Last Updated: [January 2026]
If you have any questions, comments, or suggestions, please contact us at HK MACRO-VIDEO SMART TECHNOLOGIES LIMITED via the following methods:
Email: hsservice@macro-video.com
Phone: 400-080-0201
This policy will help you understand the following:
  • How we collect and use your personal information
  • How we protect your personal information
  • Your rights
  • How we handle children's personal information
  • How your personal information is transferred globally
  • How this policy is updated
  • How to contact us
We deeply understand the importance of personal information to you and will do our utmost to protect its security and reliability. We are committed to maintaining your trust and adhere to the following principles to protect your personal information: the principle of consistency between rights and responsibilities, the principle of clear purpose, the principle of choice and consent, the principle of data minimization, the principle of security assurance, the principle of data subject participation, the principle of openness and transparency, among others. At the same time, we promise to adopt corresponding security protection measures in accordance with mature industry security standards to protect your personal information.
Please read and understand this Privacy Policy carefully before using our products or services.
I. How We Collect and Use Your Personal Information
  1. What Personal Information We Collect
To provide basic services, the use of our product requires calling the following permissions or functions to ensure the operation of each feature:
  • Read, write, or delete storage space
    • Used to read, write, or delete videos or screenshots saved on the device.
    • If you do not agree to call the above necessary permissions or functions, or do not agree to our collection and use of the above information, the product features will not function properly.
Additionally, we require you to register an account. When you register an account, we will ask you to provide personal information, such as your email address and phone number, which will be stored under your account. If you wish to fully utilize the various third-party sharing or login features we offer, you may also need to grant us permission to obtain certain information from your third-party accounts, including third-party account information.
  1. When you use this business function, we will request the following system permissions related to personal information:
Special Note: To optimize the experience and success rate when configuring the network for smart cameras, the app will automatically and periodically obtain approximate location, precise location, Wi-Fi list, SSID information, and Bluetooth device list during runtime to enable automatic search and discovery of smart surveillance cameras waiting to be connected to a network.
  • Modify or delete contents of the SD card
    • Permission Usage and Description: Used to read, write, or delete videos or screenshots saved on the device.
  • Access exact location information (using GPS and network-based positioning)
    • Permission Usage and Description: Used to obtain the current network SSID during the camera network configuration process.
  • Access approximate location information (using network-based positioning)
    • Permission Usage and Description: Used to obtain the current network SSID during the camera network configuration process.
  • Record audio
    • Permission Usage and Description: Used to record custom alarm sounds for the camera.
  • Camera
    • Permission Usage and Description: Used to open the phone's camera to scan the QR code on the camera label to complete network configuration.
  • Read contents of the SD card
    • Permission Usage and Description: Used to save data such as alarm screenshots and videos.
  • Modify system settings
    • Permission Usage and Description: Used for the one-click registration feature to increase the success rate of obtaining a phone number in WiFi + 4G network environments (TP-Link SDK).
  • Read phone status and mobile network information
    • Permission Usage and Description: Used for the alarm message push feature (JPush SDK).
  • Calendar
    • Permission Usage and Description: Used for the check-in reminder function in the APP's sign-in module.
We will also use the above information to maintain and improve this business function, develop new business functions, etc.
  1. How We Entrust Processing, Share, Transfer, and Publicly Disclose Your Personal Information
    1. Entrusting Processing: Certain specific modules or functions in this business feature are provided by external suppliers. For example, we may hire service providers to assist us in providing customer support. For companies, organizations, and individuals we entrust to process personal information, we will sign strict confidentiality agreements requiring them to process personal information in accordance with our requirements, this Privacy Policy, and any other relevant confidentiality and security measures.
    2. Sharing: We will not share your personal information with any company, organization, or individual outside of our company without your explicit consent.
    3. Transfer: We will not transfer your personal information to any company, organization, or individual, except in the following circumstances:
          a) Transfer with explicit consent: With your explicit consent, we may transfer your personal information to other parties.
          b) Involving mergers, acquisitions, or bankruptcy liquidation: If personal information transfer is involved, we will require the new company or organization holding your personal information to continue to be bound by this Privacy Policy. Otherwise, we will require that company or organization to re-seek your authorization and consent.
    4. Public Disclosure: We will only publicly disclose your personal information in the following circumstances:
    5. a) With your explicit consent;
    6. b) Disclosure based on law: We may publicly disclose your personal information when required by law, legal proceedings, litigation, or mandatory requirements from government authorities.
II. Rules for Collection and Use of Personal Information for Business Functions
How We Protect Your Personal Information
(A) We have implemented security measures that comply with industry standards to protect the personal information you provide, preventing unauthorized access, disclosure, use, modification, damage, or loss. We take all reasonably feasible measures to protect your personal information. For example:
  1. Information Retention Period
(1) During your use of our platform services, we will continuously retain your personal information.
(2) When you voluntarily delete your personal information or deactivate your account, we will retain your existing personal information for the shortest period required by laws and regulations. Within this legally mandated minimum retention period, we will no longer use your personal information for commercial purposes. Once your personal information exceeds the aforementioned retention period, we will anonymize it.
a) To cooperate with the People's Procuratorates, public security organs, and national security agencies in investigating criminal activities arising from users' use of our platform services and to better protect the lives and property of other users, when you voluntarily delete your personal information or deactivate your account, we will encrypt and isolate your personal information for archiving within the statute of limitations for criminal prosecution as stipulated by the Criminal Law.
b) If you engage in serious violations of laws and regulations, platform agreements, or platform rules while using our platform services, your record of illegal or contractual breaches and corresponding platform credit records will be permanently retained.
  1. Geographic Location of Information Storage
(1) The personal information we collect from you will be stored and used globally in compliance with local laws.
(2) Currently, our platform does not involve scenarios where personal information is provided overseas. Should we need to transfer personal information abroad in the future, we will clearly inform you of the purpose of the cross-border transfer, the recipient, security safeguards, etc., and seek your separate consent.
  1. Security Safeguards
(1) Our company will adopt strict security systems and industry-standard security technologies and procedures to ensure that your personal information is not lost, leaked, damaged, or accessed or used without authorization.
(2) Our platform adopts the following security technical measures to protect your personal information:
a) User personal information is encrypted and stored on servers, and stored using data isolation technology.
b) Encrypted transmission protocols are used during data transmission.
c) Data access permissions are strictly controlled, with a comprehensive system for applying for and approving access to sensitive data.
d) A data security monitoring and auditing system is established to implement comprehensive data security controls.
  1. Security Incident Handling
(1) To address potential security risks such as personal information leakage, damage, or loss, we have promulgated multiple internal policies defining the classification and grading standards for security incidents and vulnerabilities, as well as internal handling procedures (including emergency response processes) and remedial measures for such incidents and vulnerabilities.
(2) In the event of a security incident, we will promptly inform you of the basic situation and risks of the incident, the measures we have taken or will take, and suggestions on how you can mitigate the risks yourself.
(3) We will promptly notify affected users of the security incident via push notifications, letters, or phone calls. When it is difficult to notify each user individually, we will issue warning information by publishing a platform announcement.
  1. Cessation of Operations
(1) If our platform ceases operations, we will announce it on the platform at least 30 days in advance and promptly stop collecting personal information.
(2) After cessation of operations, we will stop using personal information for commercial purposes and, after meeting the minimum retention period required by laws and regulations, anonymize the collected personal information.
(B) We take all reasonably feasible measures to ensure that no irrelevant personal information is collected. We will only retain your personal information for the duration necessary to achieve the purposes described in this policy, unless an extension of the retention period is required or permitted by law.
(C) We will regularly update and make public reports on security risks, personal information security impact assessments, etc.
(D) The internet environment is not 100% secure, and we will strive to ensure or guarantee the security of any information you send to us.
(E) In the unfortunate event of a personal information security incident, we will, in accordance with legal and regulatory requirements, promptly inform you of: the basic situation and potential impact of the security incident, the disposal measures we have taken or will take, suggestions for you to prevent and mitigate risks on your own, and remedies available to you. We will promptly notify you of the relevant details of the incident via email, letter, phone, push notification, etc. If it is difficult to notify each data subject individually, we will issue an announcement in a reasonable and effective manner.
At the same time, we will also proactively report the handling of the personal information security incident to regulatory authorities as required.
III. Your Rights
In accordance with relevant laws, regulations, standards, and common practices in other countries and regions, we guarantee your exercise of the following rights over your personal information:
(A) Access Your Personal Information
You have the right to access your personal information, except as otherwise provided by laws and regulations. You can access your personal information by sending an inquiry email to hsservice@macro-video.com. We will respond to your access request within 15 days.
For other personal information generated during your use of our products or services, we will provide it to you as long as it does not require excessive effort. If you wish to exercise your right of data access, you can access your personal information by sending an inquiry email to hsservice@macro-video.com.
(B) Correct Your Personal Information
When you find that the personal information we process about you is incorrect, you have the right to request that we make corrections. You can submit a correction request using the method listed in "(A) Access Your Personal Information," and we will respond to your correction request within 15 days.
(C) Delete Your Personal Information
You can request us to delete your personal information under the following circumstances:
  • If our processing of personal information violates laws or regulations;
  • If we collect or use your personal information without your consent;
  • If our processing of personal information violates our agreement with you;
  • If you no longer use our products or services, or you have deactivated your account;
  • If we cease to provide products or services to you.
  • If we decide to respond to your deletion request, we will also simultaneously notify entities that have obtained your personal information from us, requesting them to delete it promptly, unless otherwise provided by laws and regulations or these entities have obtained your independent authorization.
  • After you delete information from our services, we may not immediately delete the corresponding information from backup systems, but we will delete it when the backups are updated.
(D) Change the Scope of Your Authorization or Consent
Each business function requires some basic personal information to be completed. For the collection and use of additional personal information, you can grant or withdraw your authorization or consent at any time.
You can change your authorization or consent by sending an inquiry email to hsservice@macro-video.com. Once you withdraw your consent, we will no longer process the corresponding personal information. However, your decision to withdraw consent will not affect the personal information processing carried out based on your previous authorization.
(E) Deactivate Your Account
You can deactivate a previously registered account at any time. You can do so by sending an inquiry email to hsservice@macro-video.com.
After deactivating your account, we will stop providing you with products or services and, upon your request, delete your personal information, except as otherwise provided by laws and regulations.
(F) Obtain a Copy of Your Personal Information
You have the right to obtain a copy of your personal information. You can do so by sending an inquiry email to hsservice@macro-video.com.
Where technically feasible, such as when data interfaces are compatible, we can also directly transmit a copy of your personal information to a third party you designate, as per your request.
(G) Restrict Automated Decision-Making by Information Systems
In certain business functions, we may make decisions solely based on non-human automated decision-making mechanisms, including information systems and algorithms. If these decisions significantly affect your legitimate rights and interests, you have the right to request an explanation from us, and we will also provide appropriate remedies.
(H) Responding to Your Above Requests
For security purposes, you may need to provide a written request or prove your identity in another way. We may first ask you to verify your identity before processing your request. We will respond within 15 days. If you are not satisfied, you can also file a complaint via the following channel: send a complaint email to hsservice@macro-video.com.
In principle, we do not charge fees for your reasonable requests, but we may charge a certain cost fee depending on the situation for repeated requests that exceed a reasonable limit. We may refuse requests that are unreasonably repetitive, require excessive technical means (e.g., developing a new system or fundamentally changing current practices), pose risks to the legitimate rights of others, or are highly impractical (e.g., involving information stored on backup tapes).
We will be unable to respond to your request in the following circumstances:
  • Related to the personal information controller's fulfillment of obligations stipulated by laws and regulations;
  • Directly related to national security or national defense security;
  • Directly related to public safety, public health, or major public interests;
  • Directly related to criminal investigation, prosecution, trial, and execution of judgments;
  • Where the personal information controller has sufficient evidence to prove that the data subject has subjective malicious intent or is abusing their rights;
  • Where it is necessary to maintain the life, property, and other major legitimate rights and interests of the data subject or other individuals, but it is difficult to obtain the data subject's consent;
  • Where responding to the data subject's request would cause serious harm to the legitimate rights and interests of the data subject or other individuals or organizations; involving trade secrets.
IV. How We Handle Children's Personal Information
Our products, websites, and services are primarily directed at adults. Children should not create their own personal information accounts without the consent of a parent or guardian.
For the collection of children's personal information with parental consent, we will only use or publicly disclose this information where permitted by law, with the explicit consent of a parent or guardian, or as necessary to protect the child.
Although local laws and customs define children differently, we consider anyone under the age of 14 to be a child.
If we discover that we have collected a child's personal information without prior verifiable parental consent, we will take steps to delete the relevant data as soon as possible.
V. How Your Personal Information Is Transferred Globally
In principle, personal information collected and generated within the territory of the People's Republic of China will be stored within the territory of the People's Republic of China.
As we provide products or services through resources and servers around the world, this means that with your authorized consent, your personal information may be transferred to jurisdictions outside the country/region where you use the product or service, or be subject to access from those jurisdictions.
Such jurisdictions may have different data protection laws, or none at all. In such cases, we will ensure that your personal information receives a level of protection in the People's Republic of China that is substantially equivalent. For example, we will request your consent for cross-border transfer of personal information, or implement security measures such as data de-identification before the transfer.
VI. How This Policy Is Updated
Our Privacy Policy may change.
Without your explicit consent, we will not reduce the rights you are entitled to under this Privacy Policy. We will post any changes made to this policy on this page.
For material changes, we will also provide more prominent notice (including, for certain services, sending you a notification via email explaining the specific changes to the Privacy Policy).
Material changes referred to in this policy include, but are not limited to:
  • Significant changes to our service model, such as the purpose of processing personal information, the types of personal information processed, or the manner in which personal information is used;
  • Significant changes to our ownership structure, organizational structure, etc., such as changes in ownership due to business adjustments, bankruptcy, mergers, and acquisitions;
  • Changes to the main recipients of shared, transferred, or publicly disclosed personal information;
  • Significant changes to your rights regarding participation in personal information processing and how to exercise them;
  • Changes to the department responsible for personal information security, contact information, and complaints;
  • When a personal information security impact assessment report indicates high risk.
  • We will also archive old versions of this policy for your review.
VII. How to Contact Us
If you have any questions, comments, or suggestions regarding this Privacy Policy, please contact us via the following method: Send an email to hsservice@macro-video.com. Generally, we will respond within 15 days.
This policy shall be interpreted and governed by the laws of the People's Republic of China. Any disputes arising between you and us in any form shall be resolved through friendly negotiation. If negotiation fails, either party has the right to submit the dispute to the competent court in the locality of HK MACRO-VIDEO SMART TECHNOLOGIES LIMITED for litigation.