Privacy Policy


1.Privacy Policy Statement

Dear user, hello! Your privacy is important to Shanghai Rockcore Electronics Technology Co., Ltd. (hereinafter referred to as "Rockcore" or "we"). We are committed to protecting the security of your personal information. Therefore, we have formulated the "Rockcore Privacy Policy" (hereinafter referred to as "this policy"), which covers how Rockcore Electronic APP collects, uses, stores, shares, and protects personal information.

Last updated: []


Before you use Rockcore Electronics APP (hereinafter referred to as "APP" or "Service"), we hope you carefully read this policy and pay special attention to the highlighted terms to fully understand the content of each term. Please start using this APP only after confirming that you fully understand and agree to this policy.


This policy will help you understand the following:

1.1 How we collect and use your personal information

1.2 How we share, transfer, and disclose your personal information

1.3 How we protect your personal information

1.4 How you manage your personal information

1.5 How we use cookies or similar technologies

1.6 How we handle personal information of minors

1.7 How this privacy policy is updated

1.8 How to contact us


2.Rules for collecting and using personal information

2.1 Definitions and Scope of Application of this Policy

Personal information refers to various information recorded electronically or by other means that is related to identified or identifiable natural persons, excluding anonymized information.

Sensitive personal information refers to personal information that, once leaked or illegally used, may easily lead to infringement of the dignity of natural persons or endanger their personal and property safety. It includes biometric data, religious beliefs, specific identities, medical and health information, financial accounts, travel trajectories, and personal information of individuals under the age of fourteen.

Personal information does not include comprehensive information. Comprehensive information refers to any information or data about products, services, or customer groups or categories that we collect from inverters and can be obtained through this app, from which personal customer identities have been removed, and specific individuals cannot be identified through such information. Comprehensive information helps us understand trends and customer needs, which enables us to consider new products and services, so that existing products and services can be customized according to customer demands.

Rockcore Electronics APP...

2.2 What personal information do we collect from you

2.2.1. When you register an account on the Rockcore Electronics app, the information we collect includes: username, password, phone number, and email address in order to assist you in creating an account.

2.2.2. When you register an account on the Rockcore Electronics app as a terminal account, we will collect relevant information about the photovoltaic system, including: power station name, configuration information, generation data, and system alarm data, so that you can manage the photovoltaic system.

2.2.3.When you visit our website, we may automatically collect certain information, such as the website you linked from, as well as the time and date of your visits, purchases, and activities.

2.2.4.When you contact our technical support through phone, email, or chat, we may save your chat logs and content, as well as the contact information you leave behind and any other information you provide, in order to contact you or assist you in resolving issues.

2.2.5.When you use the services we provide, we may collect relevant data about the micro inverter you are connected to. When you start using the software and services, information will be automatically processed through automated data processing technologies.

2.2.6.When you use the services we provide, in order to ensure the security of your account and the system operation, we will collect your browsing, operation, search, click, and other information as relevant network logs for storage. This includes your device information (IDFA, operating system, device model, device manufacturer, system version, Android ID, IMEI, and MAC address), account information, access date and time, and IP address.

According to applicable laws, certain categories of personal information about you that we collect and process (indicated by *) may be considered as "sensitive personal information." For sensitive personal information mentioned in this policy, we will also highlight it in bold and underline to draw your attention to carefully read and pay attention to the relevant explanations regarding the collection and use of sensitive personal information.

2.3 How we use your personal information

2.3.1 Use of personal information

  1. Providing services to you.
  2. Meeting your personalized needs. For example, language settings, location settings, personalized assistance services.
  3. Product development and service optimization. For example, when our system malfunctions, we will record and analyze the information generated during the system failure to optimize our services.
  4. Security protection. For example, we will use your information for identity verification, security precautions, anti-fraud monitoring, archival backup, customer security services, etc. For example, the security software you download or install may detect malicious programs or viruses, or identify fraudulent information for you.
  5. Software management. For example, conducting software authentication, software upgrades, etc.

2.3.2 Sharing Personal Information

  1. Sharing your personal information with external parties as required by applicable laws, regulations, legal procedures, or mandatory administrative or judicial requests.
  2. Sharing your personal information is necessary to fulfill the core functions of our products and services or to provide you with the services you require.
  3. If you are an end user, in order to provide you with relevant products or services, show you content that you may be interested in, and protect the security of your account, we may share your personal information with your installer/dealer/other service providers for them to carry out after-sales services. However, we will only share necessary personal information and it will be subject to the purposes stated in this privacy policy. If any of the aforementioned parties intends to change the purpose of processing personal information, your authorization and consent will be sought again.
  4. Provided for academic research purposes.
  5. Provided according to the terms and conditions stated in the individual service agreement or other legal documents signed with you.

2.3.3 Disclosure of personal information.

Your personal information may be disclosed in the following circumstances:

  1. After obtaining your explicit consent;
  2. In accordance with relevant laws and regulations, or to comply with legal procedures;
  3. Based on the decisions of government departments or requests from other authorized organizations;
  4. To protect the legitimate rights and interests of the Company and other customers, or to respond to any claims or protect rights;
  5. If necessary for legitimate purposes, such as being part of any merger, sale of company assets, or acquisition, it may be disclosed during negotiations.

In the above scenarios, we will keep a record of the content, time, reasons, and recipients of the information disclosure.

2.3.4 Transfer of personal information

We will not transfer your personal information to any company, organization, or individual, except in the following circumstances:

  1. After obtaining your explicit consent;
  2. In cases involving mergers, acquisitions, transfers, and other similar situations, your personal information may be transferred along with the business. We will require the new entity holding your personal information to continue to be bound by this policy. Otherwise, we will seek your authorization and consent again from the new company or organization.

2.3.5 Personal information entrusted for processing

If we entrust a third party to process your personal information, we will sign strict confidentiality agreements with them. We will require them to handle your personal information in accordance with our instructions, this policy, and any other relevant confidentiality and security measures.


3.Protection of personal information

3.1 We strictly adhere to laws and regulations to protect user information. We will use various security measures, such as encryption technology and anonymization, within a reasonable level of security to ensure the safety of information.

3.2 Your account information can only be accessed online through the use of a password. To protect the confidentiality of your personal information, you must safeguard your password and password access privileges and refrain from disclosing your password to anyone else. If others have access to your email, they may be able to obtain your password access privileges and access your personal information or make changes to your user profile. We recommend that you take all necessary precautions to protect your personal information while using this product, such as regularly changing your password, using a combination of letters and numbers, and ensuring the use of a secure browser.

3.3We will take all reasonable and feasible measures to ensure that irrelevant personal information is not collected. We will only retain your personal information for the period necessary to achieve the purposes stated in this policy, unless an extension of the retention period is required or permitted by law.

3.4 We will make every effort to ensure the security of any information you send to us. However, please understand that due to technological limitations and the presence of malicious activities in the online environment, we cannot guarantee 100% security of information. You need to be aware that the system and communication networks you use to access our services may experience issues beyond our control.

3.5In the unfortunate event of a personal information security incident, we will promptly inform you in accordance with legal requirements. This includes providing you with the basic details of the security incident and its potential impact, the measures we have taken or will take to address the incident, recommendations for you to mitigate risks and protect yourself, and any remedial actions available to you. We will notify you of the incident through means such as email, phone, or push notifications. If it is difficult to inform each individual affected, we will make a public announcement in a reasonable and effective manner. Additionally, we will proactively report the handling of the personal information security incident to regulatory authorities as required.


4.How do you manage your personal information

We attach great importance to the management of your personal information and strive to ensure your rights to access, correct, delete, withdraw consent, and exercise other legal rights regarding your personal information. We aim to provide you with the necessary tools and capabilities to safeguard your privacy and personal information security. Your rights include:


1.Accessing and correcting your personal information

4.1.1 You have the right to access and correct your personal information at any time, except as otherwise provided by laws and regulations.【……】

4.1.2 For any other personal information generated during your use of the app that requires access or correction, please feel free to contact us. We will respond to your requests in accordance with the methods and timeframes specified in this policy.


2.Deleting your personal information

In the following circumstances, we will proactively delete your personal information. If we have not deleted it, you can request us to delete your personal information:

  1. If our handling of personal information violates laws and regulations or breaches agreements;
  2. If we collect or use your personal information without obtaining your consent, or if you have withdrawn your consent;
  3. If the purpose of processing has been achieved, cannot be achieved, or is no longer necessary for the purpose of processing;
  4. If we no longer provide products or services to you, or if the retention period has expired;
  5. Other circumstances as stipulated by laws and administrative regulations.

4.3 Change or withdraw your consent.

4.3.1You can change the scope of your authorization for us to continue collecting personal information by deleting information, disabling device features, adjusting privacy settings in the app, or you can withdraw your consent entirely by closing your account.

4.3.2 Please understand that the services we provide may require the collection of necessary personal information in order to function properly. When you withdraw your consent, we will no longer process the corresponding personal information, and we will be unable to continue providing the services associated with the withdrawn consent. However, your decision to withdraw consent will not affect any personal information processing that has already been carried out based on your prior authorization.

4.4 Deactivate your account.

4.4.1 You can deactivate your previously registered account at any time. The specific methods include:

  1. Online account deactivation
  2. Contact customer service

4.4.2After deactivating the account, the content, information, data, etc. associated with that account will be deleted or anonymized (except as otherwise provided by laws and regulations or required by regulatory authorities). At the same time, once the account is deactivated, it cannot be recovered.

4.5 Responding to your request

4.5.1If you are unable to access, correct, or delete your personal information through the above methods, or if you need to access, correct, or delete other personal information generated during your use of the app, or if you believe that there is any violation of laws and regulations by the company or any breach of the agreement regarding the collection or use of your personal information, you can send an email to [email protected] or contact us through other methods provided below this policy.

4.5.2In order to ensure security, we may require you to provide a written request or other means of proving your identity. We will respond to your request within fifteen (15) days after receiving your feedback and verifying your identity. We generally do not charge fees for reasonable requests, but for repeated or excessive requests beyond reasonable limits, we may charge a certain cost. We may refuse requests that are unreasonably repetitive, require excessive technical means (such as developing new systems or fundamentally changing current practices), pose risks to the legitimate rights of others, or are highly impractical (such as requests involving information stored on backup tapes).

4.5.3In the following circumstances, we may not be able to respond to your request as required by laws and regulations:

  1. Related to the obligations of the personal information controller as required by laws and regulations.
  2. Directly related to national security or defense security.
  3. Directly related to public safety, public health, or significant public interests.
  4. Directly related to criminal investigation, prosecution, trial, and execution of judgments.
  5. There is sufficient evidence to suggest that you have subjective malice or abuse of rights.
  6. In order to protect your or other individuals' significant lawful rights and interests such as life and property, but it is difficult to obtain your consent.
  7. Responding to your request would result in severe harm to the lawful rights and interests of the individual data subject or other individuals/organizations.
  8. Involving trade secrets.


5.Regarding cookies and similar technologies

5.1 To ensure the normal and efficient operation of our website, we store small data files called cookies on your web browser or mobile application. The content of cookies can only be retrieved or read by the server that created them. Each cookie is unique to your web browser or mobile application. Using cookies can help you save time by avoiding repetitive input of personal information, search queries, steps, and processes (e.g., form filling, search history), optimize your selection and interaction with advertisements, help determine your login status, and enhance account or data security.

5.2 We will not use cookies and similar technologies for any purposes other than those described in this policy. You can manage or delete cookies according to your preferences. Most browsers provide the functionality to clear browser cache data, and you can perform the corresponding data clearing operation in the browser settings. However, you may not be able to fully experience certain convenient and secure service features as a result.


6.Terms of Use for Minors

6.1 We highly value the protection of personal information of minors. If you are under the age of eighteen, you should obtain consent and guidance from your parents or guardians before using our products and services to ensure their proper use.

6.2 We do not actively collect personal information directly from minors. In cases where we collect personal information of minors with the consent of their guardians, we will only use, share, transfer, or disclose this information in compliance with applicable laws, with the consent of the guardians, or as necessary to protect the minors.

6.3 If we discover that we have collected personal information of minors without obtaining verifiable consent from their parents or legal guardians beforehand, we will make efforts to promptly delete the relevant data.


7.Revision and Notification of Privacy Policy

7.1 In order to provide you with better services and in line with the development of our business, we may revise this policy as necessary. These revisions will form part of this policy and will have equal effect as the original policy.

7.2 If such changes result in a substantial impairment of your rights under this policy, we will notify you before the changes take effect through prominent notices on our website, or by sending you an email. In such cases, if you continue to use our services, it will be deemed as your acceptance of the revised policy and its binding effect on you.


8.How to Contact Us

8.1 If you have any questions, concerns, or suggestions regarding this privacy policy, please contact us by sending an email to 【】 or by calling our customer service hotline at【】.

8.2 We will review the issue as soon as possible and respond within fifteen (15) business days after verifying your user identity.




Effective Date: February 1, 2024

Updated Date: February 1, 2024

INQUIRY NOWArrow Downa small down arrow to minimize chat box

*
*
*
*
*