Privacy Policy

Updated: April 13, 2026

Effective: April 13, 2026

Introduction

This policy is formulated and issued by Shenzhen Tenda Technology Co., Ltd. (collectively, "Tenda", "we", "our" or "us"). We provide services including but not limited to the Tenda CloudFi APP, Tenda CloudFi Cloud Platform and related product and services (collectively, "This Service"). We understand the importance of personal information to you and strive to protect the security of your personal information.

Please read this policy carefully and ensure you fully understand it before using our services. If you do not agree, you may continue in browsing mode, but some features that require personal information may not work.

Address: No. 1001, Zhongshanyuan Road, Nanshan District, Shenzhen, China

Contact: support@tenda.cn or +86-755-2765 7098

Contents

*  How we collect and use your personal information

*  Information collection scenarios and categories

*  How we process sensitive personal information

*  Request and use of system permissions

*  How we use cookies and similar technologies

*  How we share, transfer, and disclose your personal information

*  How we protect and retain your personal information

*  Your rights

*  How we handle minors' personal information

*  Contact us

*  Changes to our policy

*  Appendix: Third-Party SDKs

 

How we collect and use your personal information

We collect and use your personal information in accordance with the principles of lawfulness, fairness, and minimal necessity, and only for the purposes described in this policy.

Information collection scenarios and categories

Below, we describe in detail the specific personal information we collect when you use different features of This Service:

1.  Account registration and login

1)   Scenario: When you register or log in to the Tenda CloudFi account.

2)   Personal information collected: Email, verification code. If you log in via a third-party account, we may also collect your nickname and avatar.

3)   Purpose: Complete account registration and login, identify your identity, and ensure account security.

2.  Device monitoring

The device monitoring feature allows you to view and manage the status, operation, and network topology of your linked devices through the Tenda CloudFi App.

1)   Scenario:

*  View the device list, device online status, and device operating parameters;

*  View the network topology and device connections;

*  View device alarms and logs.

2)   Personal information collected:

*  Project information: Project name, project permissions, project status, number of devices, project creation time, time zone, project scenario, project location, sharing details, and alarms;

*  Device information: Device model, serial number, firmware version, hardware version, software version, MAC address, IP address, management address, external network address, and device connections;

*  Network information: SSID, BSSID, channel, signal strength, and connected devices.

3)   Other information collected (runtime data): Device status, memory usage, port status, runtime, traffic statistics, operating mode, network topology, alarms, and system logs.

4)   Purpose: Provide you with device status monitoring, network topology display, fault alarms, and other services.

5)   Note:

Operational status data (such as CPU usage and traffic) reflects device performance and does not identify individuals.  We use this data solely to provide real-time device status and do not use it for any other purposes.

All monitoring data is obtained only when you actively view it on the device and is not proactively uploaded to the server, except as necessary for fault analysis.

3.  Device configuration

The device configuration feature refers to the operations you perform through the Tenda CloudFi App to configure parameters and networks, and adjust policies for linked devices.

1)   Scenario:

*  Modify the device name, administrator password, and login method;

*  Configure the Wi-Fi name (SSID), encryption method, and radio configuration;

*  Configure network parameters, wireless settings, IP settings, radio frequency, VLAN, DHCP, static routing, port mapping, LED, device password, ports, and device service settings;

*  Configure device reboot, factory reset, and firmware upgrade.

2)   Personal information collected:

*  Device configuration: Device name, administrator account, Wi-Fi name (SSID), encryption method, channel settings, RF settings, network parameters, wireless settings, IP settings, RF settings, VLAN, DHCP, static routes, port mapping, LED, device password, ports, and device service settings.

*  Operation logs: Configuration change records, operation time, and operation source.

3)   Purpose: Enable remote configuration and management of your device, save your configuration preferences, and record the history of configuration changes.

4.  Device maintenance

The device maintenance feature allows you to diagnose faults, remotely repair, and export device logs through the Tenda CloudFi APP.

1)   Scenario:

*  Perform Ping testing, wireless roaming testing, and wireless signal analysis;

*  Export device diagnostic logs, and fault reports;

*  Perform remote reboot, and restore configuration;

*  Submit a malfunction feedback or consult online customer service.

2)   Personal information collected:

*  Diagnostic data: Ping test results, roaming test data, signal strength spectrum, channel interference analysis data;

*  Logs: Device operation logs, error logs, and crash logs;

*  Feedback: the fault description, screenshots, videos, and contact information (phone number, email) you submitted;

*  Location: Geographic location information when executing a scan (used to record signal coverage locations).

3)   Purpose: Diagnose network faults, provide remote technical support, and optimize device performance.

4)   Note: The network scanning and connection detection features are performed only when you actively trigger them. The results are used only for display on your device and are not uploaded to the server (unless you choose to share them).

5.  Components

Components refer to the basic functional modules integrated in the Tenda CloudFi APP, supporting core capabilities such as device management, data visualization, and user interaction.

1)   Scenario:

*  Device list: Display all your bound devices and support filtering by name, type, and status;

*  Network topology: Visually present the connection relationships between devices;

*  Data statistics: Display device traffic statistics, user access statistics, and alarm statistics;

*  Message push: Send device alarms, system notifications, and activity reminders.

2)   Collected personal information:

*  Device list: Device name, device model, serial number, and online status;

*  Network topology: Device MAC address, IP address, and interconnection relationships;

*  Data statistics: Traffic usage data, alarm count, and user access records;

*  Message push: Device alarms, system notifications, and push records.

3)   Purpose: Provide an intuitive device management interface, data visualization, and real-time notifications.

6.  Explorer

The explorer feature allows you to analyze your network environment through the Tenda WiFi App, including detection, scanning, and signal analysis, helping you identify issues and optimize network deployment.

1)   Scenario:

*  Network scan: Scan nearby Wi-Fi signals, and analyze channel occupancy and signal strength;

*  Device discovery: Scan online devices on the local area network to identify the device type, IP address, and MAC address;

*  Signal detection: Detect the wireless coverage and roaming latency;

*  Explore project: Explore device configuration options in a new project or demo project.

2)   Collected personal information:

*  Network scan: Wi-Fi name (SSID), BSSID, channel, signal strength, encryption method;

*  Device discovery: IP address, MAC address, and device type (such as AP, switch, camera) of local network devices;

*  Signal detection: Signal strength variation, roaming switching time, and packet loss rate;

*  Location: Geolocation data when executing scans (used to map signal coverage).

3)   Purpose: Analyze the network environment, identify potential issues, and optimize device placement and deployment.

4)   Note: Network scanning and device discovery are executed only when you actively trigger them. The scan results are used only for display on your device and are not uploaded to the server (unless you choose to share them).

7.  Management of personal data

1)   Scenario: Set personal avatar, nickname, and gender.

2)   Personal information collected: As listed above.

3)   Purpose: Enhance your profile for project management.

8.  Camera, album, and storage

1)   Scenario:

*  Photo capture and upload: Profile picture, delivery report header logo, online customer service, and feedback;

*  QR code scan: Scan device QR codes to add products;

*  Album access: Select a QR code image from the album to add a device.

2)   Personal information collected: Photos, videos, and files stored on the SD card.

3)   Purpose: Enable picture upload, QR code scan, file storage, and device adding functions.

9.  Microphone

1)   Scenario: When you use the voice input feature in Online Customer Service.

2)   Personal information collected: Voice data.

3)   Purpose: Enable voice input and improve customer service communication efficiency.

10.  Clipboard

1)   Scenario:

*  When you open the project list;

*  When you open the SSH or Telnet feature in the Tools;

*  When the app switches from background to foreground.

2)   Personal information collected: Passwords in the clipboard, share codes, links, IP addresses, MAC addresses, and website URLs.

3)   Usage frequency:

*  Detect once each time the project list is opened;

*  Check once every time the SSH or Telnet feature is opened;

*  The App is detected once when switching back from the background to the foreground.

4)   Purpose:

*  Identify whether the clipboard contains project sharing codes or event passwords in order to provide quick navigation, project sharing, event linkage, and other features;

*  Identify whether the clipboard contains an SSH/Telnet connection address in order to automatically populate connection information.

5)   Note:

Clipboard content is processed locally on your device and is not uploaded to the server.

11.  Application processes

1)   Scenario: During application runtime.

2)   Personal information collected: Application process status (whether in the foreground/background).

3)   Purpose: Conduct user activity statistics analysis and optimize service experience.

12.  Security assurance and logs

1)   Scenario: During the use of this service.

2)   Collected personal information:

3)   Device information: Device model, operating system version, Android ID, BSSID, SSID, and IP address;

4)   Logs: Crash data, exception service data, usage frequency, and performance data;

5)   Purpose: Ensure account security, system stability, and troubleshooting.

13.  Sensor information

1)   Scenario: When you use the Scan feature.

2)   Collected personal information: Sensor information necessary for QR code recognition.

3)   Purpose: Complete two-dimensional code scanning and recognition.

4)   Note: We only collect necessary sensor information.

 

How we process sensitive personal information

In accordance with applicable laws and regulations, we implement stricter protection measures for your sensitive personal information (identified in bold in this policy). We will inform you of the necessity of processing sensitive personal information and its impact on your personal rights, and will simultaneously inform you of the purpose of use when collecting it through pop-up windows or page descriptions, obtaining your separate consent. If you do not agree, you will not be able to use the relevant features.

This service may involve the following types of sensitive personal information:

*  Location information (for project location records, signal coverage mapping)

*  Clipboard information (for quick input and form filling)

*  Photos, videos, and files stored on your device

*  Voice messages

 

Request and use of system permissions

We request system permissions only when you use specific features, and will inform you of the purpose at the time of request. You may revoke the authorization at any time in your device settings.

*  Location: Used for project creation, wireless detection, address filling, Ping detection in the explorer feature, wireless roaming detection, and wireless signal analysis. If denied,  automatic location will be unavailable, and you may enter location information manually.

*  Camera: Used for scanning QR codes and taking photos for upload. If denied, scanning and photo-taking features will not be available.

*  Storage: Used for uploading images, downloading reports, and exporting diagnostic logs. If denied, uploading or saving files will not be available.

*  Microphone: Used for voice input in online customer service. If denied, voice input will not be available.

*  Local network: Used for device discovery and connection, network scanning. If denied, device binding and explorer features may be affected.

 

How we use cookies and similar technologies

To ensure our website functions properly, we store small data files called Cookies on your computer or mobile device. Cookies typically contain identifiers, the site name, and certain numbers and characters. We use Cookies primarily to enhance user experience and to simplify repetitive actions, such as filling in information.

You can manage or delete cookies according to your preferences. Most web browsers allow you to clear or block cookies. However, if you choose to do so, you may need to adjust your settings each time you visit our website.

 

How we share, transfer, and disclose your personal information

(1) Processing by entrusted parties

For the purpose of providing this service, we may entrust authorized partners (such as cloud service providers and customer support providers) to process your personal information on our behalf. We will enter into agreements with these parties specifying the purpose, duration, and methods of processing, the types of personal information involved, the required protection measures, and the rights and obligations of both parties. We also supervise their processing activities to ensure compliance with applicable requirements.

(2) Sharing

We do not share your personal information with any company, organization, or individual, except in the following circumstances:

*  With your explicit consent: After obtaining your explicit consent, we will share your personal information with other parties.

*  With authorized partners: To fulfill the purpose stated in this policy, some services are provided by authorized partners. We may share certain personal information with these partners to deliver better customer service and user experience. For example, we integrate third-party SDKs (see Appendix for details), which may collect your personal information for their service purposes. We conduct strict access evaluations for our partners and require them to process personal information in accordance with our instructions, this policy, and applicable confidentiality and security measures.

(3) Transfer

We do not transfer your personal information to any company, organization, or individual, except in the following circumstances:

*  With your explicit consent.

*  Mergers, acquisitions, or bankruptcy liquidation: If a transfer of personal information is involved, we will require the new entity holding your personal information to continue to be bound by this Policy. Otherwise, we will require that entity to obtain your authorization and consent again.

(4) Public disclosure

We disclose your personal information only in the following circumstances:

*  With your explicit consent.

*  Compliance with applicable laws: We may disclose information about you if we believe it is necessary to comply with any applicable law, legal process, litigation, or enforceable governmental request.

 

How we protect and retain your personal information

(1) Technical security measures

We implement industry-standard security measures to protect your personal information against unauthorized access, disclosure, use, modification, damage, or loss. Our measures include:

*  Use HTTPS for data transmission and strictly validate the authenticity and integrity of SSL certificates;

*  Implement anti-proxy and anti-VPN mechanisms to prevent common packet capture behaviors;

*  Encrypt sensitive data transmitted through interfaces.

(2) Management of security measures

We establish dedicated management systems, processes, and organizations to ensure the security of information:

*  Establish strict data usage and access regulations, with rigorous data access controls and multi-factor authentication;

*  Implement data and technical security audits, including log audits and behavior audits;

*  Strengthen security awareness through regular training on security and privacy protection.

(3) Retention period

We keep your personal information only for as long as it is required in order to fulfill the purposes described in this policy, unless otherwise required by law. After you cancel your account, we will stop using and delete your personal information.

(4) Handling of security incidents

In the event of a personal information security incident, we will notify you in accordance with applicable laws and regulations. This may include information about the nature of the incident, its potential impact, the measures we have taken or will take, recommendations for mitigating risks, and any remedial actions. We will promptly inform you via email, letter, phone call, push notification, or other appropriate means.

 

Your rights

In accordance with applicable laws, regulations and standards in China, we ensure that you have the following rights regarding your personal information:

(1) Access your personal information

You have the right to access your personal information, except where otherwise prescribed by laws and regulations. You can access your account information under Account > Account Management and access the bound devices under Project.

(2) Correct your personal information

If you find that the personal information we process about you is inaccurate, you have the right to request correction. You may update your information through Account > Account Management, or contact our customer service for assistance.

(3) Delete your personal information

You may request the deletion of your personal information in the following circumstances:

*  If our processing of your personal information violates applicable laws or regulations;

*  If we collect or use your personal information without your consent;

*  If our processing of your personal information violates our agreement with you;

*  If you no longer use our products or services, or you have deleted your account;

*  If we no longer provide products or services to you.

(4) Obtain a copy of personal information

You have the right to obtain a copy of your personal information. You may submit a request by emailing support@tenda.cn, and we will respond within 15 working days.

(5) Withdrawal of consent

You can withdraw your consent as follows:

* Withdraw consent to the privacy agreement: After withdrawing consent to the collection of personal information, we will stop collecting your personal information;

* Account closure: Withdraw all authorizations by deleting the account.

You can withdraw your consent to the privacy agreement through "Account - About - Personal Information and Permissions". You can cancel your account through "Account - Account Management".

You may also withdraw consent by logging out of your account via Account > Account Management

Please note that once you withdraw your consent, we may no longer be able to provide the corresponding services, but this will not affect any processing that has already taken place at the time.

(6) Account closure

You can submit a deletion request via Account > Account Management. After your account is deleted, we will stop providing products or services to you and delete your personal information as requested, unless otherwise required by applicable laws and regulations. For requests requiring manual processing, we will complete them within 15 working days.

(7) In response to your above request

For security reasons, you may need to submit a written request or prove your identity in another way. We may first verify your identity before processing your request. We will respond within 15 working days. If you are not satisfied, you may file a complaint through the contact details provided in the Article 10 of this policy.

(8) Rights of next of kin

If a user who is a natural person passes away, their next of kin may exercise the rights to access, copy, correct, and delete the deceased user's personal information by contacting us at support@tenda.cn.

 

How we handle minors' personal information

We do not knowingly collect personal information from minors without the consent of their guardians. If you are a minor, use this service under the guidance of your guardian. If you are a guardian and have any questions regarding the personal information of the minor under your care, contact us using the contact details provided in Article 10 of this policy.

 

Contact Us

If you have any questions, comments, or suggestions regarding this policy or the processing of your personal information, or if you wish to exercise your rights, contact us as follows:

Email: support@tenda.cn

Phone: +86-755-2765 7098

Address: Floors 6-8, Tower E3, No. 1001, Zhongshanyuan Road, Nanshan District, Shenzhen, China. 518052

We will respond to your request within 15 working days. If you are not satisfied with our response, particularly where you believe our processing of your personal information has infringed your legitimate rights and interests, you may file a complaint or report it to regulatory authorities.

 

Changes to our policy

We may change this policy from time to time. Without your explicit consent, we will not restrict your rights under this policy. For significant changes, we will notify you through pop-ups, push notifications, or emails.

Significant changes may include, but are not limited to:

1)   Changes to our service model (such as changes in the purpose, type, and manner of processing personal information);

2)   Changes to our ownership or organizational structure;

3)    Changes to the primary recipients of personal information for sharing, transfer, or disclosure;

4)   Changes to your rights or how you can exercise them while using our services;

5)   Changes to the department responsible for handling personal information security, or to contact information and complaint channels;

6)   When the user information security impact assessment indicates a high risk.

 

Appendix: Third-Party SDKs

In this service, the third-party SDKs and open-source libraries we have integrated are disclosed as follows. We will conduct strict testing on the third parties we integrate and promptly disclose to you the latest information about the integrated SDKs.

1.   Aliyun Player SDK-Android

Purpose: Video Playback

Data collected: UUID, device model, IP address, WIFI status, carrier information.

Provider: Alibaba Cloud Computing Co., Ltd.

Privacy policy: https://terms.aliyun.com/legal-agreement/terms/suit_bu1_ali_cloud/suit_bu1_ali_cloud202112151438_20307.html?spm=a2c4g.11186623.0.0.659c431azJ1Kko8

2.   FaceBook SDK

Purpose: Implement Facebook account login and sharing functionality

Data collected: name, user unique identifier, avatar, gender, age range, region/language, email, UUID, device model, WIFI status, carrier information, IP address, geolocation, clipboard content.

Provider: Meta Platforms, Inc.‌

Privacy policy: https://www.facebook.com/privacy/policy

3.    Twitter SDK

Purpose: Implement Twitter account login and sharing features

Data collected: Username, user unique identifier, avatar, email, UUID, device model, WiFi status, ISP information, IP address, location, and Wi-Fi information.

Provider: X Corp.

Privacy policy: https://twitter.com/en/privacy

4.    XLog open source library

Library: XLog、Realm、RxJava、Glide、JZVideo、Retrofit2、Apache Commons、Chromium SDK

Purpose: Core application development framework, image loading, network requests, local storage.

Data access: These libraries may access technical identifiers (such as device ID, IP address) to operate, but unless otherwise specified, this data will not be sent to Tenda or third-party servers.

License: Links to the respective open-source repositories can be provided upon request.