Notice Clauses:
Hangzhou ToupTek Photonics Co., Ltd. is a limited liability company established under the laws of the People's Republic of China. We value the protection and safeguarding of users' personal information. To this end, we have formulated this "Legal Notice and Privacy Policy" (hereinafter referred to as "this Policy"). This Policy applies exclusively to the StellaVita software products or services independently developed by ToupTek. We remind you: Before using the products or services, you must carefully read and thoroughly understand this Policy. Only after confirming full understanding and agreement should you proceed to use the products or services. Once you start using the products or services, it will be deemed as your acceptance and recognition of the contents of this Policy.
Last Updated Date: June 6, 2025
Definition Clauses:
You: Refers to an individual using our products or services, including individuals using our products or services through an account under an institutional client.
We: Refers to the provider of the software products or services, Hangzhou ToupTek Photonics Co., Ltd., and its parent companies, subsidiaries, affiliated companies, etc. (or referred to as "ToupTek").
Products or Services: Refers to the StellaVita software products or services independently developed by ToupTek.
Personal Information: Refers to the information you submit or we collect, recorded electronically or by other means, that can identify a specific natural person alone or in combination with other information, or reflect the activities of a specific natural person. This includes, but is not limited to, name, identification document number, communication contact details, address, account password, financial status, location tracks, etc.
Child: Refers to a minor under the age of fourteen (14).
This Policy will help you understand the following content:
I. How We Collect and Use Your Personal Information
II. How We Use Cookies and Similar Technologies
III. How We Share, Transfer, and Publicly Disclose Your Personal Information
IV. How We Protect Your Personal Information
V. Your Rights
VI. How We Handle Children's Personal Information
VII. How Your Personal Information is Stored and Transferred Globally
VIII. How This Policy is Updated
IX. How to Contact Us
We deeply understand the importance of your personal information and will make every effort to protect its security and reliability. We are committed to maintaining your trust in us and adhere to the following principles to protect your personal information: the principle of consistent rights and responsibilities, the principle of clear purpose, the principle of choice and consent, the principle of minimum sufficiency, the principle of ensuring security, the principle of subject participation, and the principle of openness and transparency. At the same time, we promise to adopt corresponding security protection measures in line with mature industry standards to protect your personal information.
1.1 Personal Information We Collect and Use During Your Use of ToupTek Software Products or Services
1.1.1 Information We Collect is as Follows:
Location Data
To provide astronomical observation and photography functions, this application needs to obtain your geographical location data for device calibration, celestial object positioning, and astronomical event prediction.
Collection Method: Via device GPS, Wi-Fi, or mobile network.
Purpose: To control astronomical equipment, locate celestial objects, and predict astronomical events.
Storage: Used only for real-time calculations, not stored long-term or uploaded to servers.
Photo Data
This application may access your photo data to save astronomical observation images or import photos for analysis.
Collection Method: Via device camera or photo album access.
Purpose: To save astronomical images or import pictures for analysis.
Storage: Images taken or imported by the user are only stored locally on the device and are not automatically uploaded to servers.
Device Information
To optimize application performance, we may collect the following device information:
Device model
Operating system version
Application version number
Network status (Wi-Fi or mobile network)
Purpose: To optimize performance, resolve technical issues, and improve user experience.
Log Information
When using this application, we may collect the following logs:
Application usage (e.g., frequency of feature use)
Error logs
Purpose: To analyze application performance, troubleshoot problems, and improve the experience.
1.1.2 During your use of our products or services, we will only collect and use your personal information for the business functions described in this Policy. The purpose of collecting personal information is to provide you with products or services, optimize our products or services, and safeguard your account security. You have the right to choose whether or not to provide such personal information. However, in most cases, if you do not provide it, we may be unable to provide you with the corresponding services or respond to the problems you encounter.
1.1.3 The personal information you provide above will be authorized for us to use during the period you use this service. When you cease using the products or services, we will stop using and delete the aforementioned personal information.
1.1.4 We guarantee that we will legally de-identify or anonymize collected personal information. Information that cannot identify a natural person's personal identity alone or in combination with other information does not fall under the category of personal information requiring de-identification or anonymization. If we combine such information not requiring de-identification or anonymization with other information to identify your personal identity, or when used in conjunction with your personal information, we will treat such information as your personal information during the period of combined use and process it in accordance with this Policy, de-identifying or anonymizing it.
1.1.5 To better operate and improve our technology and services, or due to changes in business strategy, if the collection, use, or processing of personal information required for the products or services we provide exceeds the scope described above, or if we intend to use the collected personal information for purposes not stated in this Policy, or if we intend to use information collected for specific purposes for other purposes, we will notify you within a reasonable period after obtaining the information or before processing it and obtain your authorization and consent.
1.2 Application Permission Requests and Usage Description
1.2.1 You can decide to enable or disable these permissions yourself. You can view the status of permissions in your device's "Settings".
1.2.2 Please note that enabling any permission means you authorize us to collect and use related personal information to provide you with the corresponding service. Once you disable any permission, it means you have withdrawn your authorization. We will no longer continue to collect and use the relevant personal information based on that permission and will be unable to continue providing you with the service corresponding to that permission. Your decision to turn off permissions will not affect the previous collection and use of information based on your authorization.
1.3 Exceptions Requiring Authorization and Consent
Please understand that according to laws, regulations, and relevant national standards, in the following circumstances, we may collect and use your personal information without your authorization and consent:
1.3.1 When it is directly related to national security and national defense security;
1.3.2 When it is directly related to public security, public health, and significant public interests;
1.3.3 When it is directly related to criminal investigation, prosecution, trial, and execution of judgments, etc.;
1.3.4 When it is necessary to protect the life, property, and other significant legitimate rights and interests of you or other individuals but it is difficult to obtain the consent of the individual;
1.3.5 When the personal information is disclosed by you to the public on your own initiative;
1.3.6 When the personal information is collected from legally disclosed information, such as through lawful news reports, government information disclosure, and other channels;
1.3.7 When it is necessary for the conclusion or performance of a contract or other written document as per your request;
1.3.8 When it is necessary for maintaining the safe and stable operation of the provided products and/or services, such as discovering and handling failures of the products and/or services;
1.3.9 When the personal information controller is a news agency and it is necessary for carrying out lawful news reporting for the public interest;
1.3.10 When it is necessary for academic research institutions to conduct statistical or academic research based on public interest, and when the results provided externally include de-identified or anonymized personal information;
1.3.11 Other circumstances stipulated by laws and regulations.
2.1 Cookies
2.1.1 To ensure the normal operation of the products or services, we will store small data files called Cookies on your computer or mobile device. Cookies usually contain an identifier, site name, and some numbers and characters. With the help of Cookies, the products or services can store your access preference data. We can only read the Cookies we provide.
2.1.2 We will not use Cookies for any purpose beyond those stated in this Policy. You can manage or delete Cookies according to your preferences. You can clear all Cookies saved on your computer; most web browsers have the function to block Cookies. However, if you do so, you will need to manually change user settings each time you visit our products or services.
2.2 Web Beacons and Pixel Tags
2.2.1 In addition to Cookies, we may use other similar technologies such as web beacons and pixel tags on our products or services. For example, emails we send to you may contain links to the content of our products or services.
2.2.2 If you click on such a link, we will track this click to help us understand your product or service preferences and improve customer service. Web beacons are usually transparent images embedded in websites or emails. With pixel tags in emails, we can know whether an email has been opened. If you do not wish your activities to be tracked in this way, you can unsubscribe from our mailing list at any time.
2.3 If your browser has enabled Do Not Track, all our products or services will respect your choice.
3.1 Sharing
We will not share your personal information with any other company, organization, or individual, except in the following circumstances:
3.1.1 Sharing with explicit consent: After obtaining your explicit consent, we will share your personal information with other parties;
3.1.2 We may share your personal information externally as required by laws and regulations or mandatory requirements from competent government authorities;
3.1.3 Sharing with our affiliated companies: Your personal information may be shared with our affiliated companies. We will only share necessary personal information, which is constrained by the purposes stated in this Policy. If affiliated companies wish to change the purpose of personal information processing, they will seek your authorization and consent again;
3.2 For companies, organizations, and individuals with whom we share personal information, we sign strict confidentiality agreements requiring them to process personal information according to our instructions, this Policy, and any other relevant confidentiality and security measures. (Note: Section 3.2 was missing in the original Chinese text; this clause is inferred based on standard privacy policy structure and context).
3.3 Transfer
We will not transfer your personal information to any company, organization, or individual, except in the following circumstances:
3.3.1 Transfer with explicit consent: After obtaining your explicit consent, we will transfer your personal information to other parties;
3.3.2 In the event of a merger, acquisition, or bankruptcy liquidation, if personal information transfer is involved, we will require the new holder of your personal information to continue to be bound by this Policy. Otherwise, we will require that company or organization to seek your authorization and consent again under a new privacy policy.
3.4 Public Disclosure
We will only publicly disclose your personal information under the following circumstances:
3.4.1 After obtaining your explicit consent;
3.4.2 Disclosure based on law: We may publicly disclose your personal information when required by law, legal procedures, litigation, or mandatory requirements from government authorities.
3.5 Exceptions Requiring Prior Authorization and Consent for Sharing, Transferring, or Public Disclosure
Please understand that according to laws, regulations, and relevant national standards, in the following circumstances, we may share, transfer, or publicly disclose your personal information without your authorization and consent:
3.5.1 When it is directly related to national security and national defense security;
3.5.2 When it is directly related to public security, public health, and significant public interests;
3.5.3 When it is directly related to criminal investigation, prosecution, trial, and execution of judgments;
3.5.4 When it is necessary to protect the life, property, and other significant legitimate rights and interests of you or other individuals but it is difficult to obtain the consent of the individual;
3.5.5 Information you have disclosed to the public on your own initiative;
3.5.6 Information collected from legally disclosed sources, such as lawful news reports and government information disclosure channels.
4.1 We have used security protection measures that comply with industry standards to protect the personal information you provide, preventing it from unauthorized access, public disclosure, use, modification, damage, or loss. We will take all reasonably feasible measures to protect your personal information. For example, we use encryption technology to ensure the confidentiality of personal information; we use trusted protection mechanisms to prevent personal information from malicious attacks; we deploy access control mechanisms to ensure that only authorized personnel can access personal information; and we conduct security and privacy protection training courses to strengthen employees' awareness of the importance of protecting personal information.
4.2 We will take all reasonably feasible measures to ensure that we do not collect irrelevant personal information. We will only retain your personal information for the period necessary to achieve the purposes stated in this Policy, unless the retention period needs to be extended or is permitted by law.
4.3 The internet is not an absolutely secure environment, and communication methods such as email, instant messaging, and communication with other individuals are not encrypted. We strongly recommend that you do not send personal information through such methods.
4.4 Protecting the security of your personal information requires joint efforts from both you and us. Please do not disclose your login account and password to others. If you find that your personal information, especially your account or password, has been leaked, please contact us immediately so that we can take corresponding reasonable measures based on your request.
4.5 The internet environment is not 100% secure. We will do our best to ensure the security of any information you send to us. Even though we make great efforts and take all reasonable and necessary measures, it is still possible that we cannot completely prevent your personal information from being illegally accessed, stolen, tampered with, or destroyed, resulting in damage to your legitimate rights and interests. Please understand the above risks of information networks and voluntarily bear them.
4.6 In the unfortunate event of a personal information security incident, we will, as required by laws and regulations, promptly inform you of: the basic situation and possible impact of the security incident; the measures we have taken or will take; recommendations for you to prevent and reduce risks on your own; and remedial measures for you. We will promptly inform you of the relevant situation of the incident via email, letter, phone, push notification, etc. If it is difficult to inform each personal information subject individually, we will issue announcements in a reasonable and effective manner. At the same time, we will actively report the handling of personal information security incidents to the regulatory authorities as required.
5.1 Access Your Personal Information
You have the right to access your personal information, except as stipulated by laws and regulations. If you wish to exercise your access right, you can do so yourself in the following ways:
5.1.1 Personal Information -- If you wish to access or modify your personal profile information, you can do so by visiting the relevant personal information page within the StellaVita software application; Personal Password -- If you wish to access or modify your personal password, you can do so by visiting the account security page within the StellaVita software application;
5.1.2 If you are unable to access such personal information through the above methods, you can send an email to astro@touptek.com at any time, and we will respond to your access request as soon as possible.
5.2 Correct Your Personal Information
When you find that the personal information we process about you is incorrect, you have the right to request us to correct it. You can send an email to astro@touptek.com at any time, and we will respond to your request as soon as possible.
5.3 Delete Your Personal Information
You may request us to delete personal information under the following circumstances:
5.3.1 If our processing of personal information violates laws and regulations;
5.3.2 If we collect or use your personal information without your consent;
5.3.3 If our processing of personal information violates our agreement with you;
5.3.4 If you no longer use our products or services and you have deactivated your account;
5.3.5 If we no longer provide you with products or services.
We will evaluate your deletion request and take corresponding steps to process it if the relevant provisions are met.
5.3.6 When you submit a deletion request to us, we may require you to verify your identity to ensure account security. After information is deleted from our service, due to applicable laws and security technology, we may not immediately delete the corresponding information from our backup systems. We will securely store your information until the backups can be cleared or anonymized. However, your decision to delete will not affect the previous processing of personal information based on your authorization.
5.4 Change the Scope of Your Authorization and Consent
Each business function requires some basic personal information to be completed (see the "Notice Clauses" section of this Policy). For the collection and use of personal information, you can give or withdraw your authorization and consent at any time. You can operate it yourself in the following ways:
5.4.1 By visiting the authorization page within the StellaVita software application to reset the authorization consent status for your personal information;
5.4.2 After you withdraw your consent, we will no longer process the corresponding personal information. Please also note that revoking your authorization may lead to certain consequences, such as us being unable to continue providing you with corresponding services or specific functions. However, your decision to withdraw consent will not affect the previous processing of personal information based on your authorization.
5.5 Personal Information Subject Account Deactivation
5.5.1 You can deactivate your registered account at any time by sending an email to astro@touptek.com.
5.5.2 After account deactivation, we will stop providing you with products or services and, upon your request, delete or anonymize your information, unless otherwise stipulated by laws and regulations. This may also result in you losing access to the data in your account. Please proceed with caution.
5.6 Restrict Automated Decision-Making
In certain business functions, we may make decisions solely based on non-human automated decision-making mechanisms, including information systems and algorithms. If these decisions significantly affect your legitimate rights and interests, you have the right to request an explanation from us, and we will also provide appropriate remedies.
5.7 Responding to Your Above Requests
5.7.1 To ensure security, you may need to provide a written request or prove your identity in another way. We may require you to verify your identity before processing your request.
5.7.2 We will respond within fifteen (15) working days. If you are not satisfied, you can also complain through the following channels: [Note: The original text said "supplement other appeal channels" without specifying them. This placeholder is retained.]
5.7.3 For your reasonable requests, we generally do not charge fees. However, for repeated requests multiple times or exceeding reasonable limits, we may charge a certain cost fee depending on the situation. We may reject requests that are groundlessly repeated, require excessive technical means (e.g., developing new systems or fundamentally changing current practices), pose risks to the legitimate rights and interests of others, or are very impractical. Please also understand that due to security considerations, requirements of relevant laws and regulations, or technical limitations, we may not be able to respond to certain requests, such as the following circumstances:
5.7.3.1 Related to the personal information controller fulfilling obligations stipulated by laws and regulations;
5.7.3.2 Directly related to national security and national defense security;
5.7.3.3 Directly related to public security, public health, and significant public interests;
5.7.3.4 Directly related to criminal investigation, prosecution, trial, and execution of judgments;
5.7.3.5 Where there is sufficient evidence that the personal information subject has subjective malice or abuses rights;
5.7.3.6 Necessary for protecting the life, property, and other significant legitimate rights and interests of the personal information subject or other individuals but it is difficult to obtain the individual's consent;
5.7.3.7 Responding to the personal information subject's request would seriously harm the legitimate rights and interests of the personal information subject or other individuals or organizations;
5.7.3.8 Involving trade secrets.
6.1 We attach great importance to the protection of children's personal information. Without parental or guardian consent, children should not create their own user accounts. If you are a child, we require you to ask your parent or guardian to carefully read this Policy and use our products or services and provide us with information only after obtaining their consent.
6.2 For the collection of children's personal information with parental or guardian consent, we will only store, use, share, transfer, or publicly disclose this information when permitted by law, with explicit parental or guardian consent, or when necessary to protect the child. Otherwise, we will strive to delete the relevant data as soon as possible.
6.3 Given current technology and business model limitations, it is difficult for us to actively identify children's personal information. If you discover that we have collected a child's personal information without knowledge or without obtaining verifiable guardian consent in advance, you can contact us promptly. We will strive to delete it promptly upon discovery. If we discover such circumstances ourselves, we will also delete the information in a timely manner, except where required by law to retain it.
7.1 In principle, the personal information we collect and generate within the territory of the People's Republic of China will be stored within the territory of the People's Republic of China. We will only retain your personal information for the period necessary for the purposes described in this Policy and for the minimum period stipulated by laws and regulations. After the aforementioned retention period expires, we will delete your personal information or anonymize it according to the requirements of applicable laws and regulations. Exceptions may apply if otherwise stipulated by laws and regulations, or for purposes of public interest, scientific or historical research, etc., or with your separate authorization and consent, in which case we may need to retain the relevant data for a longer period.
7.2 As we provide products or services through resources and servers distributed globally, this means that, after obtaining your authorization and consent, your personal information may be transferred to jurisdictions outside the country/region where you use the products or services, or be accessed from such jurisdictions.
7.3 Such jurisdictions may have different data protection laws or even lack relevant laws. Before carrying out the above actions, we will seek your consent. If you consent to the transfer of your personal information, we will ensure that it receives protection equivalent to that within the People's Republic of China. For example, we will request your consent for cross-border transfers of personal information or implement security measures such as data de-identification prior to cross-border data transfer.
8.1 This Policy may be changed. Without your explicit consent, we will not reduce your rights as per this Policy. We will post any changes made to this Policy on this page.
8.2 For significant changes, we will also provide more prominent notice. Significant changes referred to in this Policy include but are not limited to:
8.2.1 Significant changes in our service model. Such as the purpose of processing personal information, the types of personal information processed, the way personal information is used, etc.;
8.2.2 Significant changes in our ownership structure or organizational structure. Such as changes in ownership due to business adjustments, bankruptcy, mergers, etc.;
8.2.3 The main objects of personal information sharing, transfer, or public disclosure change;
8.2.4 Your rights regarding personal information processing and how they are exercised undergo significant changes;
8.2.5 The department responsible for personal information security within our company, contact methods, and complaint channels change;
8.2.6 Personal information security impact assessment reports indicate high risks.
9.1 If you have any questions, comments, or suggestions regarding this Policy, or wish to withdraw your authorization for us to use your personal information (account deactivation, canceling authorization which may result in some features not functioning normally), you can contact us in the following ways:
Email: astro@touptek.com
Phone: +0571-86683738
9.2 If you are not satisfied with our response, especially if our personal information processing activities have harmed your legitimate rights and interests, you may also complain or report to regulatory authorities such as the Cyberspace Administration, telecommunications, public security, and industry and commerce administrations.
Copyright © 2025 Hangzhou ToupTek Photonics Co., Ltd. All rights reserved.