Consultation hotline: 0755-28348580
News / News more
新品推荐 / Products more
Published time: 2019 - 11 - 13
Hardware FeaturesInterfaceTF card slot2.4GWifi SupportPower Interface(Micro USB)Reset ButtonBuilt-in Microphone & Speaker4PCS SMT 940nm lights, Night Vision up to 23 feetPan/TiltPTZ: Pan: 350°,Tilt:90°Main ICIngenic T21N  512MBPSImage Sensorsuperpix SP2307 (omnivision OV2735)   2 million pixelsDisplay Resolution2.0MP,1080P 1920*1080(768*432)LensHD 2 million lens, f= 3.6mm F=2.2mm  angle110°IR-CUTElectromagnetic IRCUT is used. Day and night function.Dimension110*81*81mmWeight (g)199GPower Input5V 1AWireless FeaturesWireless SpeedIEEE802.11b/g/n 150MbpsOperating Frequency2.4 G   WIFISecurity64/128-bit WEP, WPA/WPA2,WPA-PSK/WPA2-PSKSoftware FeaturesProtocols & StandardsTCP/IP、UDP/IP、HTTP、DHCP、NTP、802.11b/g/nVideo image formatH.264Image rotationInvertMaximal Frame Rate15 frames / secCode rate425kbps-1024kbpsAccount permissionsSupport user sharing permissionsMotion DetectionSupport motio...
Published time: 2019 - 11 - 13
Hardware FeaturesInterfaceTF card slot2.4GWifi SupportPower Interface(Micro USB)Reset ButtonBuilt-in Microphone & Speaker4PCS SMT 850nm lights, Night Vision up to 23 feetPan/TiltN/AMain ICIngenic T21N  512MBPSImage Sensorsuperpix SC2232H (omnivision OV2735)   2 million pixelsDisplay Resolution2.0MP,1080P 1920*1080(768*432)LensHD 2 million lens, f= 2.8mm F=2.2mm  angle130°IR-CUTElectromagnetic IRCUT is used. Day and night function.Dimension62*63*110mmWeight (g)118GPower Input5V 1AWireless FeaturesWireless SpeedIEEE802.11b/g/n 150MbpsOperating Frequency2.4 G   WIFISecurity64/128-bit WEP, WPA/WPA2,WPA-PSK/WPA2-PSKSoftware FeaturesProtocols & StandardsTCP/IP、UDP/IP、HTTP、DHCP、NTP、802.11b/g/nVideo image formatH.264Image rotationInvertMaximal Frame Rate15 frames / secCode rate425kbps-1024kbpsAccount permissionsSupport user sharing permissionsMotion DetectionSupport motion detectionManage SoftwareA...
Published time: 2018 - 12 - 20
*H.265 1080P* Support 2.4G/ 5G dual band wifi* AI humanoid detectionSpecification -----Model: C20(2.0 Megapixel)                                         XNC201Main control ICT21NSensorF23WiFi module8188EUSMinimum illumination0LUX(IR ON)Day/night ModeAutomatic switchLensM12/3.0MM,F2.0 115°; 1/2.7’’Infrared lightBuilt in 9 infrared lights of 940nmNight vision distance10 MetersAngel of view(Diagonal)146°Video Compression standardsH.264Audio Compression standardsAACCompression Transmission Rate32Kbps~8Mbps settableFrame rate15-20fps(1920×1080)ImageAutomaticImage resolution1920×1080PStorage64Mbits RAM/128M bits Flash ,support Micro SD card storage( up to 64G,FAT32,Class4 above)/Local storageAudio inputBuilt-in microphoneAudio outputBuilt -in speaker   ...
Published time: 2018 - 12 - 20
Specification -----Model: S212(2.0 Megapixel)                                                                                                                             XNS201Main control ICT21NSensorF23WiFi module8188EUSMinimum illumination0LUX(IR ON)Day/night ModeAutomatic switchLensM12/3.6MM,F2.0 86°; 1/2.9’Infrared lightBuilt in 9 infrared lights of 940nmNight vision distance10 MetersAngel of view(Diagonal)110°Video Compression standardsH.264Audio Compression standardsAACCompression Transmission Rate32Kbps~8Mbps settableFrame rate15-20fps(1920×1080)ImageAutomaticImage resolution1920×1080PStorage64Mbits RAM/128M bits Flash ,support Micro SD ca...
Published time: 2018 - 12 - 20
HD 1080p waterproof IP Bullet camera                                           XNG202                                     MainOperation systemEmbedded Linux OSCPUT21NSensorF23videoCompressionH.264Resolution2.0 MegapixelFrame rate15fpsVideo formatFHD(1920*1080),VGA(640*360)Min. Illumination0.1 Lux/F1.2lensFixed Focal Length:6mmAngle of View75°White Balance,Gain ControlAutoVideo modeManual recording, timer recording, alarm recordingNight visionInfrared light3 pcs array ledMax. IR LEDs LengthLED lights night vision 20...
热门产品 / products more
最新案例 / Case more
最新方案 / Soluon more
News center
News News Center

Cloud Service Information Security and Privacy Statement

日期: 2018-12-19
浏览次数: 115

Shenzhen Yingyingxun Electronic Technology Co., Ltd. Cloud Service Information Security and Privacy Statement

 

When you use the cloud storage service (hereinafter referred to as the service) of Shenzhen Yingxun Electronic Technology Co., Ltd., you entrust valuable information to the company for safekeeping. The company attaches great importance to your data security and privacy, so you use this book. At the time of service, the company follows the local regulations of your location and uses it in a legal manner, and implements relevant management activities in accordance with internal procedures and security regulations. It is our company's goal to protect the privacy and security of your data.


 


I. Information Security Policy:


This service provides highly convenient cloud storage services for your company's camera. To ensure the security of the cloud network, the company continuously observes the system availability throughout the year and tries to reduce the impact of system interruption on you. Unfortunately, information security incidents (including but not limited to system interruptions, improper access to video recordings, etc.), the company will also protect relevant traces and records as much as possible and provide you with reference to the requirements/applications.


 


(A), customer data data definition:


The "Customer Data Data" referred to herein is the data provided by you when you use the Service (such as video footage taken by a network camera), but does not include the "Account Information" required for the Service. Account Information Defined as information related to the management account you provide to the company. For example: account name, email address, etc., account information will be separately applicable to "Yingshixun Electronic Technology Co., Ltd. Privacy Protection Policy".


 


(II) Information Security Roles and Responsibilities:


1. This service is developed, deployed and transported by the company, and provides infrastructure through internationally renowned cloud service providers, such as hypervisors, physical host devices that maintain virtualized environments, related network infrastructure, and storage. Equipment, user operating platform and cloud room physical security. The above-mentioned system development, deployment and maintenance, as well as information security requirements for cloud service providers, service monitoring/monitoring are the responsibility of the company, and public announcements are made when there are any major service and control measures changes; and you install and deploy this The environment of the company's camera products and the terminal equipment (including but not limited to personal computers, handheld devices) that use the service are responsible for the security of related information.


2. Please carefully consider whether the environment in which you install and deploy the camera products of the company may improperly infringe the legal rights of third parties (such as privacy rights). The company does not guarantee the security of data obtained by you in an illegal way. Responsibility, and shall not be liable for any liability arising from improper infringement of the legal rights of third parties.


 


(3) Information security as:


1. The information security provided by the company is in compliance with the ISO 27001, ISO 27017, and ISO 27018 specifications, and is regularly reviewed by a fair third party.


2. The service development process will consider the information security issues that may be faced by the service and the specifications and countermeasures that may be required, and implement the management cycle of analysis, development, testing, online and maintenance, and will continue Monitor the technical weaknesses that may be involved in the components, service platforms, and infrastructure used, and continually revise and reinforce.


3. The system components used by the Company to provide the Service and the required data are regularly backed up and properly planned for the backup environment to maintain the service as uninterrupted as possible (the actual service availability level is 99%, ie The monthly service interruption is no more than 7 hours and 26 minutes, and the service interruption caused by the officially announced planned maintenance is not limited.) The service does not provide any function and operation interface for managing data backup, if you need to be outside the service platform. Your data or data is retained by your storage media. You should export your data data by downloading it.


4. In terms of access management, the management background of the service will be transported through high-security pipelines, such as privileged administrators who need to pass two-factor authentication.


5. Users of this service access the service with their unique and non-repeating user IDs to ensure that all data misuse and risk of accidents are minimized.


5. The company will have strict security control measures to manage cloud service providers to ensure your data integrity, security and confidentiality.


6. The NTP calibration standard for the company's infrastructure comes from an international credible school time server, but the time displayed may be slightly different from the aforementioned school server due to Internet transmission delay factors.


7. When you no longer use the company's cloud storage service, you should terminate the operation. The company will stop processing and use your data data from the date of termination of the service (but based on the data deletion policy of the cloud infrastructure provider, relevant data) Will be overwritten, safely erased or destroyed within 180 days from the date of termination of the service, not immediately physically deleted. If you need to retain your data, you should export your data before you terminate the service. (Download) Save.


 


Second, the privacy statement


(1) Storage location:


All customer data of the service operating environment is mainly (but not limited to) stored in the United States (there is a possibility that the backup data is stored outside the United States based on the cloud infrastructure provider's fault-tolerant plan), unless you agree or The infrastructure under which the Service is subject to major disruption requires the use of other geographic infrastructure to complete system backup/reserve operations. The Company will not actively remove or copy your data from outside the United States.


 


(B), encryption or hash protection mechanism:


The data transmissions generated by the users accessing the service on the public network have been encrypted to protect the integrity and confidentiality of the data transmission on the public network; the password of the service you use is hashed and stored. Company back-office managers are not aware of your password to reduce the risk of misuse or malicious infringement/access by any internal or external personnel.


 


(3) Delete physical storage device data:


The cloud storage service provided by the company, the failure or replacement of its infrastructure storage equipment, the information on the equipment and the temporary electronic information generated by the company in collecting, processing and utilizing your personal data will be received within 180 days. Safely erase or destroy to ensure that data data cannot be recovered in any way.


 


(IV) Information Security Incident Notification:


If you find that the service you are renting has suspicious activity, please inform the company according to the connection method displayed on the website or mobile application client. The company will understand and analyze the possible situation according to the program, and try to reduce the impact on you. You may be asked to provide information and will notify you of the results. The above paragraph is confirmed by the company that suspicious activities do exist and will affect other customers of the company, the company will be notified by notice or email.


In accordance with the above information security policy, the company will try its best to protect your data, but if the company finds suspicious activity (such as loss, disclosure or tampering) in your data, and the cause of the problem is attributed to the company, The company will notify you within 5 working days that the above notification time does not include major natural disasters or uncontrollable natural disasters.


 


(5), data data disclosure:


The company has the obligation to keep confidentiality of your data. However, if the competent or law enforcement agency requests to read or expose it according to law, the company will periodically publish statistical data on the public channel, which is the above-mentioned requirements of the agency. The number of times the company is requested.


Links:
Copyright ©2018 - 2021 Shenzhen Yingshixun Electronic Technology Co., Ltd. 1
X
1

QQ设置

3

SKYPE 设置

4

阿里旺旺设置

等待加载动态数据...

等待加载动态数据...

5

电话号码管理

  • 4006-971-972
6

二维码管理

等待加载动态数据...

等待加载动态数据...

展开