of processing user information, the type of user information processed, and the way user information is used;

2. We have major changes in ownership structure, organizational structure, etc., such as changes in ownership caused by business adjustments, bankruptcy and mergers and acquisitions, etc.;

3. Changes in the main objects of user information sharing, transfer or public disclosure;

4. Your rights to participate in the processing of user information and the way in which they are exercised have undergone significant changes;

5. When our responsible department for handling user information security, contact information and complaint channels change;

6. When the user information security impact assessment report indicates a high risk.

We will also archive previous versions of this policy for your reference.

9. How to contact us

If you have any questions, comments or suggestions about this Privacy Policy, please contact us through the following means:

Email : support@svbony.com​​

Normally, we will respond within 7 days .

If you are not satisfied with our response, especially if our user information processing practices have harmed your legitimate rights and interests, you can also seek solutions through the following external channels: You can also file a complaint or report to the regulatory authorities in your area.