4.Home Energy Storage & Portable Energy Storage Products Privacy Policy

Thank you for your interest in EAST Energy Storage Technology (Guangdong) Co., Ltd. and its affiliates ("EAST" or "we" or "us"), as well as the various hardware, firmware, software, websites, applications, and services that we provide ("Products" or "Services", collectively, "EAST Products and Services"). "Products" or "Services" and collectively "EAST Products and Services") that display this EAST Privacy Policy ("this Policy"). "this Policy"/"this Privacy Policy"), which will display a link to this EAST Privacy Policy (hereinafter referred to as "this Policy"/"this Privacy Policy"), to help you understand how we collect, use, and store your personal information and what your rights are. We understand that this is a big responsibility and will endeavor to protect your information as well as give you control over it.
Please read and fully understand this Policy before you begin using EAST products and services. By using EAST products and services, you consent to our use and processing of information about you in accordance with this Privacy Policy. You have the right to refuse to agree to this Policy, but please be aware that if you choose to do so, you may not be able to fully utilize EAST's relevant services and features, or be able to achieve the results of the services we intend to achieve. This Policy is incorporated into, and is subject to, the terms of use of the EAST products and services that you use.
This Policy describes:
4.1 the information we collect and use
4.2 how we use cookies and similar technologies
4.3 How we share, transfer, and publicly disclose your personal information
4.4 Your rights
4.5 How we store and protect this information
4.6 Our protection of minors
4.7 How we update this policy

4.1 Information we collect and use

We will follow the principles of lawfulness, legitimacy, necessity and good faith in accordance with laws and regulations to collect and use personal information about you from you or third parties in the course of your use of EAST products and services. The personal information we collect and use about you includes: ① information necessary for the core business functions of EAST products and services, such information is necessary for the normal operation of the products and services, if you refuse to provide it, you will not be able to use our products and services normally; ② information that may be collected for additional business functions, you can choose whether to authorize us to collect this information, if you refuse to provide it, you will not be able to use the additional functions normally. If you refuse to provide such information, you will not be able to use the relevant additional functions normally, but it will not affect your normal use of the core business functions.
We will collect and use your personal information in the following scenarios:
4.1.1 Account registration and login
(1) When you register and log in to your EAST account, we will collect the following information from you: cell phone number, email address, and password, which will be used to create your personal account and authenticate your identity to ensure account security. This information is necessary for the core business functions of EAST products and services. If you refuse to provide the above information, we will not be able to provide you with services.
(2) You can also choose to use a third-party platform account (e.g. WeChat, Apple) to log in. If you use a third-party platform account to log in, we will obtain your authorization to obtain the relevant information (user name, avatar) under the account of the third-party platform, and at the same time, we still need you to provide your cell phone number for identity verification. If you refuse to provide the above information, you will not be able to use the third-party platform account login, but does not affect the normal use of other functions.
(3) The collection and use of your cell phone number is to satisfy the authentication requirements for real identity information under relevant laws and regulations, and your refusal to provide such information may result in your inability to register for an account.
(4) After you log in to your account, you can further improve your information and modify your nickname, avatar and background photo. If you choose to change your avatar and background photo, you need to provide your cell phone album information.

4.1.2 Connecting and Controlling Devices

When you use EAST App to connect your EAST product device, we will collect your location information, Wi-Fi list information, and Bluetooth information to help you realize the connection between your cell phone and your device, as well as the control of your device by your cell phone. After connecting, you can monitor the operation status of your device and control it remotely through EAST App. This is a core business function of EAST products and services. If you choose not to provide the above information, you will not be able to use this core function.
4.1.3 Maintaining Application Operation
During your use of the EAST App, we will obtain information about your cell phone device, including: Mac address, CPU information, memory information, SD card information, and operating system version. This is used to collect abnormal information of the application, report errors when something goes wrong with the application, and ensure the stability and safety of the system operation.
4.1.4 Problem Feedback
When you have a problem to give us feedback, you can upload photos or videos to describe your problem more clearly. If you choose to upload photos or videos, we will obtain your cell phone album information.
In the course of collecting and using the personal information described above, we primarily invoke the following mobile device permissions. By enabling any of these permissions, you authorize us to collect and use personal information to provide you with the services you have requested. You can also choose to change the scope of your consent or withdraw your authorization at any time. After withdrawing your authorization, we will no longer collect personal information related to these permissions and will not be able to continue to provide you with the corresponding services, but your decision to withdraw your consent or authorization will not affect the collection and use of personal information that we have previously collected based on your authorization. When we want to use the information for other purposes not stated in this policy, we will ask for your prior consent.


Type of permission

Description of permission

Scenario or purpose of use



Allows to get the status of the current Wi-Fi access and information about WLAN hotspots

Pairing network to connect to Wi-Fi and get Wi-Fi list information



Allow the application to change the status of the Wi-Fi connection

Turn on and off Wi-Fi



Allow applications to connect to Bluetooth devices for pairing

Connect Bluetooth device



Allow applications to discover and Bluetooth devices

Discover Bluetooth devices



Allow programs to access network connections that may generate GPRS traffic

Log in to register, access network, iot connection, download firmware, new version of App



Allow access to network information status

Detect whether the app is connected to the network



Allow applications to change network connection status

Monitor network status changes



Allow receiving location information from satellites via GPS

Work with Bluetooth and Wi-Fi to get the list of Bluetooth devices and Wi-Fi names, and for data analysis.


Precise Positioning

Allow access to the user's latitude and longitude information by means of a wireless network or mobile base station.




Allow programs to access the camera to take pictures

Uploading pictures and scanning SN code when users change avatars or give feedback on problems.



Allow the application to record sound through the microphone of the phone or headset.

Uploading video for problem feedback


Storage space

Allow programs to write to external storage

Write related data: firmware data, app data.



Allow apps to read files from the device's external storage

Retrieve data, get device list information, upload image when feedback problem



Allow installation of apps from unknown sources

Install new version of app



EAST APP applies for use of Bluetooth permissions for scanning and connecting BLE devices to EAST



EAST Chinese version applies for permission to use Bluetooth for scanning and connecting to EAST's BLE devices.



EAST APP applies for permission to use the camera for taking photos, recording videos and scanning the barcode of the device.



EAST APP applies for the use of microphone for recording audio and video files.


Photo Albums

EAST APP app applies for Photo Album permission, which is used to select a photo to set user avatar.



Your email address will be used as a unique identifier for the EAST platform.



Your cell phone number will be used as the unique identifier of EAST platform.


Using the local network

EAST App applies for local network permission to communicate between EAST App and EAST devices in direct connection mode.



EAST applies for the permission to use localization, which is used to set the time zone and get the latitude, longitude and altitude information through localization for the statistical data analysis of the usage of the device.

4.2 How we use cookies and similar technologies

In the course of your use of EAST products and services, we use cookies to automatically collect information about you and store that information in logs. We may send one or more cookies or anonymous identifiers ("Cookies") to your computer or mobile device to collect, identify and store information about your access to and use of the Products. We promise not to use Cookies for any purpose other than those described in this Privacy Policy. We use cookies primarily to simplify the steps for you to log in repeatedly, to store your preferences, to help determine your login status and account or data security, and to help analyze and improve the Product services and enhance the Product experience.
You can manage or delete cookies according to your preferences; you can clear all cookies stored on your computer, or modify your acceptance of cookies or reject our cookies; you may not be able to use the services or corresponding features that rely on cookies because of these modifications.

4.3 How we share, transfer, and publicly disclose your personal information

4.3.1 Sharing
We will not share your personal information with any companies, organizations and individuals outside of Ezra Energy Storage Technology (Guangdong) Co., Ltd, except in the following cases:
(1) Sharing with explicit consent: After obtaining your explicit consent, we will share your personal information with other parties.
(2) Fulfillment of legal obligations: We may share your personal information externally in accordance with the provisions of laws and regulations, or in accordance with the mandatory requirements of governmental authorities.
(3) Sharing with our affiliates: Where permitted by law, we may share your information with our affiliates in order to provide you with EAST products and services. We will only share personal information that is necessary and subject to the purposes stated in this Privacy Policy. Affiliated companies that wish to change the purposes for which personal information is processed will again seek your authorized consent.
(4) Sharing with Authorized Partners: Some of our services will be provided by authorized partners only for the purposes stated in this policy. We may share some of your personal information with our partners to provide better customer service and user experience. We will only share your personal information for purposes that are lawful, legitimate, necessary, specific, and unambiguous, and will only share personal information that is necessary to provide the service. Our partners are not authorized to use the personal information shared for any other purpose. Typically our partners are:
① Third-party service providers: provide us with payment facilitation, parcel transportation, application development, electronic message processing and other services.
② Third-party SDK service providers: In order to ensure the stable operation and function realization of the application, so that you can use and enjoy more services and functions, we will embed third-party SDK in the application.

4.3.2 Transfer
We will not transfer your personal information to any company, organization or individual unless we have your express consent, or in the event of a merger, acquisition or bankruptcy and liquidation involving the transfer of personal information, we will require the new company or organization holding your personal information to continue to be bound by this privacy policy, or we will require that company or organization to seek authorization from you again for consent.
4.3.3 Public disclosure
We will only publicly disclose your personal information under the following circumstances:
(1) With your express consent;
(2) Disclosure based on law: We may publicly disclose your personal information when mandated by law, legal process, litigation, or governmental authorities.

4.4 Your Rights

We will do our best to protect your rights to your personal information based on relevant laws and regulations. Your rights include:
4.4.1 Inquiry and Correction of Your Personal Information
(1) You can click on the icon at the top left corner of the main interface of EAST App to enter the Personal Center and check your personal information: avatar, nickname, and bound cell phone number. At the same time, you can also modify your avatar, nickname and password.
(2) If you need to inquire or modify other personal information, you can contact us through the methods provided in this Privacy Policy. We will provide you with the information you inquired and modify your data according to your request, except as otherwise provided by laws and regulations.
4.4.2 Deletion of your personal information
In the following cases, you can make a request for deletion of your personal information to us through the contact information provided in this Privacy Policy:
(1) If our handling of personal information violates laws and regulations;
(2) If we collect or use your personal information without your consent;
(3) If our handling of personal information violates our agreement with you;
(4) If you no longer use our products or services, or if you cancel your account;
(5) if we no longer provide products or services to you.
If we decide to respond to your deletion request, we will also notify the entities that received your personal information from us at the same time and ask them to delete it promptly, unless otherwise required by law or regulation, or if those entities are independently authorized by you. When you delete information from our Services, we may not immediately delete the corresponding information in our backup systems, and we will securely store your Personal Information and restrict any further processing of it until the backups can be erased or anonymized.

4.4.3 Changing the Scope of Your Authorized Consent
Certain business functions require some basic personal information in order to be completed (see Part I of this Policy). You may give or withdraw your consent to the collection and use of additional personal information at any time. You can do this in the "Settings" section of your mobile device, or you can permanently withdraw all authorization for us to continue to collect your personal information by logging out of your account. When you withdraw your consent, we will no longer process the personal information in question. However, your decision to withdraw your consent will not affect the processing of personal information previously carried out on the basis of your authorization.
4.4.4 Cancellation of Account
You can cancel your previously registered account at any time, you can do so through the cancellation function in the "Personal Center" of the EAST App, or you can contact us through the means provided in this Privacy Policy to cancel your account. We will reply to you as soon as possible within 15 working days after receiving your application for cancellation and verifying your user identity.
After you take the initiative to cancel your account, we will stop providing you with products or services and delete or anonymize your personal information, except as otherwise provided by laws and regulations or required by regulatory authorities.
4.4.5 Responding to your request above
For security purposes, you may be required to provide a written request or otherwise prove your identity. We may ask you to verify your identity before processing your request. We will respond within 15 working days. If you are not satisfied, you may also contact us and complain through the means provided in this Privacy Policy.
For your reasonable requests, we do not charge a fee in principle, but for requests that are repeated several times and exceed reasonable limits, we will charge a fee for certain costs as appropriate. We may deny requests that are unreasonably repetitive, require excessive technical means (e.g., requiring the development of new systems or fundamental changes to existing practices), pose a risk to the legal rights of others, or are highly impractical (e.g., involving the backing up of information stored on magnetic tapes).
In the following cases, we will not be able to respond to your request as required by law or regulation:
(1) Directly related to national security or national defense security;
(2) Directly related to public safety, public health, and significant public interests;
(3) Directly related to crime investigation, prosecution, trial and judgment execution;
(4) There is sufficient evidence that you have subjective malice or abuse of rights;
(5) Responding to your request will lead to serious damage to your legitimate rights and interests or those of other individuals or organizations.
(6) Involving trade secrets.

4.5 Our storage and protection of this information

4.5.1 Information Storage
(1) We guarantee that the personal information we collect and generate in our operations will be subject to the constraints and safeguards of relevant laws and regulations. We will not transfer your personal information without your express authorization, the express provisions of laws and regulations, or the requirements of relevant competent authorities.
(2) We will only store your personal information for as long as necessary to fulfill the purpose of the products and services we provide to you, and for the retention period specified by laws and regulations. After the above storage period, we will delete or anonymize your personal information.
4.5.2 Protection of information
(1) We attach great importance to the security of personal information, and we will strictly comply with relevant laws and regulations and take reasonable and feasible measures recognized by the industry to protect your personal information.
(2) We have used industry-standard security measures to protect the personal information you provide against unauthorized access, public disclosure, use, modification, damage or loss of data. We will take all reasonably practicable steps to protect your personal information. For example, we will use encryption technology to ensure data confidentiality; we will use trusted protection mechanisms to prevent malicious attacks on data; we will deploy access control mechanisms to ensure that only authorized personnel have access to personal information; and we will conduct security and privacy protection training courses to enhance employees' understanding of the importance of protecting personal information.
(3) Please understand that we will do our best to ensure the security of your personal information, but the Internet environment is not 100% secure. Due to the limitations of technology and risk prevention, even if we have tried to strengthen our security measures, we cannot always guarantee 100% security of information. In the event of a security incident such as a leakage of personal information, we will activate our emergency response plan to prevent the security incident from expanding. After a security incident occurs, we will inform you in the form of push notification emails, phone calls, text messages, etc. If it is difficult to inform you one by one, we will take a reasonable and effective way to publish announcements. At the same time, we will also take the initiative to report the disposition of personal information security incidents in accordance with the requirements of the regulatory authorities.
4.6 Our Protection of Minors
We attach great importance to the protection of personal information of minors, EAST products and services will not be directed to children under 14 years of age, and children are not allowed to create their own user accounts without the consent of their parents or guardians.
In the event that we collect personal information from a child with the consent of a parent or guardian, we will only use or publicly disclose this information as permitted by law, with the express consent of the parent or guardian, or as necessary to protect the child. If we become aware that we have collected personal information from a child without first obtaining verifiable parental or guardian consent, we will attempt to delete the data as quickly as possible.
4.7 How we update this policy
4.7.1 In order to provide you with a better service, we are constantly improving our products and services and this Privacy Policy will be updated from time to time.
We will not reduce your rights under this Privacy Policy without your explicit consent. We will post any changes to this policy on our official channels or website. For major changes, we will also provide a more prominent notice (including, but not limited to, emails, text messages, or special notices on the browsing page, etc., stating the specific changes to the Privacy Policy).

4.7.2 Material changes within the meaning of this policy include, but are not limited to:
(1) Significant changes in our service model. For example, the purpose of processing personal information, the type of personal information processed, and how personal information is used;
(2) Significant changes in our ownership structure, organizational structure, etc. Such as changes in ownership due to business restructuring, bankruptcy and mergers and acquisitions;
(3) Changes in the primary recipients of personal information shared, transferred, or publicly disclosed;
(4) Significant changes in your rights to participate in the handling of personal information and the manner in which they are exercised;
(5) Changes in the department responsible for handling the security of personal information, contact information and complaint channels;
(6) When the security impact assessment report of personal information indicates that there is a high risk.