iKitbot Technology Privacy Policy


Last updated: May 20, 2025

Latest effective date: May 20, 2025  

This Privacy Policy (hereinafter referred to as “this Policy” ) applies to Shenzhen iKitbot Technology Co., Ltd. and its subsidiaries and affiliated companies (hereinafter referred to as “iKitbot Technology”, “the Company” or “we”) provided to customers (hereinafter referred to as “you”) through iKitbot Link, merchant management platform, APP, etc. We will introduce you to iKitbot Technology’s principles of personal information protection, the collection and processing methods of your personal information, general protection measures and mechanisms, and show you the basic standards and systematic construction of iKitbot Technology’s personal information protection.

We strive to present this policy in a concise, clear and easy-to-understand manner. iKitbot Technology is well aware of the importance of personal information to you and will do its best to protect the security of your personal information. We are committed to maintaining your trust in us and abiding by the following principles to protect your personal information: the principle of consistency of rights and responsibilities, the principle of clear purpose, the principle of selective consent, the principle of minimum sufficiency, the principle of ensuring safety, the principle of subject participation, the principle of openness and transparency, etc. At the same time, iKitbot Technology promises that we will take corresponding security protection measures to protect your personal information in accordance with the industry's mature security standards.

Before using our products, please read this policy carefully so that you can better understand our products and the services they provide, and make appropriate choices. Unless otherwise provided by laws and administrative regulations, you have the right to know and decide how we handle your personal information, and have the right to restrict or refuse us or other parties from processing your personal information; at the same time, you have the right to ask us to explain the personal information processing rules we provide to you. In order to make you fully aware of and understand our rules on how to handle your personal information, the scope of processing, and the consequences of processing, and as the basis for you to exercise relevant rights, we have specially written "1. Our basic rules for handling your personal information" to implement our statutory obligation to inform you. Based on this, we strongly recommend that you first read this part of the instructions carefully and make corresponding authorization consent based on a full understanding of the content of this policy.

If the product you choose to be delivered by iKitbot Technology adopts or includes a privately deployed system structure, that is, the product is deployed on a server owned or legally used by you, you are aware that all data collection, security measures and permission restrictions are under your independent control. Without your authorization, iKitbot Technology cannot access or obtain your data or the data you authorize to obtain.

You know and understand that the privately deployed iKitbot Technology products are of the same nature as your own system and are isolated from iKitbot Technology's data. Without your authorization and consent, iKitbot Technology will not and cannot access, collect, use, or control any information or data on privately deployed products and services, and therefore cannot assume risk responsibility for the compliance of the relevant data in your local privately deployed services.

When you authorize iKitbot Technology to use local data, iKitbot Technology will still use the local data you authorized in a data isolation environment.

If you have any questions, comments or suggestions, please contact us via customer service: +8618025397837.

This policy will help you understand the following:

1. Basic rules for our processing of your personal information

2. What information do we collect or process and how do we use it?

3. How we protect your personal information

4. Your rights

5. How we handle children’s personal information

6. Our protection of personal information of deceased users

7. How your personal information is transferred globally

8. How we update our privacy policy and applicable laws

9. How to Contact Us

1. Basic rules for our processing of your personal information

The important definitions in this policy are based on the relevant definitions in the Personal Information Protection Law and the Personal Information Security Specification (GB/T35273-2020). We have made relevant supplements based on our actual situation. If there are any inconsistencies, the provisions of the Personal Information Protection Law and the Personal Information Security Specification shall prevail. Please note that the core purpose of this section of the explanation is to guide you to fully understand and understand our rules on how to handle your personal information, the scope of processing, and the consequences of processing, so as to implement our statutory obligation to inform you. Based on this, we strongly recommend that you read this section of the explanation carefully and make authorization consent or express consent based on a full understanding of the content of the explanation.

1.1 Personal information: refers to various information related to an identified or identifiable natural person recorded electronically or otherwise. Such as personal telephone number, personal information subject account, IP address, unique device identification code, etc. Sensitive personal information: refers to personal information that, once leaked or illegally used, is likely to cause infringement of the personal dignity of a natural person or endanger personal or property safety, including biometrics, religious beliefs, specific identities, medical health, financial accounts, whereabouts and other information, as well as personal information of minors under the age of fourteen (or the age of minors stipulated by the laws of your jurisdiction). In this policy, if personal information is sensitive personal information, we will remind you in bold and obtain your separate consent. You should pay extra attention to the enumeration of such information. You can understand the types of personal information we process in what scenarios and for what purposes through the descriptions in the table listed in "2.1 Collection and Use of Personal Information". As for the services we provide to you, the scope of your personal information we process is as follows:

Types of Personal Information Personal information fields
Network identity information Account name/nickname, IP address
Personal browsing history Web browsing history, operation logs
Clipboard Information Clipboard contents
Personal frequently used device information Device identification code (SIM serial number, device serial number, device IMEI, ICCID, OAID), device model, system version, sensor information, device name
Personal location information Latitude and longitude based on device ip

1.2 Personal Information Processor: refers to an organization or individual that independently determines the purpose and method of processing personal information in personal information processing activities.

1.3 Processing: including the collection, storage, use, processing, transmission, provision, disclosure and deletion of personal information. For information on how we collect and use your personal information, please refer to "2. How we collect and use your personal information".

1.3.1 Collection: refers to the act of obtaining control over personal information and independently deciding the purpose and method of processing personal information, including "automatic collection" such as the personal information subject actively providing it to us, through our interaction with the personal information subject or recording the personal information subject's behavior, and "indirect acquisition" such as our receiving other personal information and/or collecting public information.

1.3.2 Use: We will explain in the table listed in "2.1 Collection and Use of Personal Information" the scenarios and purposes for which we will use your personal information, and list the corresponding legal reasons for processing so that you can understand the corresponding obligations we need to comply with. When we want to use the information collected for a specific purpose for other purposes, we will ask for your consent in advance or inform you of other legal reasons for processing. The "use" mentioned in this policy refers specifically to our processing of data to achieve data storage, access and display, aggregation and fusion, statistical analysis and other uses and utilization methods.

1.3.3 Preservation: refers to the act of recording personal information in electronic or non-electronic form in a medium that we can access and retrieve. For normal business needs, we will preserve the personal information required for the product within the retention period required for different legal processing reasons:

a) Personal information processed based on your authorization and consent will be kept from the date of collection until the purpose of processing is achieved, the user cancels/deletes all account information, or withdraws consent and the agreed cancellation period expires;

b) Personal information necessary for the conclusion or performance of a contract to which you are a party will be stored from the date of collection until the contract is fulfilled and the statute of limitations expires;

c) Personal information necessary for the performance of legal obligations will be stored from the date of collection until the legal obligations have been fulfilled and the statute of limitations has expired.

If laws, regulations, normative documents and regulatory provisions have different requirements for the above-mentioned retention periods, the requirements of laws, regulations, normative documents and regulatory provisions shall be complied with. In addition, for your personal information collected based on the products, we will be based on the permitted legal basis and exceptions and will comply with the requirements related to such transfer and storage under applicable laws. Your information may be processed on servers located outside the country/region where you reside. Regardless of where your information is processed, we will adopt the protection Personal information generated or collected by us is stored on servers that comply with the laws and regulations of your region or country. We will not provide any of your personal information to overseas entities if the conditions and procedures of laws, regulations, normative documents and regulatory provisions are not met.

1.3.4 Provision to others: refers to the activity where a personal information processor provides personal information to another personal information processor, and the recipient processes the personal information under the category, purpose and method of personal information that the personal information subject is informed of.

1.3.5 Entrusted processing: refers to the activity where a personal information processor entrusts a trustee to process personal information and supervises the trustee’s personal information processing activities. The trustee may only process personal information within the scope of the entrustment, and may not entrust others to process personal information without the consent of the personal information processor.

1.3.6 Anonymization: refers to the process by which personal information is processed so that it cannot identify a specific natural person and cannot be restored.

1.3.7 Affiliate: refers to an entity directly or indirectly controlled by Shenzhen iKitbot Technology Co., Ltd., or any company or legal entity under common control with Shenzhen iKitbot Technology Co., Ltd. "Entity" in this definition includes but is not limited to individuals, partnerships, companies and other legal entities.

2. What information do we collect or process and how do we use it?

We will follow the principles of legality, legitimacy and necessity to collect and process your personal information for the purpose of providing you with relevant products and services, and disclose it to you in a list form (see the example below). We will disclose to you the collection and use of your personal information as comprehensively, completely and promptly as possible. If you find any errors or omissions in our disclosure, please contact us through the contact information described in this policy.

2.1 Collection and Use of Personal Information

As products or services are iterated, expanded, and upgraded, the types of your personal information we collect and use will change. If the above situation occurs, we will explain it to you in detail by updating this policy and pop-up windows and pages in iKitbot Technology products, and seek your consent. In this service, the categories of personal information we need to collect and process for different processing purposes are listed below:

Basic functions:

Purpose of processing Lawful grounds for processing Types of Personal Information Sensitive personal information fields
Identification Analysis Authorization and Consent Web browsing history, operation logs Network authentication credentials
Customer Service and After-Sales Necessary for performance Account name/nickname, IP address

2.2 Collection and use of device permission information

In order to comply with laws, regulations, normative documents, regulatory requirements and ensure transaction security, as well as to achieve the purpose of collecting personal information, we need to apply for you to open the corresponding device access rights to us for the different business functions you have selected. If your system allows, we will pop up a window to explain the purpose and obtain your consent when the permission needs to be enabled. When you enable these permissions, it means that you authorize us to collect and process this information to achieve the corresponding functions. You can cancel the authorization through the relevant settings of the device, but after cancellation, we will not be able to provide you with the corresponding business functions. Such permissions that need to be enabled and their specific usage scenarios are listed in the following table:

Permission information Usage scenarios, purposes and reasons
Geolocation (location information) Used to configure the robot gateway configuration

2.3 How we use cookies and similar technologies

2.3.1 Use of Cookies and Similar Technologies

To meet your online experience needs and make your access experience easier, we will send one or more small data files called Cookies or similar technical files to your computer or mobile device. The Cookies assigned to you are unique and can only be read by the Web server in the domain that issued the Cookies to you. We send you Cookies to simplify your repeated login steps and help determine your login status and account or data security.

We will not use Cookies for any purpose other than those described in this Policy. You can manage or delete Cookies and clear all Cookies saved on your computer according to your preferences. Most web browsers automatically accept Cookies, but you can usually modify the browser settings to reject Cookies according to your needs. In addition, you can also clear all Cookies saved in the software, but if you do this, you may need to change the user settings yourself every time you visit, and your corresponding information previously recorded will also be deleted, and it may have a certain impact on the security of the services you use. For more information on how to change browser settings, please visit the relevant settings page of the browser you use.

2.3.2 Do Not Track

Many web browsers have a Do Not Track feature that allows you to send a Do Not Track request to a website. Currently, major Internet standards organizations have not established policies to dictate how websites should respond to such requests. However, if your browser has Do Not Track enabled, we will respect your choice.

2.4 Use of your personal information within iKitbot Technology

2.4.1 We will collect, integrate and jointly use all your information in the table listed in "2.1 Collection and Use of Personal Information" of this Policy within the scope of iKitbot Technology in accordance with iKitbot Technology's unified information security management requirements and operational control strategies. If the scope of our provision or the purpose of use by the recipient exceeds the description of this policy, the recipient who changes the purpose should obtain your consent again. You have the right to file a complaint with us or any affiliate that has collected and processed your personal information from you through the contact information described in this policy, or request us or any affiliate that has collected and processed your personal information from you to explain and respond to the company data sharing issues described in this article.

2.4.2 Your personal information may be shared and used within iKitbot Technology for the following processing purposes:

a) Create a unified login account, verify your identity within the company, unify identity authentication and enjoy corresponding rights and interests.

b) Work with affiliates to provide you with services or jointly implement the business functions of specific products.

c) Prevent security risks, conduct a comprehensive assessment of your personal information, tag information, etc. within the company, detect and prevent security risks (such as phishing websites, fraud, network vulnerabilities, computer viruses, network attacks, network intrusions, etc.), and more accurately identify violations of laws and regulations or product service-related agreement rules to protect the legitimate rights and interests of you, other users, us or our affiliates.

d) Identify, analyze and process the information within the company to form label information, which will be used for automated decision-making, operational support, academic research, notification and push notifications (including sending commercial advertisements and information push notifications to you) and improving products and services for related parties within the company.

e) Other purposes permitted by laws, regulations, normative documents and regulatory requirements and authorized by you.

2.4.3 We will control the security of data flow within iKitbot Technology through systems, agreements and technical means. At the same time, to ensure the security of data flow within iKitbot Technology, we will implement internal routine inspection measures and require all related parties within iKitbot Technology to strictly implement the company's information security management requirements and operational control strategies.

2.4.4 iKitbot Technology: To avoid ambiguity, for the purpose of this policy only, iKitbot Technology includes Shenzhen iKitbot Technology Co., Ltd. and its subsidiaries, and entities under common control with Shenzhen iKitbot Technology Co., Ltd.

2.5 Provision to third parties

2.5.1 We will not provide your personal information to third parties without the permission of laws, regulations, normative documents and regulatory requirements or other legitimate reasons for processing. We will only provide your personal information to third-party personal information processors for legal, legitimate, necessary, specific and clear purposes. We will sign relevant confidentiality agreements with the recipients in accordance with the law, requiring them to process personal information in accordance with the requirements of this policy and other necessary confidentiality and security measures. The situations in which we provide your personal information to third parties mainly include:

a) Entrusted processing: In order to realize the business functions of specific products, we will entrust external suppliers to assist us in providing you with relevant services. Under the entrusted processing method, the third party that receives personal information only has the right to provide you with services on our behalf according to our instructions, and we are responsible to you for its entrusted behavior within the scope of the entrustment. For example, we will entrust suppliers, service providers and other partners who support our business to provide us with technical infrastructure services (such as short message verification services), analyze the use of our services or potential risks, advertising services, transportation, warehousing, customs clearance, terminal collection and delivery, payment convenience, customer service, data storage or data analysis services, and third-party additional business function services (such as map functions).

b) External provision: In order to perform the agreement concluded with you or for other reasonable purposes, we may provide some of your personal information to third-party personal information processors. We will disclose it to you in accordance with the law. The third-party personal information processor that receives the personal information has the right to process the personal information within the scope of the processing purpose, processing method and personal information type that have been informed to you. If the recipient changes the original processing purpose or processing method, it shall obtain your consent again, unless otherwise provided by laws and regulations. For details on the information we provide to third parties, please see the following third-party sharing list.

We would like to remind you that if you authorize a third party to request us to provide all or part of your personal information in this service, you agree that we have the right to verify your identity and the authenticity of your authorization to the third party based on our own experience, and have the right to independently decide whether to agree or refuse to provide your aforementioned personal information, unless you make a separate instruction through the contact information described in this policy. For example, if you authorize a third-party financial institution to obtain your specific personal information from us, and the third party requests us to provide your personal information based on the authorization content, we will respond to the third party's request and provide it to it within the scope of your authorization.

c) Third-party SDK

We will connect to third-party personal information processors in the form of SDK and provide them with your personal information. If you refuse us to provide your relevant personal information to the corresponding affiliates and third-party processors, you will not be able to use the corresponding business functions. For details on the SDK we integrated, please refer to the following "Third-Party Information Sharing List" .

Third-party information sharing list:

Product/Type Third Party Company Name Purpose of Use Usage scenarios Sharing method Privacy Policy
Object storage Alibaba Cloud OSS(China)/AWS S3(Euro) Object Storage Upload pictures, videos,logs,ota packages and config files SDK collects data locally and does not involve shared data https://terms.aliyun.com/legal-agreement /terms/suit_bu1_ali_cloud/ suit_bu1_ali_cloud202107091605_49213.html ?spm=a2c4g.2705226.0.0.1e26638f6yt5yZ

2.5.2 To avoid ambiguity, you should be aware and understand that the relevant products may contain links to websites, applications, products and services operated by other independent third parties. We do not make any express or implied warranties for such third-party websites, applications, products and services. Such links are provided only for the convenience of users to browse the relevant pages. When you visit such third-party websites, applications, products and service links, we will provide your personal information to the third party based on your explicit authorization. You should pay attention to separately agree to the privacy policy or personal information protection terms provided to you by them. You should pay special attention to the SDKs independently accessed by such third-party websites and applications. The access party and the SDK provider shall bear joint responsibility for you. We and the providers of such third-party websites, applications, products and services shall each bear independent personal information protection responsibilities for you within the scope of legal provisions and mutual agreement.

2.6 Transfer

We will not transfer your personal information to any company, organization or individual, except in the following circumstances:

2.6.1 Transfer with explicit consent: We will transfer your personal information to other parties with your explicit consent;

2.6.2 If we need to transfer personal information due to merger, division, dissolution, or bankruptcy, we will inform you of the name or name and contact information of the recipient and require the recipient to continue to be bound by this Policy. If the recipient changes the original processing purpose or processing method, we will require the recipient to obtain your consent again.

2.7 Public Disclosure

We will only disclose your personal information in the following circumstances:

2.7.1 After obtaining your separate consent;

2.7.2 Disclosure based on law: We may disclose your personal information publicly when required by law, legal process, litigation or government authorities.

2.8 Collection, processing and use of non-personal information

We may also collect other information that cannot identify a specific individual (i.e., information that is not personal information). For non-personal information, we will not ask you to register an account, nor will we collect your name, contact information, ID number, or other information that can directly identify an individual. The purpose of collecting or processing such information is to improve the services we provide to you. The type and amount of information we collect will depend on how you use our products and/or services.

• We recommend that you read the privacy policies of the above services to understand how they handle data.

3. How we protect your personal information

3.1 We have used security measures that meet industry standards to protect the personal information you provide and prevent the data from being accessed, used, modified, disclosed, damaged or lost without authorization. We will take all reasonable and feasible measures to protect your personal information. For example, we will use encryption technology to ensure the confidentiality of data; we will use trusted protection mechanisms to prevent data from being maliciously attacked; we will deploy access control mechanisms to ensure that only authorized personnel can access personal information; and we will hold data security and privacy protection training courses to enhance employees' awareness of the importance of personal information protection.

3.2 Our data security capabilities: iKitbot Technology has established an information security department to build a complete and advanced data security protection system for iKitbot Technology's products, including classification and grading of user information, encrypted storage, and data access permission control; formulated internal data management systems and operating procedures, with strict process requirements for data collection, use, deletion or anonymization to prevent user privacy data from being illegally used; determined the security management responsibilities of each department and its responsible person who has access to user personal information; established a workflow and security management system for the collection and use of user personal information and related activities; implemented authority management for staff and dealers, and reviewed batch query, modification, copying, export, and deletion of personal information, and took anti-leakage measures; properly kept paper media, optical media, electromagnetic media and other carriers that record user personal information, and took corresponding security storage measures; conducted access review on information systems that store user personal information, and took intrusion prevention, virus protection and other measures; recorded information such as personnel, time, place, and matters that operated on user personal information; regularly held data security and privacy protection training to enhance employees' awareness of personal information protection.

3.3 We will take all reasonable and feasible measures to ensure that no irrelevant personal information is collected. We will only retain your personal information for the period required to achieve the purposes stated in this policy, unless the retention period needs to be extended or is permitted by law. When the above retention period is exceeded, we will delete or anonymize your personal information within a reasonable period of time. (“Anonymization” in this Privacy Policy refers to the process of technically processing personal information so that the subject of personal information cannot be identified and the processed information cannot be restored. Information obtained after anonymization does not constitute personal information.)

3.4 Before we stop providing products or services, we will notify you of the cessation of provision by reasonable means such as announcements and push notifications. When we stop providing products or services, we will promptly stop collecting your personal information and delete or anonymize your personal information within a reasonable period of time. The Internet environment is not 100% secure, and we will do our best to ensure or guarantee the security of any information you send to us. If our physical, technical or management protection facilities are damaged, resulting in unauthorized access, public disclosure, tampering or destruction of information, thereby damaging your legal rights and interests, we will bear the corresponding legal liability.

3.5 In the unfortunate event of a personal information security incident, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, suggestions for you to prevent and reduce risks on your own, and remedial measures for you, etc. We will promptly inform you of the relevant circumstances of the incident by email, letter, telephone, push notification, etc. When it is difficult to inform the subject of personal information one by one, we will take reasonable and effective means to issue an announcement.

At the same time, we will proactively report the handling of personal information security incidents in accordance with the requirements of regulatory authorities.

If you find that your personal information has been leaked, please contact us immediately through the contact information described in this policy so that we can take appropriate measures in a timely manner.

4. Your rights

In accordance with the common practices of relevant EU laws, regulations, and standards, we will strive to protect your rights in our personal information processing activities, including but not limited to:

4.1 Access, copy and transfer of your personal information

4.1.1 You have the right to log in to the iKitbot Technology-related websites and apps you have registered through your iKitbot Technology account to view and copy your relevant personal information, except for exceptions stipulated by laws and regulations. Where technically feasible, we will provide you with the function of exporting relevant personal information by yourself. Please note that due to current legal and regulatory requirements and/or our technical capabilities, some personal information cannot be exported by yourself. Please refer to the prompts on the export interface for specific exportable personal information.

4.1.2 You have the right to obtain a copy of your personal information or request us to transfer your personal information to a third party designated by you. You can contact us at any time through the contact information of the personal information protection department disclosed in Article 9 of this Policy [privacy@ikitbot.com] and make your request. We will complete the processing and reply to you within fifteen working days. The types of personal information that can be obtained or transferred to a third party designated by you include: personal account, email contact information.

If you are unable to review, copy or transfer such personal information through the above-mentioned paths, you may contact us at any time through the contact information described in this Policy. We will complete the processing and respond to your review, copy and transfer request within fifteen working days, and provide the corresponding transfer path when the transfer conditions meet the conditions stipulated by the national cyberspace administration.

4.2 Correction and supplementation of your personal information

4.2.1 If you find that your personal information is inaccurate or incomplete, you have the right to correct and supplement it in the following ways: You can contact your dealer to revise the information.

4.3 Deleting your personal information

4.3.1 In the following circumstances, if we do not proactively delete your personal information, you may request us to delete your personal information through the contact information described in this Policy:

a) the purposes of the processing have been achieved, cannot be achieved or are no longer necessary for the achievement of the purposes of the processing;

b) We stop providing products or services, or the shelf life has expired;

c) you withdraw your consent;

d) We process your personal information in violation of laws, administrative regulations or agreements;

e) Other circumstances stipulated by laws and administrative regulations.

4.3.2 For some of your personal information, you can contact your dealer to delete your account and information.

4.3.3 When you delete information from our services, we may not immediately delete the corresponding information from the backup system, but we will delete the information when the backup is updated.

4.3.4 If the retention period prescribed by laws and administrative regulations has not expired, or it is technically difficult to delete personal information, we will stop processing it except for storage and taking necessary security protection measures.

4.4 Change the scope of your authorization or withdraw your authorization

4.4.1 Each business function requires some basic personal information to be completed. After you withdraw your consent, the corresponding business function will no longer be available. For some of your personal information, you can withdraw your consent on the relevant function page of the product service. Specifically:

You can withdraw your consent to the terms by checking the box on the login page.

4.4.2 If you have other requests to withdraw consent that cannot be realized, you can send us a notice to change the scope of the authorized consent through the contact information described in this policy.

4.4.3 After you withdraw your consent, we will no longer process the corresponding personal information. However, your decision to withdraw your consent will not affect the previous processing of personal information based on your authorization.

4.4.4 In particular, if you do not want to receive commercial marketing information from us, you can unsubscribe by replying to the unsubscribe method clearly stated in the marketing email or SMS or contact us through the contact information described in this Policy.

4.5 Personal Information Subject Cancelling Account

You can contact your dealer, who can cancel your account through the merchant management function. Or you can contact customer service to cancel your account and contact information. We will complete the processing and respond within 15 working days.

4.6 Constraint Information System Automatic Decision Making

4.6.1 In certain business functions, such as the login environment detection function, we may make decisions based solely on non-manual automatic decision-making mechanisms including information systems, algorithms, etc. This decision may significantly affect your legal rights and interests. You have the right to request us to make an explanation through the contact information described in this policy, and you have the right to refuse us to make a decision solely through automated decision-making. We will provide appropriate relief to protect your legal rights, such as explaining to you the logic of automated decision-making and the related impact on you, or introducing manual review to verify the correctness of the automated decision-making results.

4.7 Responding to your above requests

4.7.1 For security reasons, you may need to provide a written request or prove your identity in other ways. We may ask you to verify your identity before processing your request.

4.7.2 We will process and respond to your request within fifteen working days. If you are not satisfied with our response, you can also complain to us through the contact information stated in this policy.

4.7.3 In principle, we do not charge any fees for your reasonable requests, but we will charge a certain cost fee for repeated requests that exceed reasonable limits. We may reject requests that are unreasonably repeated, require too many technical means (for example, require the development of new systems or fundamentally change existing practices), pose risks to the legitimate rights and interests of others, or are extremely impractical.

4.7.4 In the following circumstances, we will be unable to respond to your request in accordance with laws and regulations:

a) Related to the personal information processor’s performance of obligations prescribed by laws and regulations;

b) directly related to national security and national defense security;

c) Directly related to public safety, public health, and major public interests;

d) Directly related to criminal investigation, prosecution, trial and execution of judgment;

e) The personal information processor has sufficient evidence to show that the personal information subject has subjective malice or abuses his rights;

f) For the purpose of protecting the life, property and other major legitimate rights and interests of the personal information subject or other individuals, but it is difficult to obtain the consent of the individual;

g) Responding to your request will cause serious damage to the legitimate rights and interests of the personal information subject or other individuals or organizations;

h) Involving trade secrets.

5. How we handle children’s personal information

5.1 When you browse our products without logging in, we will only collect personal current device status information and necessary personal commonly used device information during your use of specific products. Due to the limitations of existing technology, we cannot determine whether you are a child under the age of 14 (or the age of a minor as stipulated by the laws of your jurisdiction), but we will use such information strictly within the scope of your authorization and consent, and protect your personal information in accordance with the commitments of this policy.

5.2 If we find that we have collected personal information of a minor under the age of 14 (or the age of a minor as stipulated by the laws of your jurisdiction) without verifiable parental or guardian consent, we will try to delete the relevant data as soon as possible.

6. Our protection of personal information of deceased users

6.1 After the death of a user (natural person only), his/her immediate family members may, for their own legal and legitimate interests, exercise the rights to review, copy, correct, delete, etc. the relevant personal information of the deceased user through the contact information described in this Policy, unless the deceased user has made other arrangements during his/her lifetime.

6.2 You understand and confirm that in order to fully protect the personal information rights of deceased users, the close relatives of deceased users who apply to exercise the rights in this article need to submit the deceased user's identity document, death certificate, applicant's identity document, and documents proving the relationship between the applicant and the deceased user according to the designated process of iKitbot Technology or customer service prompts, and provide the type and purpose of the rights applied for. You can call the customer service contact number +86 400-0826-660 or use the contact information described in this policy to obtain more information about the personal information protection process, conditions, and other matters of deceased users.

7. How your personal information is transferred globally

7.1 In principle, personal information we collect and generate will be stored within the assigned servers in accordance with the requirements of applicable laws.

7.2 We will only provide your personal information overseas for the purpose necessary to perform our contract with you or for other legitimate processing reasons, and we promise to meet the conditions required by current laws and regulations.

7.3 If, in accordance with applicable laws, we need to comply with the data protection laws of other countries or regions to protect your personal information, we will also make corresponding compliance safeguards and adjustments.

8. How we update our privacy policy and applicable laws

8.1 Our Privacy Policy may change. Without your explicit consent, we will not reduce your rights under this Policy. We will publish an updated version of this Policy.

8.2 For major changes, we will also provide more prominent notices (including pop-up notifications or message notifications; for some services, we may send notifications via email).

8.3 Major changes to this Policy include but are not limited to:

8.3.1 Our service model undergoes major changes, such as the purpose of processing personal information, the type of personal information processed, and the way personal information is used;

8.3.2 We have major changes in our ownership structure, organizational structure, etc. Such as changes in ownership caused by business adjustments, bankruptcy and mergers and acquisitions, etc.;

8.3.3 The main recipients of personal information provided, transferred or disclosed have changed;

8.3.4 There are significant changes in your rights to participate in the processing of personal information and how to exercise them;

8.3.5 When our responsible department for handling personal information security, contact information and complaint channels change;

8.3.6 When the personal information security impact assessment report indicates that there is a high risk.

8.4 We will also archive old versions of this Policy for your reference.

8.5 If you want to know the privacy policies of your countries/regions where our business extends, please refer to the relevant privacy protection documents in Article, please refer to the relevant privacy protection documents in Article 7.3 of this Policy.

8.6 The formulation, execution, interpretation and dispute resolution of this Policy shall be subject to the laws of the regions and countries where our products are used and employed, excluding the applicable conflict of laws.

9. How to Contact Us

9.1 If you have any questions, comments or suggestions, you can contact our delivery and service team or our department responsible for personal information protection in the following ways. Generally, we will complete the processing and respond within fifteen working days.

Company Name: Shenzhen iKitbot Technology Co., Ltd.

Registered address: Nanshan District, Shenzhen City (Guangdong Province, China)

Common office address: C510, Phase 1, Huafeng Robot Industrial Park, Bao'an District, Shenzhen

Customer service contact: market@ikitbot.com

Contact information for the department responsible for personal information protection: privacy@ikitbot.com

9.2 You have the right to contact us and file a complaint through the methods disclosed in Section 9.1 of this Policy. We will complete the processing and respond within fifteen working days from the date of receipt of your complaint. If you are not satisfied with our response, especially if you believe that our personal information processing behavior has damaged your legitimate rights and interests, you can also complain or report to the Internet Information Office, the Public Security Bureau, the Industry and Commerce Bureau and other regulatory authorities, or file a lawsuit with the Nanshan District People's Court of Shenzhen or other courts with jurisdiction.