We are fully aware of the importance of personal information to you. We will protect your personal information and privacy in accordance with laws and regulations. We make this “Privacy Policy” and remind you that we hope you will read and understand this Privacy Policy carefully before using Our life and related services so that you can make appropriate choices. If you do not agree with any of the content below, please immediately stop accessing/using this website or any other mobile applications or software. The following will help you learn more about how we collect, use, store, transmit, share, transfer and protect personal information. Help you understand the way to query, access, delete, correct personal information. How do we protect your Personal Information Your rights How do we handle children’s Personal Information How does your Personal Information transfer globally How does this Policy update how do you contact us

(I) Information Unrelated to Personal Identity When you use Plushlife, we may collect and summarize information such as the source channel and access sequence of users, for example, record the source channel of each user who uses Plushlife. (2) Information related to personal identity The business functions provided by us rely on some information to run. If you choose to use this business function, you need to provide us with or allow us to collect necessary information including: There are 8 types of personal information, including mobile phone number, ID information (name), customer operation behavior, face picture that you input on your own initiative, account information (account number and password), verification information (static password and dynamic password), owner’s property information and third-party payment method. We collect your information mainly so that you and other users can use Pro Life more easily and satisfactorily. Our goal is to provide all users with safe and convenient property life services. And this information helps us do that. Ii. How do we use your Personal Information

We will collect and use your personal information only for the following purposes as stated in this Privacy Policy: For necessary personal information, we will use it to provide such business functions, including identifying network users and ensuring the security of account information; Verify the user’s real identity to ensure user account security and meet the requirements of relevant laws and regulations; At the same time, the system uses this information to verify the identity of the owner and use the corresponding property for business functions. We will also use the above information to maintain and improve this business function, develop new business function, etc. Iii. How do we entrust, share, transfer and publicly disclose your personal information

(1) Some specific modules or functions of the entrusted business function are provided by external suppliers. For example, we hire service providers to help us provide customer support. We will sign strict confidentiality agreements with companies, organizations and individuals entrusted by us to process personal Information, requiring them to process personal information in accordance with our requirements, this Personal Information Protection Policy and any other relevant confidentiality and security measures. (2) Sharing We will not share your personal information with any company, organization or individual other than our company unless we obtain your consent. (3) Transfer We will not transfer your Personal Information to any company, organization or individual, except in the following circumstances: a) Transfer with express consent: After obtaining your express consent, we will transfer your personal Information to other parties; B) In the case of merger, acquisition or bankruptcy liquidation, if the transfer of personal Information is involved, we will require the new company or organization that holds your personal Information to continue to be bound by this personal Information protection policy; otherwise, we will require the company or organization to seek authorization from you again. (4) Public Disclosure We will only publicly disclose your personal Information under the following circumstances: a) with your express consent; B) Disclosure based on law: We may publicly disclose your personal information when required by laws, legal procedures, lawsuits or government authorities. Iv. How do we protect your personal Information

(I) We have used industry-standard security measures to protect the personal information you provide and prevent unauthorized access, public disclosure, use, modification, damage or loss of data. We will take all reasonably practicable steps to protect your personal information. For example, encrypt the transmitted information and store the password-related information with the mainstream security encryption encryption method. (2) We have obtained the following certifications: Information security level protection certification (3) Our data security capability: We will take all reasonable and practicable steps to ensure that no irrelevant personal information is collected. We will only retain your personal information for as long as necessary to achieve the purpose stated in our cost policy, unless the retention period is extended or permitted by law. (V) We will regularly update and publicize the relevant contents of security risk and personal information security impact assessment reports. (6) The Internet environment is not 100% secure. We will do our best to ensure or guarantee the security of any information you send us. If our physical protection facilities, technology, or management is destroyed, led to the unauthorized access to information, public disclosure, tampering, or destroyed, cause your legitimate rights and interests is damaged, we will bear the corresponding legal responsibility (7) after the unfortunate personal information security incidents, we will be in accordance with the requirements of the laws and regulations, timely inform to you: Basic information and possible impact of security incidents, disposal measures we have taken or will take, suggestions you can independently prevent and reduce risks, remedial measures for you, etc. We will timely inform you of the information related to the event by email, letter, phone, push notification and other ways. If it is difficult to inform the subject of personal information one by one, we will take a reasonable and effective way to release the announcement. At the same time, we will also take the initiative to report the disposal of personal information security incidents in accordance with the requirements of regulatory authorities. V. Your rights

In accordance with relevant laws, regulations and standards of China, as well as the prevailing practices of other countries and regions, we guarantee that you can exercise the following rights with respect to your personal Information: (1) Access to Your Personal Information You have the right to access your Personal Information, except for exceptions stipulated by laws and regulations. (II) Correction of Your Personal Information When you find that we have processed your personal information in error, you have the right to request us to make correction. (3) Deleting Your Personal Information Under the following circumstances, you may request us to delete your personal Information: 1. If we deal with your personal Information in violation of laws and regulations; 2. If we collect and use your personal Information without your consent; 3. 5. If we no longer provide products or services to you, if we decide to respond to your deletion request, we will also notify the entities that have obtained your personal information from us to delete it in a timely manner, unless otherwise provided by laws and regulations, or these entities have obtained your independent authorization. When you delete information from our services, we may not delete the corresponding information in the backup system immediately, but will delete the information when the backup is updated. Each business function requires some basic personal information to complete. You may grant or withdraw your authorized consent at any time to the collection and use of additional personal Information collected. You can do this by yourself in the following ways: Through the collection of our products do not agree to collect your personal information option. After you withdraw your consent, we will no longer process your personal information. However, your decision to withdraw your consent will not affect the processing of personal information previously carried out based on your authorization. (5) personal information subject unsubscribe You can cancel at any time after registered account, you can through the following ways to operate: background cancellation system through our products After the cancellation of account, we will stop to provide you with products or services, according to your request, delete your personal information, except as otherwise provided by laws and regulations. We will not be able to respond to your request if:

(1) Those directly related to national security and national defense security; (3) those directly related to public security, public health and major public interests; (4) Those directly related to criminal investigation, prosecution, trial and execution of judgment 5, personal information controller there is sufficient evidence that personal information subject subjective malicious or abuse of right part 6, for maintenance of personal information or other personal life, property and lawful rights and interests, but it is hard to get 7, I agree to response to the request of the personal information subject will lead to personal information main body of a person, organization or other legitimate rights and interests is severely damaged. How do we deal with children’s personal information

Our products, websites and services are primarily aimed at adults. Children should not create their own personal information body accounts without the consent of their parents or guardians. When collecting personal information about children with parental consent, we will only use or publicly disclose such information when it is permitted by law, with the express consent of the parent or guardian, or when it is necessary to protect the child. Although local laws and customs define a child differently, we consider anyone under the age of 14 to be a child. If we find that we have collected personal information about children without first obtaining verifiable parental consent, we try to delete the data as soon as possible. Vii. How will your personal information be transferred globally

In principle, personal information collected and generated by us in the People’s Republic of China will be stored in the People’s Republic of China. As we provide our products or services through resources and servers located around the world, it means that, with your authorized consent, your personal information may be transferred to, or accessed from, foreign jurisdictions in the countries/territories in which you use the Products or services. Such jurisdictions may have different data protection laws, or even none at all. In such cases, we will ensure that your personal information is adequately and equally protected within the People’s Republic of China. For example, we may request your consent to transfer personal information across borders, or implement security measures such as data de-identification prior to cross-border data transfer. Viii. How to update this policy

Our Privacy Policy may change Without your express consent, we will not reduce your rights under this Privacy Policy. We will do in this page to release this policy any changes For major changes, we will also provide more significant notice (including for some services, we will send a notification by email, clarifies the context of the specific changes to the privacy policy) significant changes in this policy means including but not limited to: 1, the major changes in our service mode. 2. We have undergone major changes in ownership structure and organizational structure. As the owner of the business adjustment, bankruptcy, merger and acquisition etc caused changes such as 3, personal information sharing, transfer or change the main objects of public disclosure of 4, you participate in the individual’s right to information processing and significant changes in the way to exercise 5, we shall be responsible for handling the responsibility of the personal information security department, the contact way and complaint channel changes 6, personal information security impact assessment report shows that there is a high risk

Ix. Permission Description:

1. Obtain device identification code and status; It is used to quickly log in to the APP without entering the account password. If you refuse or forbid granting this permission to the APP, you cannot automatically log in to the APP. You need to manually log in each time. The upgrade prompt window cannot pop up. You need to manually click the upgrade icon to upgrade each time the APP version is updated. 2. Modify system Settings; When using Bluetooth to open the door, turn on the bluetooth of the mobile phone. If you refuse or forbid granting this permission to the App, the bluetooth door opening function will be unavailable. 3. Read the contents of the memory card; This permission is used to read and send error information log files when submitting feedback. If the permission is denied or forbidden, logs with error information cannot be submitted to locate errors. 4. Modify or delete the contents of the memory card; It is used to save the APK file on the mobile phone when the App is automatically upgraded. If this permission is denied or prohibited, the App of a later version cannot be automatically upgraded. 5. Display above other applications; It is used to display pop-ups and full-screen screens to other applications. Refusing/disallowing this permission will result in pop-ups and App usage failure. 6. Take photos and record videos; It is used to take photos when reporting repairs. If the App is denied/forbidden to obtain this permission, the camera cannot be opened when reporting repairs. 7. Record audio; It is used for the cloud intercom function of the App. If the App is denied or forbidden to obtain this permission, the cloud intercom cannot make normal cloud intercom calls. 8. Make a phone call. It is used for the functions of the App to call the customer service center and the door machine. If the App is denied or forbidden to obtain this permission, the cloud intercom and the door machine cannot be used normally. 9. Read, create, modify, and delete contacts. When an App calls the customer service center, it writes the customer service number. If the App is denied or forbidden to obtain this permission, the customer service number cannot be automatically added to the address book. 10. Reset the outbound dialing path. Allows applications to access the device’s phone functions. This allows the application to determine the local number and device ID, whether there is an ongoing conversation, and the number to call. 11. Face related services; If the user is the owner or family members and other roles, the user can input face for face door opening, face recognition stranger stranger alarm face related functions (” face related service “). Users are required to provide face photo information to Prolife. In order to facilitate your use of prolife’s face-related services in different scenarios and applications and to improve the accuracy and security of face recognition, Prolife will save your face information and comply with the relevant privacy policy of Prolife. We have our own server and database. The database uses mysql. We will take strict security measures to upload face-related data to the server for calculation and storage. Allow users to delete and update their own face. Once the user has logged out of profilife APP and is not the owner or family member of our community, we will delete the user’s face information. College allows users to check their own face input information, users can know their faces information is stored in our servers, once found inside the village personnel not in our database, also is not the owner of our neighborhood or family members, no community property information, determine the staff as a stranger, to protecting the security of park residents.

Operator information

Registered address: 26-1, Block C, World Trade Plaza, Fuhong Road, Futian Street, Futian District, Shenzhen Office Address: 8B, Haowei Science and Technology Building, Nanshan District, Science and Technology Park, Nanshan District, Science and Technology South Eight Road Contact: 0755-82895502