HelloNav Privacy Policy

Updated: January 24, 2026
Effective Date: January 24, 2026
Version Number: V 1.0

Introduction

Shaoxing Yunlong Information Technology Co., Ltd. (hereinafter referred to as "we", "us" or "our") is well aware of the importance of personal information to you, and we will take corresponding security protection measures in accordance with the requirements of the Personal Information Protection Law of the People's Republic of China, the Cybersecurity Law of the People's Republic of China, the Data Security Law of the People's Republic of China and other laws and regulations to protect your personal information safe and controllable.

Before you use the HelloNav App (hereinafter referred to as the "App"), please be sure to carefully read and fully understand this Privacy Policy, especially the terms in bold. This Privacy Policy will help you understand:

(1) How we collect and use your personal information

(2) How we use cookies and similar technologies

(3) How we share, transfer, and publicly disclose your personal information

(4) How we protect your personal information

(5) Your rights

(6) How we handle the personal information of minors

(7) How your personal information is transferred globally

(8) How this Privacy Policy is updated

(9) How to contact us

If you do not agree with any of this Privacy Policy, please stop using our Services immediately. When you click the "Agree" button or start using this application, it means that you have fully read, understood, and agreed to the entire content of this Privacy Policy.

Part I: Definitions

For your convenience, the following are definitions of key terms used in this Privacy Policy:

(1) Personal information: All kinds of information related to identified or identifiable natural persons recorded electronically or by other means, excluding anonymized information.

(2) Sensitive personal information: Personal information that, once leaked or illegally used, can easily lead to infringement of the personal dignity of natural persons or endangerment of personal and property safety, including biometrics, religious beliefs, specific identities, medical and health care, financial accounts, whereabouts and other information, as well as personal information of minors under the age of 14.

(3) Handling of personal information: including the collection, storage, use, processing, transmission, provision, disclosure, deletion, etc. of personal information.

(4) Device information: Information on the hardware device you use, including device model, operating system version, device identifier, etc.

(4) Log information: When you use this application, the system automatically collects technical information, including your browsing, searching, clicking, access time, access duration, usage frequency, etc.

(5) De-identification: the process of technical processing of personal information so that it cannot identify a specific natural person without the help of additional information.

(6) Anonymization: The process of making the personal information subject unidentified through the technical processing of personal information, and the processed information cannot be restored.

Part II: Privacy Policy

1. How we collect and use your personal information

We will follow the principles of legitimacy, lawfulness, necessity and good faith to collect and use your personal information for the following purposes described in this Privacy Policy.

1.1 Registration, Login, and Account Management

(1) Function description

You can choose not to register an account and use the basic obstacle avoidance function of this application directly. If you wish to use the account-related features, you need to register and log in to your account and agree to the collection of the following information.

Type of information

Purpose of collection

Is it necessary?

Legal basis

Mobile phone number

Account registration, login verification, password recovery, security guarantee

is

Necessary for the performance of the contract

SMS verification code

Verify user identity

is

Necessary for the performance of the contract

nickname

Personalized display and account identification

Nope

User Consent

avatar

Personalized display

Nope

User Consent

(2) Information collected

(3) Usage mode

Mobile phone numbers are used to create your account, identify your identity, and ensure account security

When you need to retrieve your password, we'll send a verification code to your mobile number

The nickname and avatar will be displayed on your profile and in some features

(4) Consequences of refusal to provide

If you refuse to provide your mobile phone number, you will not be able to register an account and use the corresponding functions of bat avoidance.

1.2 Obstacle avoidance function

(1) Function description

This is the core function of this application, when using this function, we will capture the image in real time through the mobile phone camera, use computer vision technology to identify obstacles, stairs, hanging objects, pits, etc., and prompt the user through sound.

(2) Information collected

Type of information

Purpose of collection

Is it necessary?

Treatment

Legal basis

Camera image

Real-time identification of obstacles, stairs, hanging objects, traffic lights, etc.; Image analysis

is

partially processed locally on the device; The image analysis function needs to be uploaded to a server or a third-party AI service

Performance of the contract is required/explicitly agreed by the user

Device sensor data

Assists in judging the posture and movement status of the equipment

is

Local processing

Necessary for the performance of the contract

(3) Special instructions

Important: How camera information is processed

We place special emphasis on the following, so please be aware of it:

a) Functions of local processing:

Obstacle avoidance: Real-time obstacle recognition occurs locally on your device, and data is not uploaded

Traffic Light Recognition: Real-time traffic light recognition is processed locally on the device, and images are not uploaded

Stair Recognition: Stair and ramp recognition is done locally on the device, and images are not uploaded

The image of the above functions is deleted immediately after processing and will not be saved on the device

b) Features that need to be uploaded:

Image Analysis Function: When you actively use the image analysis function, the images you capture or select will be uploaded to our servers or third-party AI service providers (such as large language model API providers) for in-depth analysis to identify complex information such as image content, objects, and scenes.

Upload Instructions: Images will only be uploaded if you are actively using the image analysis feature, and we will let you know clearly before uploading

Data processing: The uploaded images are only used for this analysis, and will be deleted after the analysis is completed and will not be used for other purposes

Third-party services: We may use third-party AI services (such as Baidu, Alibaba Cloud, Tencent Cloud, etc.) for image analysis, and these service providers will process your image data in accordance with their privacy policies

d) No sharing:

Your camera images will not be shared with other third parties except for uploads required for image analysis functions, and we will not use your images for advertising, promotion, or other commercial purposes.

(4) Use of permissions

Camera permission is necessary to use the core functionality of this app. If you refuse to grant camera permissions, you will not be able to use the following features:

  1. Obstacle avoidance function
  2. Intelligent analytics
  3. Traffic light recognition function
  4. Stair recognition function

However, it does not affect the use of other functions such as map navigation and address book management.

(5) Consequences of refusal to provide

If you refuse to provide camera permissions, you will not be able to use the core functions that require the camera, such as intelligent obstacle avoidance, image analysis, and traffic light recognition.

1.3 Map navigation function

(1) Function description

When you use this function, this app collects the following information to provide you with location-based map navigation, route planning, destination search, neighborhood query, and other services.

(2) Information collected

Type of information

Purpose of collection

Is it necessary?

whether it is sensitive

Legal basis

Location information (GPS, base station, WiFi)

Map navigation, path planning, location annotation

is

Yes (Track)

The user expressly agrees

Search history

Provide search suggestions and optimize services

Nope

Nope

User Consent

Navigation history

Provide historical routes, common places

Nope

is

User Consent

(3) Usage mode

  1. Get your current location, displayed on the map
  2. Plan navigation routes based on your location and destination
  3. Search for places, facilities near you
  4. Provides real-time traffic information
  5. Get alerts when you arrive at your destination

(4) Special instructions

Location information is sensitive personal information (whereabouts) and we need your explicit consent to collect and use it. You can turn off location permissions at any time in the system settings, but this will prevent you from using the navigation feature We will send your location. Information is provided to third-party map service providers (Amap) to provide navigation services We do not record or store your complete location trajectory for other purposes, and you can clear your search history and navigation history at any time.

(5) Consequences of refusal to provide

If you refuse to provide location information or turn off location permissions, you will not be able to use the map navigation function, but it will not affect the use of the obstacle avoidance function.

1.4 Intelligent analysis function

(1) Function description

Allows you to take photos and save them to your device's album, recording important scene information. When using this feature, the app collects the following information:

(2) Information collected

Type of information

Purpose of collection

Is it necessary?

Legal basis

Camera permissions

Take a photo

is

User Consent

Album storage permissions

Save photos to albums

is

User Consent

Photo (with metadata such as location, time, etc.)

Records that are actively saved by the user

Nope

User Consent

(3) Usage mode

We do not automatically upload, access, or use photos from your album only when you actively tap the photo button

(4) Consequences of refusal to provide

If you refuse to grant permission to the camera or album, you will not be able to use the photo function, but it will not affect the use of obstacle avoidance and navigation functions.

1.5 Address book management function

(1) Function description

Provide you with convenient contact management and quick calling features. When using this feature, the app collects the following information:

Type of information

Purpose of collection

Is it necessary?

whether it is sensitive

Legal basis

Address book information (name, phone number)

Address book management, quick calling

Nope

Nope

The user expressly agrees

(2) Information collected

(3) Usage mode

Read your address book information to provide contact management functions, which are only stored locally on your device and will not be uploaded to the server for quick calls, emergency contact settings, and other functions.

(4) Consequences of refusal to provide

If you refuse to grant Contacts permission, you will not be able to use the Contacts Management function, but it will not affect the use of other features.

1.6 Device Information and Log Information

(1) Information collected automatically

In order to ensure the normal operation of the service, optimize the user experience, and improve the quality of the service, we automatically collect the following information:

Type of information

Purpose of collection

Is it necessary?

Legal basis

Device model, OS version

Adapt to different devices and optimize performance

is

Legitimate interests

Device identifier

Device identification, statistical analysis

is

Legitimate interests

IP address

Network connection, security protection

is

Legitimate interests

App version number

Version management and feature adaptation

is

Legitimate interests

Network type

Optimize network requests

is

Legitimate interests

Apply crash information

Fault diagnosis and stability improvement

Nope

User Consent

Usage statistics (number of times and duration of function use)

Optimize product functionality

Nope

User Consent

(2) Usage

  1. Identify your device and provide services that are compatible with your device
  2. Analyze app usage to optimize product features and user experience
  3. Diagnose and fix application failures to improve application stability
  4. Perform security protection to identify abnormal access and malicious attacks
  5. Generate anonymized statistics for data analysis

(3) Anonymization

After anonymizing device information and log information, it is used for statistical analysis, machine learning model training, etc., and the anonymized information cannot identify the identity of a specific natural person.

1.7 Other Features

(1) Message push and notification, when using this function, this application will collect the following information:

Type of information

Purpose of collection

Is it necessary?

Legal basis

Notification permissions

Send important reminders, service notifications

Nope

User Consent

Device push logo

Implement the message push function

Nope

User Consent

We will send you service-related notices, including but not limited to:

  1. Account security reminder
  2. Version update notifications
  3. Important feature change notices

You can manage notification permissions in system settings or app settings.

(2) Customer service and feedback

When you contact our customer service or submit feedback, we may need to collect your contact information (phone number or email), feedback content, call recordings, or chat records in order to respond to your requests in a timely manner and improve our services.

1.8 Exceptions to Authorized Consent

According to relevant laws and regulations, we do not need to obtain your authorization and consent to collect and use your personal information under the following circumstances:

  1. It is necessary for the conclusion and performance of a contract to which you are a party
  2. It is necessary to perform statutory duties or obligations
  3. It is necessary to respond to public health emergencies or to protect the life, health and property safety of natural persons in an emergency
  4. Conduct acts such as news reporting and public opinion monitoring for the public interest, and handle personal information within a reasonable range
  5. Process your personal information disclosed by yourself or other legally disclosed personal information within a reasonable scope in accordance with the law
  6. Other circumstances stipulated by laws and administrative regulations

Please understand that the features and services we provide to you are constantly updated and evolving. If a function or service does not collect your information in the above description, we will explain the content, scope, and purpose of information collection to you through page prompts, interactive processes, website announcements, etc., to obtain your consent.

2. How we use cookies and similar technologies

2.1 Cookie

To ensure that the App works properly, to make your experience easier, and to optimize product functionality, we may store cookies, Flash cookies, or other local storage provided by your browser (or associated application) that typically contains identifiers, site names, and some numbers and characters (collectively, "Cookies").

(1) Purpose of cookies

  1. Remember your login status and avoid repeated logins
  2. Remember your preferences (volume, speech rate, sound effects, etc.)
  3. Analyze your use of our services to optimize product functionality
  4. Keep your account and transactions safe
  5. Statistics on app usage

(2) Management of cookies

Most browsers and mobile devices offer settings that allow you to clear the cookies that apps store on your device. However, this may affect your use of certain features of our Services.

2.2 Similar technologies

In addition to cookies, we may use other similar technologies such as web beacons and pixel tags in our applications. For example, we may use these technologies to count app page visits, record user behavior, etc., to improve our services.

The information collected by these technologies is usually de-identified or anonymized and is not associated with your other personal information.

3. How we share, transfer, and publicly disclose your personal information

3.1 Sharing

We will not share your personal information with any company, organization, or individual other than the Company, except in one or more of the following circumstances:

(1) Obtain your explicit consent in advance

(2) In accordance with laws and regulations or mandatory administrative and judicial requirements

We may share your personal information in accordance with laws and regulations, litigation, dispute resolution needs, or as required by administrative and judicial authorities in accordance with law.

(3) Sharing with affiliated companies

Your personal information may be shared with our affiliates to facilitate our services to provide you with services based on this application, identify account anomalies, and protect the personal and property safety of our affiliates or other users or the public from being infringed. We will only share personal information as necessary for the purposes of this Privacy Policy statement. If the affiliate wants to change the purpose of processing personal information, it will ask for your authorization and consent again.

(4) Share with partners

In order to provide you with complete products and services, some of our services will be provided by partners. We may share certain of your personal information with our partners to provide better customer service and user experience. We will only share your personal information for legal, legitimate, necessary, specific and explicit purposes, and only share personal information necessary to provide services.

Currently, our partners include the following types:

a) Map service providers

Partner: AutoNavi Software Co., Ltd

Shared information: location information (latitude and longitude), destination information

Purpose of use: Provide map display, route planning, and navigation services

Privacy Policy: https://lbs.amap.com/pages/privacy/

b) Application performance monitoring service providers

Partner: Tencent Bugly

Shared information: device information, app crash logs, performance data

Purpose of use: Application stability monitoring, fault diagnosis

Privacy Policy: https://privacy.qq.com/

c) Data statistical analysis service providers

Partner: Youmeng + (Beijing Ruixun Lingtong Technology Co., Ltd.)

Shared information: device information, app usage statistics (anonymized)

Purpose of use: statistical analysis, user behavior analysis

Privacy Policy: https://www.umeng.com/page/policy

d) AI image analysis service providers

Partners: Mainstream large language model API service providers in China (may include but are not limited to Baidu Intelligent Cloud, Alibaba Cloud, Tencent Cloud, Huawei Cloud, etc.)

Shared information: Images uploaded when you actively use the image analysis feature

Purpose of use: Use large language models for in-depth analysis such as image content recognition, scene understanding, and object detection

Data processing: Images are uploaded only when you actively use the image analysis function, and the images are only used for this analysis request, and are deleted immediately after the analysis is completed. AI service providers process your images in accordance with their privacy policies and data security commitments, and we will not use your images for model training or other purposes

Privacy Policy: Please refer to the official website of the specific service provider's privacy policy

We will sign strict confidentiality agreements with our partners and require them to handle personal information in accordance with this Privacy Policy and other relevant confidentiality and security measures. Our partners are not authorized to use the shared personal information for any other purpose.

(5) Sharing for the realization of specific functions

When you use certain functions that require a third party to provide (such as sharing to social platforms), we will share the information necessary to implement the function with the third party with your consent.

3.2 Assignment

We will not transfer your personal information to any company, organization, or individual, except in the following circumstances:

(1) Obtain your explicit consent in advance

(2) Business merger, acquisition or bankruptcy liquidation

If it involves the transfer of personal information, we will require the new company or organization that holds your personal information to continue to be bound by this Privacy Policy, otherwise we will require the company or organization to ask you for authorization and consent again.

3.3 Public Disclosure

We will not publicly disclose your personal information except in the following circumstances:

(1) After obtaining your explicit consent

(2) Disclosure based on law

We may publicly disclose your personal information in the event of law, legal process, litigation, or mandatory requirements from government authorities.

3.4 Exceptions to prior authorization and consent when sharing, transferring, or publicly disclosing personal information

According to laws and regulations, the sharing, transfer, and public disclosure of your personal information do not require prior authorization and consent under the following circumstances:

  1. It is directly related to national security and national defense security
  2. It is directly related to public safety, public health, and major public interests
  3. It is directly related to criminal investigation, prosecution, trial, and judgment enforcement
  4. It is difficult to obtain the consent of the person to protect the life, property and other major legitimate rights and interests of you or other individuals
  5. Personal information that you disclose to the public
  6. Collecting personal information from legally publicly disclosed information, such as legal news reports, government information disclosure, and other channels.

4. How we protect the security of your personal information

4.1 Safety protection measures

(1) Technical measures

We have taken reasonable and feasible security measures in line with industry standards to protect your personal information from unauthorized access, public disclosure, use, modification, damage, or loss. For example:

Data encryption: HTTPS encryption protocol is used to transmit sensitive information and encrypt stored sensitive data

Local processing: Camera images are only processed locally on the device and are not uploaded to the server

Access control: Establish a strict data access control mechanism and implement the principle of least authorization

Isolation technology: Data for different services is stored separately through network isolation and permission control

Security Audits: Conduct regular security audits, vulnerability scans, and penetration testing

Security training: Regularly conduct data security training for employees and sign confidentiality agreements

(2) Management measures

  1. Establish data security management systems and operating procedures
  2. Set up a dedicated data security department and data security leader
  3. Authenticate employees and manage permissions
  4. Establish a data security emergency response mechanism
  5. Sign confidentiality agreements with third parties that process personal information

(3) Safety certification

We have passed the national information security level protection certification and meet the requirements of relevant standards.

4.2 Security incident handling

(1) Emergency response

Although we have taken the above reasonable and effective measures and have complied with the standards required by relevant laws, please understand that due to technical limitations and possible malicious means, it is not always possible to guarantee 100% security in the Internet industry, even if we try our best to strengthen security measures.

In the unfortunate event of a personal information security incident, we will notify you in a timely manner in accordance with the requirements of laws and regulations:

  1. The basic situation and possible impact of the security incident
  2. Disposal measures that we have taken or will take
  3. Recommendations for your own prevention and risk mitigation
  4. Remedies for you

(2) Notification method

We will keep you informed in the following ways:

  1. In-app notifications, pop-up prompts
  2. Send an SMS to your registered mobile number
  3. Send an email to your registered email address
  4. Make an announcement on the official website

If it is difficult to inform the personal information subjects one by one, we will make a reasonable and effective announcement. At the same time, we will also take the initiative to report the handling of personal information security incidents and cooperate with relevant departments to investigate and deal with them.

(3) Event traceability

We will review and analyze security incidents to find out the causes, improve security measures, and prevent similar incidents from happening again.

4.3 Your Security Responsibilities

Please be aware and understand that the security of the personal information you provide when using our products and services also requires your cooperation. Please protect your personal information properly and provide it to others only when necessary.

If you find that your personal information, especially your account or password, has been leaked, please contact us immediately through the contact information provided in this Privacy Policy so that we can take corresponding measures, otherwise you will be responsible for it. Please do not share your password with others, and all losses caused by poor password storage shall be borne by the user.

5. Your rights

In accordance with relevant laws, regulations and regulatory provisions in China, we protect you from exercising the following rights regarding your personal information:

5.1 Access to your personal information

You have the right to access your personal information, except in exceptional cases provided by laws and regulations.

(1) Access to account information

You can view and access your personal information in the following ways:

Go to the "My" - "Personal Information" page to view and edit your nickname, avatar and other information

Go to the "My" - "Settings" page and view your mobile phone number and account information

(2) Access to other information

If you wish to access or obtain other personal information generated in the course of your use of our services, please contact us using the contact information provided in this Privacy Policy. We will provide you within 15 working days after verifying your identity.

5.2 Correction of your personal information

You have the right to request correction when you discover that there is an error in the personal information we process about you.

You can correct your personal information yourself by setting out in "5.1 Access to Your Personal Information" or by contacting us using the contact information provided in this Privacy Policy.

5.3 Deletion of your personal information

You can request deletion of your personal information from us in the following circumstances:

  1. If our handling of personal information violates laws and regulations
  2. If we collect and use your personal information without your consent
  3. If we process personal information in violation of our agreement with you
  4. If you no longer use our products or services, or if you cancel your account
  5. If we no longer provide you with a product or service

(1) Deletion method

You can delete your personal information in the following ways:

  1. Delete your search history, navigation history, etc. on the corresponding feature page
  2. Request deletion of your personal information by contacting us

(2) Consequences of deletion

When you delete information from our Services, we may not immediately delete the corresponding information from the backup system, but we will delete it when the backup is updated.

5.4 Withdrawal of Authorization Consent

Each business function requires some basic personal information to complete. You can withdraw your consent at any time for additional personal information collected.

(1) Withdrawal method

You can withdraw your authorization in the following ways:

Turn off system permissions: In the iOS system settings, find this app and turn off the corresponding permissions (such as camera, location, contacts, etc.).

In-app settings: In "My" - "Settings" - "Privacy Settings", manage the turn on status of various permissions

Cancel your account: Permanently withdraw all authorizations by canceling your account

(2) Consequences of withdrawal

After withdrawing your authorization and consent, we will no longer process your personal information. However, your decision to withdraw your consent will not affect the validity of the personal information processing activities previously carried out based on your authorization.

Please note that revoking certain permissions may prevent you from continuing to use the corresponding features.

5.5 Cancel your account

You have the right to cancel your account.

(1) Cancellation method

You can request to cancel your account in the following ways:

Submit a cancellation request in "My" - "Cancel Account"

Send an email to zjsmartcloud@hotmail.com to request cancellation

(2) Cancellation conditions

Before you cancel your account, we will verify your personal identity, security status, device information, etc. You know and understand that the act of canceling your account is irreversible, and we will delete or anonymize your personal information after you cancel your account, unless otherwise stipulated by laws and regulations or otherwise required by regulatory authorities.

Before canceling your account, make sure you meet the following conditions:

  1. No outstanding services or transactions on the account
  2. There are no disputes about the account, including complaints and reports, complaints and reports, lawsuits, arbitration, etc
  3. The account has been untied or authorized from other third-party accounts
  4. The account complies with other requirements of the Company and relevant laws and regulations regarding account cancellation

(3) Consequences of cancellation

After canceling your account:

  1. You will no longer be able to log in and use the account
  2. The personal information and transaction records of this account will be deleted or anonymized in this app, and you will not be able to retrieve it
  3. The rights and interests of the relevant third-party account that you have used, authorized to log in, or bound through this account will no longer be enjoyed
  4. The membership benefits you have earned through this account will be cleared

5.6 Obtaining a copy of your personal information

You have the right to obtain a copy of your personal information.

If you would like to obtain a copy of the personal information we have collected, you may contact us using the contact details provided in this Privacy Policy. After verifying your identity, we will provide you with a copy of your personal information (including basic information and identity information) in our services, except as otherwise provided by laws and regulations or otherwise stipulated in this Privacy Policy.

5.7 Transfer of Personal Information

Subject to the conditions stipulated by the Cyberspace Administration of China, you have the right to transfer your personal information to the personal information processor designated by you.

If you need to transfer your personal information, please contact us using the contact information provided in this Privacy Policy, and we will process it after verifying your identity.

5.8 Responding to your above requests

(1) Response method

For security, you may be required to provide a written request or to prove your identity in other ways. We may ask you to verify your identity before processing your request.

(2) Response time limit

We will reply within 15 working days. If you are not satisfied, you can also file a complaint through the means provided in this Privacy Policy.

(3) No need to respond

In accordance with laws and regulations, we will not be able to respond to your request under the following circumstances:

  1. It is directly related to national security and national defense security
  2. It is directly related to public safety, public health, and major public interests
  3. It is directly related to criminal investigation, prosecution, trial, and enforcement of judgments
  4. We have sufficient evidence that you have subjective malice or abuse of rights
  5. Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations
  6. Involving trade secrets
  7. Other circumstances stipulated by laws and regulations

6. How we handle the personal information of minors

6.1 Principles of protection of minors

We attach great importance to the protection of minors' personal information. This app is mainly aimed at adults.

(1) We presume that you have the corresponding civil capacity. If you are a minor over 14 years old but under 18 years old, or do not have full civil capacity due to intellectual or mental health conditions, please read and agree to this Privacy Policy under the guidance and accompaniment of your legal guardian. If you are a minor under the age of 14, please have your parent or legal guardian read and agree to this Privacy Policy for you. Please pay special attention to the protection of minors.

If you are the parent or other guardian of a minor, please pay attention to whether the minor uses our services after obtaining your authorization and consent.

(2) Remedial measures

1. If you fail to obtain the consent of your guardian or you do not agree to your ward to use our services and provide information to us, please stop using our services immediately and contact us in a timely manner.

2. Upon receipt of your written notice, if the App collects the personal information of minors without the prior consent of the guardian, the App will immediately stop collecting and using the relevant information.

6.2 Duties of guardians

If you are the guardian of a minor, please contact us using the contact information provided in this Privacy Policy when you have any questions about the use of our Services by the minor under your guardianship or the user information they provide to us.

6.3 Special protection measures

For cases where we collect personal information from minors with the consent of a parent or guardian, we will only use, share, transfer, or disclose this information as permitted by law, with the explicit consent of the parent or guardian, or as necessary to protect the minor.

If we discover that we have collected personal information from minors without prior verifiable parental or guardian consent, we will try to delete the relevant data as soon as possible.

7. How your personal information is transferred globally

7.1 Domestic storage

In principle, personal information collected and generated in the People's Republic of China will be stored in the People's Republic of China.

7.2 Cross-border transfers

At this time, we do not transfer your personal information abroad.

If our business needs to transfer your personal information overseas in the future, we will obtain your explicit consent in advance and strictly comply with the requirements of relevant laws and regulations, including but not limited to:

  1. Passed the security assessment organized by the national cyberspace department
  2. Personal information protection certification shall be carried out by professional institutions in accordance with the provisions of the cyberspace department
  3. Conclude contracts with overseas recipients in accordance with the standard contract formulated by the national cyberspace administration
  4. Other conditions stipulated by laws and regulations

8. How to update this Privacy Policy

8.1 Update Principles

Our Privacy Policy is subject to change.

We will not reduce your rights under this Privacy Policy without your explicit consent.

8.2 Definition of Material Change

The following are considered material changes to the Privacy Policy:

  1. Our service model has changed significantly, such as the purpose of processing personal information, the types of personal information processed, and how personal information is used
  2. We have made significant changes in ownership structure, organizational structure, etc., such as changes in ownership caused by business adjustments, bankruptcy mergers and acquisitions, etc
  3. The main objects of personal information sharing, transfer or public disclosure have changed
  4. Your rights to participate in the processing of your personal information and the way you exercise it have changed materially
  5. We are responsible for handling the security of personal information, contact information, and complaint channels have changed
  6. When the personal information security impact assessment report indicates that there is a high risk

8.3 Notification Method

We will also provide more prominent notices for material changes (we will notify you through methods such as but not limited to push notifications, pop-up prompts, official website announcements, etc.).

Material changes to this Privacy Policy include, but are not limited to, the above.

9. How to contact us

9.1 Contact Information

If you have any questions, comments, or suggestions about this Privacy Policy, or if you encounter any personal information-related issues when using our services, you can contact us at:

Company name: Shaoxing Yunlong Information Technology Co., Ltd

Personal Information Protection Officer: Office of the Personal Information Protection Officer

Contact number: (Working hours: Monday to Friday 9:00-18:00)

Email: zjsmartcloud@hotmail.com

Office address: c 1103, Block BC, HP Plaza, Cao'e Street, Shangyu District, Shaoxing City, Zhejiang Province

Postal code: 312000

9.2 Response Time Limits

Generally, we will respond to your request within 15 working days. If you are not satisfied with our response, especially if you believe that our personal information processing has harmed your legitimate rights and interests, you can also seek resolution through the following external channels:

(1) Complain and report to the regulatory authorities

Ministry of Industry and Information Technology: 12381

Cyberspace Administration of China Illegal and Adverse Information Reporting Center: www.12377.cn or 12377

Zhejiang Provincial Communications Administration: http://www.zjca.gov.cn/

Shaoxing Municipal Market Supervision and Administration Bureau: 12315

(2) File a lawsuit with a court of competent jurisdiction

You can file a lawsuit with the people's court with jurisdiction over the location of the company (Shangyu District, Shaoxing City, Zhejiang Province).

10. Supplementary Provisions

This Privacy Policy is effective as of January 24, 2026.

This Privacy Policy is an important part of the HelloNav User Service Agreement and has the same legal effect as the HelloNav User Service Agreement.

The definitions of terms used in this Privacy Policy have the same meanings as those in the HelloNav User Service Agreement.

If you have any questions about this Privacy Policy or matters related to the protection of personal information, please feel free to contact us.

Thank you again for your trust in HelloNav! We will continue to strive to protect the security of your personal information and provide you with better services.

Shaoxing Yunlong Information Technology Co., Ltd
. Last updated: January 24, 2026