Rog Privacy Policy

Welcome to the "Rog" service! We are aware of the importance of personal information to you, we will strictly comply with the requirements of laws and regulations to take appropriate security protection measures, committed to protecting your personal information.

HELYSS LIMITED ( "we” for short) have made this Privacy Policy (hereinafter referred to as "this Policy") to help you fully understand how we collect, use, store and protect your personal information when you use our "Rog" service.

and how you can manage your personal information so that you can make better and more appropriate choices.

Before you start using our Rog service, please read and understand this policy carefully to ensure that you fully understand and agree to it before you start using our service.

If you have any questions, comments or suggestions regarding the content of this policy, you can contact us.

By agreeing to this Privacy Policy, you acknowledge that you understand the functionalities provided by the Application and the information necessary for the functionality to function, and that you have given us the appropriate authorization to collect information.

We will seek your consent separately based on your actual use situation.

This Privacy Policy will help you understand the following:

1.The scope of application of this privacy policy;

2.How we collect and use your personal information;

3.How we make your personal information available to the public;

4.The storage of information;

5.How you access and control your own personal information;

6.Your rights and responsibilities;

7.Information security;

8.The emails and messages we may send to you;

9.Changes;

10.Applicable law and dispute resolution;

11.Other;

12.Contact us.

1. Scope of application of this Privacy Policy

This policy applies to the Rog Service and the hardware terminals associated with the Rog Service.

2. How we collect and use your personal information

The personal information we need/may need to collect and use about you when you use the Rog Service includes both of the following:

2.1 Necessary information that you must authorize us to collect and use in order to achieve the basic functions of the Rog service. If you refuse to provide the appropriate information, you will not be able to use the Rog Services properly.

2.2 The functional scenarios in which we collect and use your personal information:

a) Providing Location-Based Services to You, Rog service needs to obtain the location of you and the hardware terminal and display it on a map, where you can know the location of you and the hardware terminal;

b) Providing you with avatar-based services, The APP needs to access your photo or camera to match the photo to the hardware device for displaying on the map;

c) Provide payment-based services to you, APP needs to access your WeChat in order to complete SIM card renewal.

3. How we provide your personal information to the public

3.1 Sharing

We will not share your personal information, but with your explicit consent, we will share your personal information with other parties.

3.2 Third party SDK service

In order to ensure the stable operation and functions working of the APP, to enable you can use and enjoy more services and functions, Rog services will be embedded in the SDK of authorized partners, and we will conduct strict security tests on the application program interface (API) and software tool development kit (SDK) used by authorized partners to obtain relevant information, and agree on strict data protection measures with authorized partners.

to make them handle personal information in accordance with this policy and any other relevant confidentiality and security measures.

Below is a list of the third party SDKs we use and the privacy policy for that SDK:

a) SDK Name: Google Maps SDK;

b) Service type: Map service;

c) Type of personal information collected by the SDK: Location information, used to display your current location;

d) Google privacy and terms link:"Privacy Policy"

4. Storage of information

4.1 All information collected by Rog service is stored locally and will not be uploaded to the cloud.

4.2 We will keep storing the information for you during your use of the Rog service, unless you delete it on your own.

4.3 When you delete the Rog service, all stored information will be deleted.

5. How you can access and control your personal information

We will do everything possible to take appropriate technical measures to ensure that you can access, update and correct your own information or other personal information provided in connection with the use of our Rog Services.

When accessing, updating, correcting and deleting the foregoing information, we may require you to verify your identity in order to safeguard your account.

6. Your Rights and Responsibilities

6.1 Individuals and organizations that meet one of the following conditions may use the Rog Services:

a) Natural persons who are at least eighteen years of age and have the capacity for civil rights and civil conduct;

b) Natural persons who are under eighteen years of age but whose guardians (including but not limited to parents) have given written consent;

c) Corporate legal persons such as companies, institutions, community organizations and other organizations established and legally existing according to Chinese laws and regulations.

6.2 Users must provide accurate personal information to the Rog service when applying to use the Rog service, and must promptly update any changes to their personal information.

6.3 When using the Rog service, users must comply with the provisions of the relevant laws and regulations of the French Republic. You must not use the service for any illegal or improper activities, including but not limited to the following acts:

6.3.1 Producing, copying, publishing, transmitting or otherwise transferring information that contains one of the following:

a) Oppose the basic principles established by the Constitution;

b) endangering national security, leaking state secrets, subverting state power, and undermining national unity;

c) Those that harm the honor and interests of the state;

d) inciting ethnic hatred, ethnic discrimination, and undermining national unity;

e) undermining national religious policies and promoting evil cults and feudal superstitions;

f) spreading rumors, disturbing social order and destabilizing society;

g) spreading obscenity, pornography, gambling, violence, murder, terror or abetting crime;

h) insulting or slandering others and infringing on their legal rights;

i) inciting illegal assemblies, associations, marches, demonstrations, and gatherings to disrupt social order;

j) activities in the name of illegal civil organizations;

k) contains content that is false, harmful, coercive, invasive of another's privacy, harassing, invasive, libelous, vulgar, obscene, or otherwise morally objectionable;

l) contains other content that is restricted or prohibited by Chinese laws, rules, regulations, ordinances, and any legally binding codes.

6.3.2 You may not use the Rog Services to engage in any of the following activities:

a) Accessing computer information networks or using computer information network resources without permission;

b) Deleting, modifying or adding to the functions of the computer information network without permission;

c) without permission, to enter the computer information network to delete, modify or add data and applications stored, processed or transmitted;

d) intentional production, dissemination of computer viruses and other destructive programs;

e) other acts that endanger the security of computer information networks.

7. Information Security

We will retain your personal information only for the period necessary for the purposes described in this policy and for the time period required by law and regulation.

We use a variety of security technologies and procedures to prevent the loss of information, improper use, unauthorized viewing or disclosure.

For example, in some services, we will use encryption technology (such as SSL) to protect the personal information you provide.

However, please understand that due to technical limitations and the possibility of various malicious means, it is not always possible to guarantee 100% security of information in the Internet industry, even with all efforts to enhance security measures.

You need to understand that the system and communication network you use to access our services may have problems due to factors beyond our control.

8. E-mails and messages we may send to you

Email and message pushing. We may use your information to send email or push notifications to your device when you use our Rog service.

Announcements related to the Rog service, we may send you announcements related to the Rog service when necessary (for example, when a service is suspended for system maintenance).

You may not be able to cancel these announcements related to the Rog service that are not promotional in nature.

9. Changes

We may revise the terms of this Policy from time to time, and such revisions form part of this Policy.

If such revisions result in a material reduction of your rights under this Policy, we will notify you by prominently displaying a notice on our home page or by sending you an email or otherwise prior to the effective date of the revision.

In such case, if you continue to use our services, you agree to be bound by this Policy as amended.

10. Applicable Law and Dispute Resolution

10.1 Applicable Law

The laws of the French Republic shall apply to the implementation, interpretation and dispute resolution of this policy.

10.2 Dispute Resolution

If any dispute arises between you and us regarding the content of this Policy or its implementation, both parties shall resolve it amicably; if both parties cannot resolve the dispute through consultation, both parties agree that the dispute shall be submitted to the people's court of the defendant's domicile.

11. Other

11.1 Neither party shall be responsible for any force majeure or other unforeseen event that makes the performance of this policy impossible, unnecessary or meaningless. Force majeure as referred to in this policy means that it cannot be foreseen, avoided and cannot overcome the objective circumstances, including but not limited to war, typhoon, flood, fire, lightning or earthquake, strike, riot, legal disease, hacker attack, network virus, technical control of the telecommunications sector, governmental action or any other natural or man-made disasters, and other objective circumstances

11.2 The validity, performance and all matters related to the effectiveness of this policy and its amendments will be governed by the laws of the French Republic, and any disputes will be governed by the laws of the French Republic only

11.3 This policy is valid: from the time the user agrees to this policy or uses the Rog service until the user cancels the Rog service

11.4 Use of the Rog service indicates acceptance of the Rog service policy and all its attachments

11.5 The final interpretation of this policy belongs to Rog service

12. Contact us

If you have questions or suggestions about personal information protection issues, you can choose to contact us through the following methods:

Send an email to contact@helyss.net

We will review your questions or suggestions as soon as possible and respond within fifteen business days after verifying your user identity.

May 18, 2022

HELYSS LIMITED