Last updated: April 18, 2026 | Effective date: April 18, 2026
This Privacy Policy will help you understand:
Below we fully describe how we collect and process personal information that may be involved in this application:
1. Collection and Use of Personal Information
2. Use of Device Identifiers
3. Sharing, Transfer, or Disclosure of Personal Information
4. Storage of Personal Information
5. Protection of Personal Information
6. Management of Personal Information
7. SDK Related Information
You can create an account by applying for/purchasing a battery through the backend management system. The information required to complete this process is solely to help you register. You may choose not to provide or to modify non‑essential information such as your avatar, nickname, etc.
You may also log in to the application using a third‑party account. With your authorization, the application will bind the information you have authorized with this application, allowing you to directly log in and use our products and services.
In some products, due to functional requirements, device identifiers may be used to help establish a default account for you. You have the right to modify, delete, or re‑edit this information, and you may also completely delete such information at any time by closing your account.
While using our application, you may need to submit or publish information, including but not limited to pictures, videos, audio, etc. Before doing so, we will request your authorization for permissions such as camera, photos, microphone, and storage. If you refuse to grant such authorization, you will not be able to use this feature, but it will not affect your use of other functions of the application.
Please be aware that while using our products, for the purpose of continuously improving our products and services, we may collect information about the devices and logs you use.
The following are some or all of the types of information that may be collected: Hardware model, operating system version, International Mobile Equipment Identity (IMEI), unique device identifier, hardware address of network equipment, IP address, WLAN access point, Bluetooth, base station, software version, network access method, type, status, network quality data, operation, usage, service logs, etc. Additionally, to ensure the proper operation of the product, we may also collect some or all of the following: process information, overall operation, usage and frequency of the application, application crash conditions, overall installation and usage data, performance data, application source. Without your consent and authorization, we will not use such information beyond the scope described above.
During the use of the application, as the product is updated and the business develops, the following are some permissions that may be required. Please be aware that under no circumstances will we request a permission without notifying you in advance. You may refuse such permission request, and refusal will not affect your use of other functions of the product.
To further facilitate convenient login services and support application usage analysis and statistics, we may need to request permission to access the phone number recognition code.
For data backup needs on certain device models, we may request permission to install other applications within the application. To provide task reminders related to dates, we may request permission to read/write the calendar.
Please be aware that as our products are updated and our business evolves, the above‑mentioned personal information and permission requirements may change. We will update this content in a timely manner for your reference.
Please understand that under the following circumstances, in accordance with laws, regulations, and relevant national standards, we may collect and use your personal information without obtaining your authorization or consent:
Device identifiers can serve as a unique identifier for a mobile device and are a widely used technology on the internet. When you use our application without logging in, the application may use such device identifiers to create an account for you. The purpose of creating this account is to facilitate your access and use, record your orders and consumption, and is key to your subsequent services.
The Company hereby promises that it will not use the information obtained through device identifiers for any purpose other than those described above.
To further explain the use of device identifier technology, please carefully read the following:
Traditional login methods require you to actively fill in personal information. Using device identifiers for login requires no such information, thereby improving login and service response speed. Even so, you may edit, modify, or delete the information automatically created using device identifier technology.
After automatically logging in using a device identifier, your orders, consumption, membership status, and other information will be automatically recorded under that account, so that you can browse and query them at any time and use them as the basis for obtaining corresponding services. This also effectively prevents the risk of account theft.
Even if you are automatically logged in using a device identifier, you may still choose to log out of your account. Please note that we will not use the technology or information obtained from using such device identifiers for any purpose other than those related to our application, unless we obtain your consent and authorization. If you wish to further delete your account, you may do so through the account closure process.
Sharing Principles: Unless we obtain your consent and authorization, the Company will not share your personal information. The Company promises that under no circumstances will it share your personal information in any way without your consent and authorization. Even after obtaining your consent and authorization, before formally sharing your personal information, we will carefully and rigorously assess the information to be shared to ensure that sensitive information is not leaked. After obtaining your consent and authorization, your personal information will be shared on a reasonable, lawful, and legitimate basis. At the same time, where necessary, sensitive parts of your personal information will be completely removed or reprocessed. In some cases, where sharing is truly necessary to better provide user services or improve existing services, the sensitive parts of your personal information will be completely removed or reprocessed so that the natural person to whom the information pertains cannot be identified or traced. Any other sharing of personal information will require your consent and authorization. We will conduct long‑term, careful, and rigorous assessments of compliant third parties to ensure that the sharing of such information fully complies with laws and regulations. We will also strictly and comprehensively test and evaluate third‑party software development kits (SDKs) and application programming interfaces (APIs) to protect the security of users' personal information.
Functions Realized by Sharing Information:
The Company will not transfer your personal information to any third party unless we obtain your consent and authorization. In special circumstances, such as a merger, acquisition, or asset transfer of the Company, your personal information may be transferred accordingly. In the event of such a change, we will, in accordance with laws and regulations and security standards no less than those set forth in this Privacy Policy, require the successor to protect your personal information; otherwise, we will require the successor to re‑obtain your consent and authorization.
Without your consent and authorization, we will not publicly disclose your personal information. Even after obtaining your consent and authorization, we will present it in compliance with national laws and regulations, and the sensitive parts of your personal information will be removed or reprocessed so that the natural person to whom the information pertains cannot be identified or traced. Public disclosure of personal information will be handled using security protection measures that meet industry standards.
In accordance with laws, regulations, and national standards, we may share, transfer, or disclose your personal information without obtaining your consent and authorization under the following circumstances:
In accordance with national laws and regulations, we store personal information collected and generated during our operations within the territory of the People's Republic of China. Currently, we do not transfer such information outside the country. If we do transfer it outside, we will follow relevant national regulations or obtain your consent.
We will store personal information during the period you use the application's functions and services. After the storage period expires, your personal information may be deleted or anonymized, unless otherwise provided by laws or regulations.
a. Emphasizing information security, we endeavor to take reasonable technical and managerial measures to protect your personal information. At the same time, we have a dedicated technical leadership team that continuously improves our information security measures and enhances technical management levels, striving to ensure that your personal information is properly safeguarded.
b. For the purpose of protecting information security, your personal information will be encrypted or anonymized, or processed using industry‑standard, reasonable, and legally compliant technical means.
c. Within the Company, under the leadership of the technical leadership team, we have a comprehensive information security supervision mechanism. The use, access, and sharing of data are subject to strict authorization.
d. Although we have taken the above reasonable and effective measures and complied with the requirements of relevant legal standards, please understand that due to technical limitations and various possible malicious means, it is impossible in the internet industry to guarantee one hundred percent security of information, even with all efforts to strengthen security measures.
e. You accept and understand that during the use of our application, unexpected and uncontrollable information security issues may occur. We also recommend that you take proactive measures to protect your personal information, such as using complex passwords, changing passwords regularly, and not disclosing personal information to third parties.
f. On the basis of the above reasonable and effective measures, we have further established an information security incident response plan to ensure that in the event of an information security issue, emergency procedures are activated to limit the impact and consequences of such security incidents.
g. Information security issues caused by your own actions, especially those occurring outside the application environment, are not within the scope of the Company's personal information protection.
Your personal information belongs entirely to you. The Company fully protects your right to manage the personal information you have submitted to us. You may modify your personal information within the application at any time. When modifying your personal information, you must comply with national laws and regulations.
Please note that during the use of our application, we will clearly specify the necessary permissions we require, and we will also clearly inform you of the entire content of this Privacy Policy. Such permissions will not be enabled unless you authorize them. Additionally, you may disable these permissions in your device's operating system. For permissions such as GPS location, contacts, camera, microphone, photo album, etc., if they are non‑essential in the application, disabling or refusing to grant them will not affect your use of the application.
Please be aware that necessary permissions affect the main use of the application. If you refuse to grant necessary permissions or disable them in your device's operating system, your use of the application will be affected. When using this application, we will clearly request authorization for necessary permissions and will only enable such permissions after you have agreed and authorized them.
No SDKs involving privacy permissions are used.
This Privacy Policy is effective as of the date above. Nanchang Yepai Technology Co., Ltd. reserves the right to update this policy in accordance with legal and product changes. The revised policy will be posted within the application or on our website. By continuing to use our services, you indicate your acceptance of any changes.