腾博会官网·专业服务,诚信为本

  • Comprehensive Safety Protection
    Comprehensive Safety Protection
    Vision ensures system reliability with high-safety materials, multi-layer module protection, and stable control systems.
  • All-Temperature Monitoring
    All-Temperature Monitoring
    Real-time thermal monitoring with early warnings and preventive actions to avoid safety incidents.
  • Full Lifecycle Monitoring
    Full Lifecycle Monitoring
    Battery Management System (BMS) continuously tracks and reports battery status, enhancing overall system safety.
  • Integrated Power
    Integrated Power
    Compact structure, smaller footprint, easy installation to meet fast deployment needs.
  • Modular Design
    Modular Design
    Flexible expansion and maintenance, reducing system failure risks and improving O&M efficiency.
  • High Integration
    High Integration
    Combines power supply, monitoring, and cooling functions, simplifying system setup and enhancing overall reliability.
  • Intelligent
    Intelligent
    Supports remote monitoring and smart alerts for full lifecycle power system management.
  • Smart Management Module with Real-Time Monitoring
    Smart Management Module with Real-Time Monitoring
    Built-in BMS enables real-time battery status tracking and early fault prevention.
  • High Safety & Wide Temperature Adaptability
    High Safety & Wide Temperature Adaptability
    Stable performance under extreme conditions ensures equipment safety.
  • Reusable & Pollution-Free
    Reusable & Pollution-Free
    Eco-friendly design supports sustainability with recyclable materials.
  • Long Cycle Life
    Long Cycle Life
    Durable and reliable for frequent, long-term use, reducing replacement costs.
  • Safe & Reliable
    Safe & Reliable
    Long battery lifespan design with full-lifecycle diagnostics ensures stable operation
  • Smart & Efficient
    Smart & Efficient
    Real-time precise thermal control minimizes cell temperature differences, enhancing lifespan
  • Highly Integrated
    Highly Integrated
    Modular design adaptable to various scenarios
  • Easy Maintenance
    Easy Maintenance
    OTA updates, mobile app management, and cloud-edge collaboration

Privacy Policy

This policy applies only to the products and services of Shenzhen Center Power Tech Co., Ltd. (“Vision Battery”).

This Privacy Policy explains:

1.  How we collect and use your information

2.  How we use cookies and similar technologies

3.  How we share, transfer, or disclose your information

4.  How we protect your information

5.  Your rights

6.  How your information is stored and transferred globally

7.  Updates to this policy

8.  How to contact us

We understand the importance of your information and are committed to protecting it. We follow principles such as accountability, purpose limitation, consent, data minimization, security, user participation, and transparency. We adopt industry-standard security measures to safeguard your information.

Please read this Privacy Policy carefully before using our products or services.

 

1. How We Collect and Use Your Information

(a) Information you provide or we collect during service use

We collect and use your information only for the purposes described in this policy, to provide you with products or services. You may choose whether to provide this information, but some services may not be available if you do not.Information we may collect includes:

● Phone number, email address

● Basic personal information (name, nationality, gender, occupation, address, contact details)

We use this information to provide services such as inquiries, after-sales support, technical communication, and identity verification.

(b) Marketing Emails

If you provide your email address, we may use it to send marketing emails about our products and services. You can unsubscribe at any time. Withdrawing consent will not affect the provision of our core services. By submitting your email, you agree to this use as described in this Privacy Policy.Where applicable, we anonymize or de-identify data. If non-personal information is combined with personal information, it will be treated as personal information during the combination period.

If we need to use your information for purposes beyond those described here, we will notify you and obtain your consent in advance.

(c) Exceptions to obtaining consent

Certain legal or public interest situations allow us to collect and use information without consent, including matters related to national security, public safety, legal obligations, or information you have made public.

 

2. Cookies and Similar Technologies

(a) Cookies

We use cookies to ensure proper website functionality. Cookies store identifiers, site names, numbers, and characters to remember your preferences. You may manage or delete cookies through your browser settings.

(b) Web beacons and pixel tags

We may use web beacons or pixel tags in emails to track clicks or email opens for improving services. You may unsubscribe anytime.

(c) Do Not Track

If your browser sends a “Do Not Track” request, we will respect your choice.

 

3. Sharing, Transfer, and Disclosure of Information

(a) Sharing

●  We do not share your information except:With your explicit consent

● As required by law or government authorities

● With our affiliates, only necessary data and for stated purposes

● With authorized partners, only as needed to provide services

(b) Transfer

●  Your information is not transferred to others except:With your consent

● During mergers, acquisitions, or bankruptcy, subject to the new entity following this policy or obtaining your consent

(c) Disclosure

●  We only disclose your information:With your consent

● As required by law or legal process

(d) Exceptions

Legal and public interest exceptions apply as described above.

 

4. How We Protect Your Information

We adopt reasonable measures to protect your information from unauthorized access, disclosure, alteration, or loss. Measures include SSL encryption, HTTPS access, trusted security systems, access control, and employee training.

Information is retained only as long as necessary for service purposes or legal requirements. Internet security cannot be guaranteed 100%; please be aware of potential risks.

In case of a data breach, we will notify you promptly, describing the incident, risks, and remediation steps, via email, phone, or other reasonable channels.

 

5. Your Rights

You may:

1.  Access your personal information

2.  Correct any inaccuracies

3.  Request deletion in cases of illegal processing, lack of consent, contract termination, service discontinuation, or other lawful grounds

4.  Modify your consent scope for data processing; withdrawing consent may limit some services, but does not affect past lawful processing

Requests can be sent to: info@fangyuansoft.com

 

6. Data Storage and Global Transfer

We primarily store data in China, retaining it only as long as necessary or required by law. With your consent, data may be transferred to other countries where we provide services. We ensure adequate protection of your data in such cases.

 

7. Updates to This Policy

We may update this policy. Your rights will not be reduced without consent. Major changes will be highlighted, including changes in:

● Service scope or purposes

● Company ownership or structure

● Data sharing or transfer practices

● Contact details for privacy matters

Previous versions will be archived for reference.

 

8. Contact Us

If you have questions, comments, or complaints:

 Email: info@fangyuansoft.com

● Phone: +86-0755-66851118

● Fax: +86-0755-66850678

We usually respond within 30 days. If unsatisfied, you may seek external resolution: jiangzelong@fangyuansoft.com