<Wellborne Plus Privacy Agreement>

This policy only applies to Wellborne Plus products or services of Wellbore SAS.
Last updated: December 29, 2023.

This policy will help you understand the following:

● How we collect and use your user information

● How we use cookies and similar technologies

● How we share, transfer and publicly disclose your user information

● How we protect your user information

● Your rights

● How your user information is stored and transferred globally

● How to update this policy

● How to contact us

We fully understand the importance of user information to you and will do our best to protect the safety and reliability of your user information. We are committed to maintaining your trust in us and abiding by the following principles to protect your user information: the principle of consistency of rights and responsibilities, the principle of clear purpose, the principle of choice and consent, the least sufficient principle, the principle of ensuring security, the principle of subject participation, the principle of openness and transparency, etc. . At the same time, we promise that we will take corresponding security protection measures to protect your user information in accordance with mature security standards in the industry.

Please read and understand this privacy policy carefully before using our products (or services).

●How we collect and use your user information ?

We will only collect and use your user information for the business functions described in this policy. The purpose of collecting user information is to provide you with products or services. You have the right to choose whether to provide this information, but in most cases, if If you do not provide it, we may not be able to provide you with corresponding services or respond to your problems:

1.Information needed to help you become our user

When you register for the Wellborne Plus service, you need to provide us with the registration email you intend to use, and we will verify whether your identity is valid by sending a verification code via email. After successful registration, you can modify and supplement your avatar, nickname and login password, which all belong to your "account information". The registered email address and supplementary account information you provide will help us provide you with identity verification and other functions. If you do not provide this supplementary information, it will not affect your use of the charging function.

2.Information we collect and use during the use of our products or services

Log information: When you use the products and services we provide, we will automatically collect the details of your use of our services and save them as relevant network logs, including but not limited to your IP address, operating system version, and access date and time.

3. Permissions

In the process of providing services, you may be required to enable some device access rights based on the specific scenarios and functions of the service. You can choose whether to grant us permission to use your device:

Camera permissions: Use the scan code to add charging piles and upload avatars to take photos;

Storage permissions: Select album photos when adding a charger, select album photos when uploading avatar function;

4 . Exceptions to obtaining authorized consent

Please understand that in accordance with laws, regulations and relevant national standards, we do not need to obtain your authorization to collect and use your user information in the following situations:

1). Directly related to national security and national defense security;

2). Directly related to public safety, public health, and major public interests;

3). Directly related to criminal investigation, prosecution, trial and judgment execution;

4). To protect your or other individuals’ life, property and other major legitimate rights and interests but it is difficult to obtain your consent;

5). Your user information collected is disclosed to the public by you;

6). Your user information collected from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels;

7). Necessary to sign or perform a contract at your request;

8). Necessary to maintain the safe and stable operation of software and related services, such as discovering and handling faults in software and related services;

9). The personal information controller is a news organization and it is necessary for it to carry out legal news reporting;

10). If it is necessary for an academic research institution to conduct statistical or academic research based on public interests, and when providing externally the results of academic research or descriptions, the personal information contained in the results will be de-identified.

11). Other situations stipulated by laws and regulations.

● How we use cookies and similar technologies

1. Cookies

To ensure the normal operation of the website, we will store small data files called Cookies on your computer or mobile device. Cookies usually contain an identifier, the site name, and some numbers and characters. With the help of cookies, the website can store data about your access preferences.

We will not use Cookies for any purpose other than those stated in this policy. You can manage or delete cookies according to your preferences. You can clear all cookies saved on your computer, and most web browsers have the function to block cookies. However, if you do this, you will need to change your user settings yourself each time you visit our website.

2. Website beacons and pixel tags

In addition to Cookies, we also use other similar technologies such as web beacons and pixel tags on our website. For example, emails we sent you may contain click URLs linked to content on our website.

If you click this link, we will track this click to help us understand your product or service preferences and improve customer service. A web beacon is typically a transparent image embedded into a website or email. With the help of pixel tags in emails, we can learn whether the emails have been opened. If you do not want your activities to be tracked in this way, you can unsubscribe from our mailing list at any time.

3. Do Not Track

Many web browsers have a Do Not Track function, which can issue Do Not Track requests to websites. Currently, the major Internet standards organizations have no policies in place that govern how websites should respond to such requests. But if your browser has Do Not Track enabled, all of our websites will respect your choice.

● How we share, transfer and publicly disclose your user information

1. Sharing

We will not share your user information with any other company, organization or individual, except in the following circumstances:

1) Sharing with explicit consent: After obtaining your explicit consent, we will share your user information with other parties.

2) We may share your user information externally in accordance with laws and regulations, or in accordance with the mandatory requirements of government authorities.

3) Sharing with our affiliated companies: Your user information may be shared with our affiliated companies. We will only share necessary user information and subject to the purposes stated in this Privacy Policy. If affiliated companies want to change the purpose of processing user information, they will ask for your authorization and consent again.

4) Sharing with authorized partners: Only to achieve the purpose stated in this policy, some of our services will be provided by authorized partners. We may share some of your user information with partners to provide better customer service and user experience. We will only share your user information for legal, legitimate, necessary, specific, and clear purposes, and we will only share user information necessary to provide services. In order to better operate and improve technology and services, you agree that we and our authorized partners can use the collected information for other services and purposes in compliance with relevant laws and regulations.

We will sign strict confidentiality agreements with companies, organizations and individuals with whom we share user information, requiring them to handle user information in accordance with our instructions, this Privacy Policy and any other relevant confidentiality and security measures.

2. Transfer

We will not transfer your user information to any company, organization or individual, except in the following circumstances:

1) Transfer with explicit consent: After obtaining your explicit consent, we will transfer your user information to other parties;

2) When mergers, acquisitions or bankruptcy liquidations are involved, if user information is transferred, we will require the new company or organization that holds your user information to continue to be bound by this privacy policy. Otherwise, we will require the company or organization to continue to be bound by this privacy policy. Re-ask for your authorization and consent.

3.Public disclosure

We will only publicly disclose your user information under the following circumstances:

1). After obtaining your explicit consent;

2). Disclosure based on law: We may publicly disclose your user information when required by laws, legal procedures, lawsuits or mandatory requirements from government authorities.

4. Exceptions to obtaining prior authorization and consent when sharing, transferring, or publicly disclosing information

Please understand that in accordance with laws, regulations and relevant national standards, we do not need to obtain your authorization to share, transfer, or publicly disclose your user information in the following circumstances:

1). Directly related to national security and national defense security;

2). Directly related to public safety, public health, and major public interests;

3). Directly related to criminal investigation, prosecution, trial and judgment execution;

4). To protect your or other individuals’ life, property and other major legitimate rights and interests but it is difficult to obtain your consent;

5). Information that you disclose to the public on your own;

6). Collected from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels.

●How we protect your user information

1) We have used security protection measures that comply with industry standards to protect the user information you provide and prevent data from unauthorized access, public disclosure, use, modification, damage or loss. We will take all reasonable and feasible measures to protect your user information. For example, the data exchanged between your browser and the "Service" is protected by SSL encryption; we also provide https secure browsing on the website; we will use encryption technology to ensure the confidentiality of data; we will use trusted protection mechanisms To prevent data from being maliciously attacked; we will deploy access control mechanisms to ensure that only authorized personnel can access user information; and we will hold security and privacy protection training courses to enhance employees' awareness of the importance of protecting user information.

2) We will take all reasonable and feasible measures to ensure that no irrelevant user information is collected. We will only retain your user information for the period necessary to achieve the purposes stated in this policy, unless an extension of the retention period is required or permitted by law.

3) The Internet is not an absolutely secure environment, and emails, instant messaging, and communication with other users are not encrypted. We strongly recommend that you do not send user information through such methods.

4) The Internet environment is not 100% safe, and we will try our best to ensure the security of any information you send us. Even if we make great efforts and take all reasonable and necessary measures, we may still be unable to prevent your user information from being illegally accessed, illegally stolen, illegally tampered with or destroyed, resulting in damage to your legitimate rights and interests. Please understand the above risks of information networks and bear them voluntarily.

5) After an unfortunate user information security incident occurs, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, and the measures you can take to prevent and control your own information. Recommendations for reducing risks, remedial measures for you, and more. We will promptly notify you of the incident-related information through emails, letters, phone calls, push notifications, etc. When it is difficult to inform the user information subjects one by one, we will issue announcements in a reasonable and effective manner. At the same time, we will also proactively report the handling of user information security incidents in accordance with the requirements of regulatory authorities.

●Your rights

We attach great importance to your concerns about personal information and do our best to protect your rights to access, correct, delete and withdraw consent to your personal information so that you have the full ability to protect your privacy and security. Your rights include:

1. Access your user information

You have the right to access your user information, except for exceptions provided by laws and regulations. If you want to exercise your data access rights, you can access it yourself in the following ways: Open the Wellborne Plus APP and click on the "Menu" page - "Account Management"

2. Correct your user information

When you find errors in the user information we process about you, you have the right to ask us to make corrections. You can apply for correction through the methods listed in "(1) Access to your user information".

3. Delete your user information

You can make a request to us to delete user information under the following circumstances:

1). If our handling of user information violates laws and regulations;

2). If we collect and use your user information without your consent;

3). If our handling of user information violates our agreement with you;

4). If you no longer use our products or services, or you cancel your account;

5). If we no longer provide you with products or services.

We will evaluate your deletion request and, if the corresponding requirements are met, we will take appropriate steps to process it. When you make a deletion request to us, we may ask you for identity verification to protect the security of your account. When you delete information from our services, due to applicable laws and security technologies, we may not immediately delete the corresponding information from the backup system. We will securely store your information until the backup can be cleared or anonymized.

4. Change the scope of your authorization and consent

You can change the scope of your authorization for us to continue collecting personal information or withdraw your authorization by deleting information, turning off device functions, and setting privacy settings in the Wellborne Plus software. You can also withdraw all authorization for us to continue collecting your personal information by canceling your account.

When you withdraw your consent, we will no longer process the corresponding user information. At the same time, please note that your withdrawal of authorization consent may lead to certain consequences. For example, we may not be able to continue to provide you with corresponding services or specific functions. However, your decision to withdraw your consent will not affect the previous activities based on your authorization. processing of user information.

5. User information subject cancels account

You can cancel the previously registered account at any time. You can do it by yourself in the following ways: Open the Wellborne Plus charge APP and click the "Menu" page - "Account Management" - "Cancel"

After canceling your account, we will stop providing you with products or services and delete or anonymize your information based on your request, unless otherwise provided by laws and regulations. This may also cause you to lose access to the data in your account, so please proceed with caution.

6. Respond to your above request

For security reasons, you may be required to provide a written request or otherwise prove your identity. We will respond to your request within 30 days after receiving your feedback and verifying your identity.

In principle, we do not charge fees for your reasonable requests, but for repeated requests that exceed reasonable limits, we will charge a certain cost depending on the situation. We may reject requests that are unreasonably repetitive, require excessive technical means (for example, require the development of new systems or fundamentally change existing practices), pose risks to the legitimate rights and interests of others, or are highly impractical. Please also understand that due to security considerations, relevant laws and regulations, or technical limitations, we may not be able to respond to some of your requests, such as the following situations:

1). Relevant to the user information controller’s performance of obligations stipulated in laws and regulations;

2). Directly related to national security and national defense security;

3). Directly related to public safety, public health, and major public interests;

4). Directly related to criminal investigation, prosecution, trial and execution of judgments;

5). The user information controller has sufficient evidence to show that the user information subject has subjective malice or abuses rights;

6). To protect the life, property and other major legitimate rights and interests of the user information subject or other individuals but it is difficult to obtain the consent of the user;

7). Responding to the request of the user information subject will cause serious damage to the legitimate rights and interests of the user information subject or other individuals or organizations;

8). Involving business secrets.

●How your user information is stored and transferred globally

In principle, user information we collect and generate within the territory of the People's Republic of China will be stored within the territory of the People's Republic of China. We will only retain your user information for the period required for the purposes and uses stated in this policy and the minimum period stipulated by laws and regulations. After the above retention period is exceeded, we will delete your user information in accordance with the requirements of applicable laws and regulations or Anonymization. Unless otherwise provided by laws and regulations, or for purposes of public interest, scientific and historical research, etc., or unless otherwise authorized by you, we may need to retain relevant data for a longer period of time.

Because we provide products or services through resources and servers around the world, this means that, with your authorization and consent, your user information may be transferred to overseas jurisdictions in the country/region where you use the products or services, or subject to access from these jurisdictions.

Such jurisdictions may have different or no data protection laws. In such cases, we will ensure that your user information is adequately protected within the People's Republic of China. For example, we will ask for your consent to cross-border transfer of user information, or implement security measures such as data de-identification before cross-border data transfer.

● How to update this policy

Our privacy policy may change. We will not reduce your rights under this Privacy Policy without your explicit consent. We will post any changes to this policy on this page.

For major changes, we will also provide more prominent notices. Major changes referred to in this policy include but are not limited to:

1). Our service model has undergone major changes. Such as the purpose of processing user information, the type of user information processed, the use of user information, etc.;

2). We have undergone major changes in ownership structure, organizational structure and other aspects. Such as changes in owners caused by business adjustments, bankruptcy mergers, etc.;

3). The main objects of user information sharing, transfer or public disclosure change;

4). There are significant changes in your rights to participate in the processing of user information and how you exercise them;

5). When our responsible department, contact information and complaint channels for handling user information security change;

6). When the user information security impact assessment report indicates that there is a high risk.

We will also archive older versions of this policy for your review.

●How to contact us

If you have any questions, comments or suggestions about this Privacy Policy, please contact us through the following methods:

Email: contact@wellborne.fr

Generally, we will verify and handle your problem within thirty days . If other laws and regulations require a shorter response time, we will strictly comply with the laws and regulations.

If you are not satisfied with our response, especially if our user information processing behavior has harmed your legitimate rights and interests, you can also file a complaint or report to the relevant regulatory authorities, or file a lawsuit with the court with jurisdiction over the defendant's domicile. solution.