Booster Robotics Product Privacy Policy
Policy Update Date: 2025-10-22
Policy Effective Date: 2025-10-22
Thank you for choosing Booster Robotics (hereinafter referred to as “Booster”) . We will use this Booster Privacy Policy (hereinafter referred to as “this Policy”) to elaborate on how we collect, use, and store your personal information when you use Booster, as well as the relevant rights you enjoy. The key points are as follows:
-
Booster Robotics mentioned in this Policy (hereinafter referred to as “we”) is Beijing Booster Robotics Technology Co., Ltd., the service provider of Booster. Its registered address is: 301, Building 16, East Yongtaizhuang Village, Qinghe, Haidian District, Beijing, China . Contact information: (+86)400-865-2028.
-
Booster mentioned in this Policy refers to the Booster application software and its corresponding robot terminal.
-
Unless with your consent or as required by relevant laws and regulations or competent authorities, we shall not transfer your personal information to a third party .
We aim to provide the best experience for our users. If you have any questions regarding the personal information processing practices described in this Privacy Policy, please contact us through the method specified in Article 9 of this Privacy Policy, so that we can address your specific needs.
If you wish to learn more detailed information, please refer to the relevant sections according to the following index.
-
How We Collect and Use Your Personal Information
-
How We Use Cookies and Similar Technologies
-
How We Share, Transfer, and Disclose Your Personal Information
-
How We Protect Your Personal Information
-
How We Process Minors’ Personal Information
-
How We Ensure You Exercise Your Personal Rights
-
How This Policy Is Updated
-
How to Contact Us
The purpose of this Policy is to clarify to you the rules for Booster to process personal information, the activities of processing personal information, the way you manage your personal information, and how we protect your personal information. We will do our best to use easy-to-understand language to explain to you one by one the types of your personal information we collect and their corresponding purposes, so that you can understand the types, reasons for use, and collection methods of the specific personal information we collect for a specific function. We also use bold font to draw your attention to the clauses in this Policy that may be of great significance to your legitimate interests. We strongly recommend that you carefully read and fully understand all the contents of this Policy before opening, registering, logging in to your account, and using our products for the first time, and make appropriate choices independently.
If you do not agree to the contents of this Policy, we will not be able to process your personal information, and thus may not be able to provide you with complete product functions or services; if you start using our Booster, it shall be deemed that you have fully read and understood all the contents of this Policy, and we will process and protect your personal information in accordance with the rules for collection, use, storage, etc. stipulated in this Policy.
- How We Collect and Use Your Personal Information
We will collect and use your personal information for the following purposes stated in this Policy:
1.1 Helping You Become a Booster User
To help you become a Booster User and ensure the security of your personal information, we will collect your online identity information. Such online identity information may include your email address. Refusal to provide identity information may restrict your use of Booster’s functions or services. After you take the initiative to cancel your account, we will delete your personal information or anonymize it in accordance with legal requirements.
1.2 Providing Products and Services to You
1.2.1 Provision of Product Business Functions
Our basic business functions include:
(1) Connection between App and Robot
To enable you to connect and manage the robot through the App, we will connect to the robot’s WiFi via your App, or realize the connection when the robot and the App are in the same WiFi network. During this process, we need to collect your WiFi information, robot WiFi information, SSID, and robot ID.
(2) Robot Interaction Mode
To realize the two-way synchronous dialogue between the App and the Booster robot, as well as the recording, video recording, and photo-taking functions of the Booster robot, we need to obtain the microphone permission and camera permission of your mobile phone to realize the FPV function. The robot will collect image information, video information, and audio information through its own camera and microphone and transmit them to the App.
1.2.2 Product Improvement and Service Provision
(1) Customer Service and After-sales Service
To facilitate you to solve problems encountered in the use of the product more conveniently and efficiently, you can click the customer service option in the App to contact us directly, so that we can communicate with you in a timely manner regarding the problems you feedback. If you refuse to provide the above-mentioned personal information, the problems you encounter may not be solved in a timely manner, but it will not affect your use of other functions. If you choose to feedback problems by calling our customer service hotline, we may need you to provide necessary personal information for identity verification to ensure the security of your account. We may also save your contact information (the mobile phone number, email or other contact information you use or actively provide), the records and content of your calls with us, and other necessary information to provide you with customer service and keep records.
(2) Non-Personal Information
We may also collect other information that cannot identify a specific individual (i.e., information that is not personal information), such as statistical data generated when you use specific services, such as users’ operation behaviors (including clicks). The purpose of collecting such information is to improve the services we provide to you. The type and quantity of collected information depend on how you use our products and/or services. We will aggregate such information to help us provide more useful information to customers and understand which parts of our website, products, and services customers are most interested in. For the purpose of this Privacy Policy, aggregated data is regarded as non-personal information. If we combine non-personal information with personal information, such information will be regarded as personal information during the period of combined use.
1.3 Providing Operation and Maintenance and Security Assurance for You
We will receive and record your personal commonly used device information, fault information, and performance information according to the specific permissions you grant during the installation and use of the product, so as to analyze the operation status of our product and use it for product operation and maintenance and security assurance. The relevant personal information includes hardware device model, screen width and height, software version information, operating system and version, IP address, Mac address, geographic location information, mobile network information, your device SN information, device manufacturer, device model, operator, Android_id/IDFA/OpenUDID/GUID. For other necessary personal information, we will ask you through a pop-up window whether we can obtain the corresponding permission, and we will only obtain your relevant personal information after you choose to agree.
1.4 Description of Personal Information and System Permission Call
To provide you with complete product functions and/or services, we may need to use the system permissions in your device to collect relevant personal information. This part will summarize and sort out all personal information and all system permissions involved in the collection purposes mentioned in the previous parts of this section, so that you can understand the personal information of Booster and the system permission call situation more systematically, completely, and transparently. You can choose whether to authorize us to use the relevant permissions of your device, and even after authorization, you can turn off or turn on the permission by yourself again.
The specific list of personal information is as follows:
- Connecting and Managing the Robot
-
Necessary information collected: WiFi/hotspot name, robot ID
-
Purpose of collection: Realize pairing with the robot through WiFi or hotspot to control the robot
-
Enhanced information collected: Device battery level, device main control version number, device peripheral version number, device IP address, device hotspot name
-
Purpose of collection: Realize the management of the connected robot
-
Collection method: Automatic acquisition
-
Collection frequency: Collected only when the business is triggered
- Robot Interaction Mode
-
Necessary information collected: Video information, image information, audio information, facial information
-
Purpose of collection: Realize two-way synchronous dialogue between the App and the robot, and perform functions such as recording, photo-taking, video-shooting, and facial recognition
-
Enhanced information collected: None
-
Purpose of collection: None
-
Collection method: Automatic collection
-
Collection frequency: Collected only when the business is triggered
- Optimizing User Experience
-
Necessary information collected: User operation behaviors (click records, reading time, etc.)
-
Purpose of collection: Optimize user experience and troubleshoot faults
-
Enhanced information collected: None
-
Purpose of collection: None
-
Collection method: Automatic collection
-
Collection frequency: During the period when the user uses the App
- Service and After-sales
-
Necessary information collected: Communication contact information, communication content, etc.
-
Purpose of collection: Respond to feedback
-
Enhanced information collected: None
-
Purpose of collection: None
-
Collection method: Manual provision
-
Collection frequency: When the user feeds back problems
The specific information about system permissions is as follows:
- Location Permission
-
Data type: Precise geographic location information
-
Purpose of use: Based on the requirements of the Android framework, systems with Android 12 and below must use the location permission function when connecting to the robot via Bluetooth
-
Call timing: Called only when using relevant functions
-
Whether to ask: A pop-up window will ask when connecting to the robot via Bluetooth for the first time
- Storage Permission
-
Data type: Photos taken by the associated robot
-
Purpose of use: Used to save photos to the mobile phone album in Booster
-
Call timing: Called only when using relevant functions
-
Whether to ask: Ask when the user uses the photo-saving function for the first time
- Microphone (Recording) Permission
-
Data type: Voice information
-
Purpose of use: Used to realize two-way dialogue between the App and the robot terminal
-
Call timing: Called only when using relevant functions
-
Whether to ask: Ask when the user uses the function for the first time
- Camera Permission
-
Data type: Image and video information
-
Purpose of use: Used to realize two-way connection between the App and the robot terminal
-
Call timing: Called only when using relevant functions
-
Whether to ask: Ask when the user uses the function for the first time
- Album Permission (iOS)
-
Data type: Taken photos
-
Purpose of use: Store photos taken by the robot to the album
-
Call timing: Called only when using relevant functions
-
Whether to ask: Ask when the user stores photos to the album for the first time
1.5 Exceptions to Obtaining Authorization and Consent
In accordance with relevant laws and regulations, in the following circumstances, we may collect and use your personal information in accordance with the law without obtaining your authorization and consent:
(1) It is necessary for the conclusion and performance of the service contract between you and us;
(2) It is necessary for the performance of legal duties or obligations;
(3) It is necessary for responding to public health emergencies or protecting the life, health, and property safety of natural persons in emergency situations;
(4) Processing personal information that has been publicly disclosed by individuals themselves or other legally publicly disclosed personal information within a reasonable scope in accordance with relevant laws and regulations;
(5) Other circumstances stipulated by laws and regulations.
- How We Use Cookies and Similar Technologies
To ensure the normal operation of our services and provide you with a smoother and more convenient user experience, we may sometimes place small data files called Cookies on your computer, mobile communication terminal, or machine equipment. A Cookie is a small data file that a website or mobile application stores on your computer, mobile communication terminal, or machine equipment when you visit the website. It allows us to remember your operations and preferences (such as login name, interface language, setting preferences, etc.) within a certain period of time. We may use various technologies to collect and store relevant data about your visits to our website or mobile application, which can identify your identity, help you avoid repeatedly entering registration information, or help determine the security status of your account. These data files may include Cookies, Clickstream, Web data, and other local storage provided by your browser or associated applications (hereinafter collectively referred to as “Cookies”). Therefore, whenever you return to the App or browse the page, you do not need to repeatedly enter information or reconfigure user settings. You can clear the cache in the corresponding settings of your browser or App. Please understand that some of our services can only be realized by using Cookies.
- How We Share, Transfer, Disclose, and Provide Your Personal Information
3.1 Sharing
3.1.1 Special Notes on Third-Party Service Providers
Please be aware that some product functions and services we provide may not be completed by us alone. To provide you with complete product functions and a good user experience, some functions may involve sharing part of your personal information with other third-party service providers or entrusting them to process part of your personal information. We will access the software development kit (SDK) provided by third parties to realize the relevant functions described in this Privacy Policy. These functions include providing us with data storage services, data processing, log analysis, etc. The purpose of us sharing this information is to realize the core functions of our products and/or services. We will conduct strict security monitoring on the software development kit (SDK) used by service providers to obtain information to ensure data security.
If we entrust other parties to process your personal information, we will sign a strict confidentiality agreement or data processing agreement with the companies, organizations, and individuals that accept the entrustment to process your personal information. The agreement will specify the entrusted matters, the purpose, duration, and method of the entrusted processing, the type of personal information to be processed, protective measures, and the rights and obligations of both parties. We require them to process personal information only in accordance with our requirements, this Privacy Policy, and relevant confidentiality and security measures. If the entrusted processor intends to change the purpose of processing personal information, it must seek your authorization and consent again; otherwise, the entrusted processor will bear corresponding legal responsibilities. If you refuse to allow the entrusted processor to collect the personal information necessary for providing services when they provide services, you may not be able to use the services provided by the entrusted processor in the products and/or services.
3.1.2 Sharing of Other Personal Information
Only in the following cases may we provide your personal information to companies, organizations, and individuals other than the aforementioned third-party service providers or partners:
(1) Obtaining your explicit consent or authorization in advance;
(2) Being required by laws and regulations, legal procedures, or mandatory administrative or judicial requirements to provide externally;
(3) Providing in accordance with the agreements signed with you (including electronic agreements signed online and corresponding platform rules) or other legal documents;
(4) Processing disputes or conflicts between you and others at your request;
(5) We may share your personal information with our affiliates. However, we will only share necessary personal information, and the sharing is subject to the purposes stated in this Privacy Policy. If our affiliates intend to change the purpose of processing personal information, they must seek your authorization and consent again.
3.2 Transfer
We will not transfer your personal information to any company, organization, or individual, except in the following cases:
(1) Obtaining your explicit consent or authorization in advance;
(2) Being required by laws and regulations, legal procedures, or mandatory administrative or judicial requirements to provide;
(3) Providing in accordance with the agreements signed with you (including electronic agreements signed online and corresponding platform rules) or other legal documents;
(4) In the event of mergers, acquisitions, asset transfers, or similar transactions, if personal information transfer is involved, we will require the new company or organization that will hold your personal information to continue to comply with the provisions of this Privacy Policy; otherwise, we will require the company or organization to seek your authorization and consent again.
3.3 Disclosure
We will only publicly disclose your personal information under the following circumstances and on the premise of adopting security protection measures that meet industry standards:
(1) Disclosing the personal information you specify in the disclosure method you explicitly agree to, in accordance with your needs;
(2) When it is necessary to provide your personal information in accordance with the requirements of laws and regulations, or mandatory administrative law enforcement or judicial requirements, we may publicly disclose your personal information in accordance with the required type of personal information and disclosure method;
(3) Special Note: The personal information you actively publicly share during the use of the product is not subject to this Privacy Policy (such as forwarding content to other Internet platforms). You should be aware that any information you share may be read, collected, and used by any third party. Please carefully consider whether the content you publish and disseminate through the product contains your personal information. You should fully understand that when you disclose personal information on your own, we only store the content or system logs that contain such information and will not actively identify that such information belongs to your personal information. As long as you do not delete the information you publicly publish, the information may remain in the public domain; in some cases, even if you delete the publicly published information, the information may still be independently cached, copied, and stored by other users or third parties that are not associated with us and not under our control, or saved in the public domain by other users or third parties.
3.4 Exceptions to Obtaining Prior Authorization and Consent
In accordance with relevant legal provisions, in the following circumstances, the personal information controller may share, transfer, or publicly disclose personal information without obtaining the prior authorization and consent of the personal information subject:
(1) It is related to the performance of obligations stipulated by laws and regulations by the personal information controller;
(2) It is directly related to national security and national defense security;
(3) It is directly related to public security, public health, and major public interests;
(4) It is directly related to criminal investigation, prosecution, trial, and execution of judgments;
(5) It is for the protection of the major legitimate rights and interests such as the life and property of the personal information subject or other individuals, but it is difficult to obtain the authorization and consent of the person concerned;
(6) The personal information that the personal information subject has publicly disclosed to the public on his own;
(7) Personal information collected from legally publicly disclosed channels, such as legal news reports, government information disclosure channels, etc.
3.5 Providing to Other Personal Information Processors
Except as limited by this Policy and otherwise stipulated by laws and regulations, we will not provide the collected personal information to any other personal information processors. If it is really necessary to provide it, we will inform you of the name, contact information, processing purpose, processing method, and type of personal information of the recipient of the personal information, and obtain your authorization and consent. At the same time, we will require the recipient to process your personal information within the scope of the processing purpose, processing method, and type of personal information authorized by you.
- How We Protect Your Personal Information
4.1 Duration of Information Storage
We will store your personal information in a secure manner, including local storage (such as data caching using the App or machine equipment) and database storage. Generally, we will only store your personal information for the period necessary to provide the service or under the conditions stipulated by laws, regulations, and regulatory requirements. After the expiration of the period, we will delete your personal information or anonymize it. When determining the retention period, we will comprehensively consider various factors, such as the type of products and services you request or we provide to you, the nature and duration of the relationship between you and us, the possibility of re-registration of products or services, the impact of deleting personal information on the services we provide to you, the mandatory retention period stipulated by law, and the statutory limitation period.
4.2 Region of Information Storage
In accordance with the provisions of laws and regulations, we will store the user personal information collected within the territory of China in China, and require our third-party service providers to also store the user personal information collected within the territory of China in China. If some functions of the product you use are developed or provided by overseas third parties (hereinafter referred to as “overseas partners”), we may provide the relevant personal information collected in accordance with this Policy to the overseas partners. Before providing your personal information to overseas partners, we will obtain your separate consent in accordance with legal provisions and inform you of the detailed rules for cross-border provision of personal information.
4.3 Technical Protection Measures
We classify and grade personal information according to its type and sensitivity, and take corresponding technical protection measures based on the classification and grading results, including but not limited to access control, de-identification, irreversible encrypted storage, isolated storage, etc.; during the display and transmission of information, we take technical measures such as desensitized display and encrypted transmission to ensure the security of your personal information.
4.4 Organizational Protection Measures
We have established a joint data compliance working group and formulated management systems and process specifications related to personal information protection. For data processing activities that have a significant impact on personal rights and interests, such as the processing of sensitive personal information and external sharing, we conduct personal information protection impact assessments. At the same time, we will hold safety and privacy protection training courses to enhance employees’ awareness of the importance of protecting personal information, strictly control the scope of personnel who can access personal information, require them to fulfill confidentiality obligations and accept audits, and impose penalties on those who violate the obligations in accordance with regulations.
4.5 Handling of Security Incidents
We recommend that you pay full attention to protecting your personal information when using this product or service, especially your login account, password, and other important personal information. We will also do our best to ensure the security of your personal information. In the event of an unfortunate personal information security incident, we will activate the emergency response plan to prevent the expansion of damages caused by the security incident, and at the same time, proactively report the handling of the personal information security incident in accordance with the requirements of relevant laws and regulations and regulatory authorities. We will also, in accordance with the requirements of relevant laws and regulations, inform you of the basic situation of the security incident and the disposal and remediation measures we have taken or will take through App push notifications, emails/SMS messages, phone calls, etc., when necessary. If it is difficult to inform each individual one by one, we will issue a warning through announcements or other means.
- How We Process Minors’ Personal Information
(1)Our products, websites, and services are not intended for minors. Minors are not allowed to create their own user accounts without the consent of their parents or guardians. For the personal information of minors collected with the consent of their parents, we will only use or publicly disclose such information when permitted by law, explicitly consented by parents or guardians, or necessary for the protection of minors.
(2)If we find that we have collected the personal information of minors without obtaining verifiable parental consent in advance, we will try to delete the relevant data as soon as possible. You can contact us in the manner described in Section 9.
(3)If you are the parent or guardian of a minor and have questions about the processing of the information of the minor under your guardianship, please contact us in a timely manner through the method described in Section 9. If we find that we have collected the personal information of minors without knowing it, we will try to delete the relevant data as soon as possible.
- How We Ensure You Exercise Your Personal Rights
6.1 Rights You Have Regarding Your Personal Information
You have the right to request access to, correction of, and deletion of any personal information about you held by us, or to obtain a copy of your personal information (hereinafter referred to as “request”):
(1)Right of Access and Inquiry
You have the right to access and inquire about your personal information, except for the exceptions stipulated by laws and regulations.
(2)Right of Correction
When you need to modify your personal information (such as nickname, mobile phone number) or find errors in your personal information, you can modify the account information by logging into the App.
(3)Right of Deletion
-
You can delete relevant information by logging into the App;
-
In the following circumstances, you can request us to delete your personal information by calling customer service: ① If our processing of personal information violates laws and regulations; ② If we collect and use your personal information without obtaining your consent; ③ If our processing of personal information violates the agreement with you; ④ If you no longer use our products or services, or you have canceled your account; ⑤ If we terminate our services and operations.
We will evaluate your deletion request and, if it complies with the corresponding regulations, take corresponding steps including technical means to handle it. If we decide to respond to your deletion request, we will also notify the partners or third parties that have obtained your personal information from us at the same time and require them to delete it in a timely manner, unless otherwise stipulated by laws and regulations or the partner has obtained your independent authorization. After you or we assist you in deleting the relevant information, due to applicable legal provisions and security technology limitations, we may not be able to delete the corresponding information from the backup system immediately, but we will securely store your personal information and isolate it from any subsequent processing until the backup can be cleared or anonymized.
(4)Withdrawal of Consent
You can withdraw your consent to our collection, use, and/or disclosure of your personal information held or controlled by us by submitting a request. When we share, transfer, or publicly disclose your personal information to external parties, we will send you a notice for withdrawing consent. Please understand that each business function requires some basic personal information to operate normally. After you withdraw your consent or authorization, we will not be able to continue to provide you with the services corresponding to the withdrawn consent or authorization, nor will we collect and process your corresponding personal information. However, your decision to withdraw consent or authorization will not affect the personal information processing activities that have been carried out based on your authorization before.
You can withdraw your consent to the Privacy Policy through the path “Settings - General - Privacy Policy - I Disagree with the Privacy Policy” in Booster. Please note that withdrawing consent may have certain legal consequences. Depending on the scope of information processing you authorize us to perform, this may result in your inability to use some functions and services of Booster.
6.2 Responding to Your Above Requests
If you cannot complete the above requests through the above methods, or you believe that Booster has any behavior that violates laws and regulations or the provisions of this Policy, you can contact us through the contact information in Section 9 of this Policy. To ensure the security of your personal information, you need to submit a written application through our dedicated request channel and provide sufficient information for us to verify your identity, ensuring that the requester is yourself or a legally authorized person. After receiving your feedback and verifying your identity, we will respond to your request within 15 working days.
- How This Policy Is Updated
This Policy aims to elaborate on the personal information processing rules and processing activities of Booster. With changes in the environment such as product functions, services, or organizations, we reserve the right to update or modify this Policy in a timely manner. We will post any changes to this Privacy Policy on this page. For major changes, we will display the revised Privacy Policy to you in the form of a pop-up window when you log in. Please note that only after you click the “Agree” button in the pop-up window will we collect, use, share, and store your personal information in accordance with the revised Privacy Policy.
The major changes referred to in this Policy include but are not limited to:
(1) Significant changes in our product functions or services, such as the purpose of processing personal information, the type of personal information processed, the method of using personal information, etc.;
(2) Changes in the main recipients of personal information sharing, transfer, or public disclosure;
(3) Significant changes in your rights related to participating in personal information processing and the way to exercise them;
(4) Changes in the responsible department for personal information protection, contact information, and complaint channels;
(5) Significant changes in our ownership structure, organizational structure, etc., such as changes in owners due to business adjustments, bankruptcy and mergers, etc.;
(6) When the personal information security impact assessment report indicates high risks.
When our products or services cease operations, we will issue announcements or send notifications one by one in accordance with relevant laws and regulations, and protect your legitimate rights and interests in accordance with the law. Except as otherwise stipulated by laws, regulations, or regulatory requirements, we will promptly stop collecting your personal information and delete or anonymize the relevant personal information.
- How to Contact Us
We have assigned dedicated personnel responsible for personal information protection. If you have any questions about this Privacy Policy, or any complaints or comments regarding the processing of your personal information, you may contact us through the following channels:
-
Telephone: (+86)400-865-2028 (Monday to Friday, Beijing Time: 10:00-19:00)
-
Office Address: 301, Building 16, East Yongtaizhuang Village, Qinghe, Haidian District, Beijing, China
We will reply to you within 15 working days. If you have any objection to our reply, you may file a complaint or report with the relevant regulatory authorities, or initiate legal proceedings in the people’s court with jurisdiction in the place where we are domiciled.