With the concepts of safety,
communication, care and companionship

Privacy  Policy

2024-12-3 back

iecute (hereinafter referred to as "we") provides device-side software services by Shenzhen Xinmiao Communication Technology Co., Ltd. We are fully aware of the importance of your personal information and will do our utmost to protect the security and reliability of your personal information. We are committed to maintaining your trust in us and abide by the following principles to protect your personal information: the principle of consistency of rights and responsibilities, the principle of clear purpose, the principle of consent by choice, the principle of minimal sufficiency, the principle of ensuring security, the principle of subject participation, the principle of openness and transparency, etc. Meanwhile, we will adopt corresponding security protection measures to protect your personal information in accordance with the mature security standards in the industry.

 

Please read and understand this "Privacy Policy" carefully before using our products (or services), and confirm that you understand our rules for processing your personal information.

 

This policy will help you understand the following contents:
I. The scope of application of this "Privacy Policy"
II. The scope and methods of possible collection of personal information
III. The storage of personal information
IV. The possible ways of using personal information
V. The possible ways of sharing personal information
VI. The protection of personal information security
VII. The management of personal information
VIII. Terms of use for minors
IX. Changes to the privacy policy
X. Others

I. The Scope of Application of this "Privacy Policy"
Unless otherwise stipulated in this "Privacy Policy", the terms used in this "Privacy Policy" have the same meanings as those defined in the "User Service Agreement".

 

1. This "Privacy Policy" does not apply to the following situations:
1.1 The collection and use of your personal information by third-party services (including any third-party applications and websites) accessed through this software and related services;
1.2 The collection and use of your personal information by other third parties that provide advertising services in this software and related services.

2.The software and related services may include or be linked to information or other services (including websites) provided by third parties. Such third-party services may be operated by the relevant third parties. Your use of such third-party services (including any personal information you provide to third parties) shall be subject to the service terms and privacy policies of the third parties (rather than this "Privacy Policy"). You need to read their terms carefully. Please protect your personal information properly and only provide it to others when necessary. We shall not be responsible for any use of the information provided by you by any third party.

II. The Scope and Methods of Possible Collection of Personal Information

When you are using this software and related services, you understand and agree that we may collect, store and use the following data related to your personal information. These information can be used for functions such as registration, login and account binding. If you do not provide the relevant information, you may not be able to register as our user or enjoy certain services provided by us, or achieve the expected effects of relevant services.

 

When you are using certain functions of this software and related services, according to the relevant laws and regulations of the People's Republic of China, you may need to provide your real identity information through your account. We will assist you in choosing an appropriate way to complete the real-name verification according to your identity attributes. If you only need to use basic functions such as browsing and searching, you do not need to register an account of this software, nor do you need to provide relevant information.

 

1. Information provided by you to us
1.1 Information filled in or provided by you when registering, logging in or using this software and related services. We will collect your nickname, avatar and mobile phone number. The collection of these information is to help you complete account registration and protect the security of your account. Mobile phone numbers are sensitive information, and the collection of such information is to meet the requirements of the network real-name system stipulated by relevant laws and regulations. If you do not provide such information, you may not be able to use our services normally.

2. Information Obtained Due to Your Use of This Software and Services
2.1 Log Information: When you use this software and related services, we will automatically collect your usage of our services and save it as relevant network logs. This includes information such as your device model, system version, network status, and abnormal information, which will be stored in files as logs.
2.2 Device or Application Information: Some mobile devices or applications have unique application program numbers. For example, the configuration information, device version number, device identification code, etc. provided by the mobile device, browser, or other programs you use to access this software and related services. To provide you with better services and improve your user experience, this software and related services may record hardware model numbers, operating system version numbers, International Mobile Equipment Identity (IMEI), Network Equipment Hardware Address (MAC), and other software and hardware data.
2.3 Location Information: When you enable the device location function and use the relevant services provided by this software and related services based on location, after obtaining your consent, we will use various information for positioning so that you can obtain the relevant services without manually entering your own geographical coordinates. This information includes IP addresses, GPS signals, and other sensor information that can provide relevant location information (such as information about nearby devices, WLAN access points, and base stations that may be required). We will collect the location information of both the mobile phone and the bound watch for functions such as basic positioning and electronic fences in the software. You can stop providing your geographical location information to this software and related services by turning off the location function. We understand that most mobile devices allow you (for specific products or services) to turn off the location service. For specific suggestions, please contact the service provider or manufacturer of your mobile device.
2.4 Contact List Information: When you use the contact list import function, after obtaining your express consent, we will only display your contact list information for you to select contacts and help the device quickly add contacts. The above information belongs to personal sensitive information. Refusing to provide this information will only prevent you from using the above functions, but will not affect your normal use of other functions of this software and related services. Additionally, you can turn off the relevant function at any time.
2.5 WeChat Chat Information: When you use the voice input, voice-to-text conversion functions in WeChat Chat, we will collect your voice content and text information because the collection is necessary to implement the above functions. After real-time processing, we will forward it to the watch.
2.6 Photo Information: When photos are uploaded after being taken by the watch, you can view the photos in remote photography. When you delete the local photo thumbnail, the photo stored in the cloud space will also be deleted. We will strictly protect the safety of album information in accordance with relevant laws and regulations and will not use it for other purposes other than this function.

III. The Storage of Personal Information

1. Location of Information Storage
In accordance with the provisions of relevant laws and regulations, the information and materials about you that we collect will be stored on the servers of this software platform within the territory of the People's Republic of China. Exceptions are as follows:

(1) When there are clear stipulations in laws and regulations.
(2) When obtaining your explicit authorization.
(3) When you conduct personal active behaviors such as cross-border transactions via the Internet.

2. Storage Period
We will retain your personal information only for the period necessary for the purpose of providing this software and services, except as otherwise provided by laws and regulations.

IV. The Possible Ways of Using Personal Information

1.To achieve the functions of this software and related services, we will use the personal information collected from you in accordance with the stipulations of this "Privacy Policy". If there are any other uses other than those mentioned, we will obtain your consent in advance. Specifically, we will use the collected personal information for the following purposes:

(1) To provide you with the highest quality services possible through this software and related services;

(2)To offer you more relevant advertisements instead of the traditionally widely distributed ones;

(3)When it is necessary for providing corresponding services, for identity verification, customer service, security prevention, fraud monitoring, archiving and backup purposes, striving to ensure the security of the products and services we provide to you;

2.To endeavor to ensure the security of the services and help us better understand the operation situation of this software and related services, we may record the information and data of your use of this software and related services. For example, the frequency of your use of this software and related services, crash data, overall usage situation, performance data, etc

3.We will conduct statistics on the usage of this software and related services and may share these statistical information with the public or third parties to demonstrate the overall usage trend of our software and related services. However, these statistical information will not contain any of your personal information.

4.The function of reading your contact list is mainly used for importing contacts from the phone book

5.Permission List and Its Uses

Permission Name

Permission Description

Usage

 

android.permission.INTERNET

Use of network

Necessary permission for networking

 

android.permission.VIBRATE

Vibration

Prompt for vibration failure when scanning codes

 

android.permission.WRITE_EXTERNAL_STORAGE

File storage

To store application configuration files and user ID files generated by algorithms

 

android.permission.READ_PHONE_STATE

Read device identification code

To generate a specific user ID through algorithms

 

android.permission.ACCESS_NETWORK_STATE
android.permission.ACCESS_WIFI_STATE

Monitoring of network status and Wi-Fi status & searching

1. For monitoring network traffic and updating the application package under Wi-Fi conditions. 
2. For setting up Wi-Fi on the watch and scanning for surrounding Wi-Fi.

 

android.permission.ACCESS_COARSE_LOCATION
android.permission.ACCESS_FINE_LOCATION

Location permission

For security fences and for the location of map anchors when the device location is unavailable.

 

android.permission.CAMERA

Camera permission

For security fences and for the location of map anchors when the device location is unavailable.

 

android.permission.RECORD_AUDIO

Recording permission

For recording in WeChat chat and video call functions.

 

android.permission.WAKE_LOCK
android.permission.DISABLE_KEYGUARD

Screen wake-up

For waking up the screen and unlocking during video calls.

 

android.permission.READ_CONTACTS

Read contacts

For importing contacts from the user's mobile phone when using the phonebook function.

 

android.permission.CALL_PHONE

Call function

For making calls to communicate with the device.

 

android.permission.MODIFY_AUDIO_SETTINGS

Volume control

For controlling the volume of video calls.

 

android.permission.INSTALL_PACKAGES
android.permission.REORDER_TASKS
android.permission.REQUEST_INSTALL_PACKAGES

Application installation

For invoking the installer when the user updates the app.

 

android.permission.QUERY_ALL_PACKAGES

Querying app installation/uninstallation status

The Tencent Guangdiantong Advertising SDK uses it to detect the installation and uninstallation status of apps.

 

android.permission.BLUETOOTH
android.permission.BLUETOOTH_ADMIN

Bluetooth

For switching Bluetooth headsets during video calls.

 

 

VThe Possible Ways of Sharing Personal Information

1.We will handle your information with a high level of diligence. After obtaining your explicit consent, we may share your personal information with third parties. In addition, we may share your personal information with relevant third parties in accordance with the requirements of laws and regulations, mandatory government requirements, or judicial rulings.

2.After obtaining your consent, we may share your personal information with our affiliated parties. Subject to the ways and purposes of using personal information that you have agreed to in this "Privacy Policy", we will only share the necessary personal information with affiliated parties. If affiliated parties truly need to use personal information beyond the aforementioned authorized scope due to business needs, they will seek your authorization and consent again.

3.To achieve several purposes stated in this "Privacy Policy", some of our services will be provided by authorized third parties. We may share certain personal information of yours with such authorized third parties to provide better customer service and user experience. We will only share your personal information for legal, legitimate, necessary, specific, and explicit purposes, and will only share the personal information necessary to provide such services. The authorized third parties have no right to use the shared personal information for any other purposes.

4.You consent to our sharing information with the following authorized third parties:

(1)Software service providers, smart device providers, or system service providers. When third-party software, devices, or systems are combined with this product and related services to provide you with location-based services, we may, based on your authorization and settings for system location, collect your location information and relevant device information (such as hardware model number, operating system version number, International Mobile Equipment Identity (IMEI), Network Equipment Hardware Address (MAC)) and provide them to the aforementioned providers. In special circumstances, it may also include other information you have filled in separately. If you refuse the collection and use of such information, you can make settings in the device system or close the software providing the services

(2)Advertising service providers. Without your authorization, we will not share your personal information with advertising service providers.

5.For the third parties with whom we share your personal information, we will investigate their data security capabilities and environments, sign strict confidentiality agreements with them, and require them to handle your personal information in accordance with the ways and purposes you have consented to, in accordance with this "Privacy Policy" and any other relevant confidentiality and security measures.

6.With the continuous development of our business, we may carry out mergers, acquisitions, asset transfers, or similar transactions. Your personal information may be transferred as part of such transactions. In the event of the aforementioned changes, we will notify you of the relevant situation before transferring your personal information and continue to protect your personal information in accordance with the laws and regulations and security standards not lower than those required by this "Privacy Policy" or require the new personal information controller to continue to protect your personal information.

7.Without your prior consent, we will not share your personal information with any third parties other than the company and its affiliated parties, except in the following circumstances:

(1) Having obtained your explicit authorization and consent first;
(2) You have shared it with third parties on your own;
(3) Directly related to national security, national defense security, public security, public health, and public interests;
(4) Disclosure or provision is necessary according to the requirements of applicable laws and regulations, mandatory administrative and judicial requirements, or directly related to criminal investigation, prosecution, trial, and execution of judgments. On the premise of complying with the laws and regulations, when we receive requests for the aforementioned disclosure of information, we will require the other party to produce the corresponding legal documents, such as subpoenas or investigation letters. We will conduct a 审慎 review of all requests to ensure that they have a legal basis and are limited to the data that administrative and judicial departments have the legal right to obtain for specific investigation purposes;
(5) Within the scope permitted by the laws and regulations, it is necessary to maintain the legitimate rights and interests of other users of the platform, the company and its affiliated parties, such as life, property, etc., or to ensure the safe and stable operation of the product or service for rights protection, such as finding, preventing, and handling illegal activities such as fraud and reducing credit risk (excluding publicly disclosing or providing personal information for profit-making purposes in violation of the commitments made in this "Privacy Policy");
(6) Collecting personal information from legally publicly disclosed information, such as through legal news reports, government information disclosure, etc.;
(7) Other circumstances as stipulated by the laws and regulations.

VIProtection of Personal Information Security

1.We attach great importance to the security of your personal information and will strive to adopt various reasonable security measures (including technical and managerial aspects) that meet industry standards to protect your personal information, preventing the personal information you provide from being misused or being accessed, publicly disclosed, used, modified, damaged, lost, or leaked without authorization.

2.We will use reasonable and feasible means such as encryption technology and anonymization processing to protect your personal information and utilize trusted protection mechanisms to prevent your personal information from being maliciously attacked.

3.Although we have taken the above reasonable and effective measures and have complied with the standards required by relevant laws and regulations, please understand that due to technological limitations and various possible malicious means, in the Internet industry, even if we do our best to strengthen security measures, it is impossible to always guarantee 100% information security. We will do our utmost to ensure the security of the personal information you provide to us. You are aware and understand that the system and communication network you use to access our services may encounter problems due to factors beyond our control. Therefore, we strongly recommend that you take active measures to protect the security of your personal information, including but not limited to using complex passwords, regularly changing passwords, and not revealing your account passwords and other personal information to others.

4.We will formulate emergency response plans and immediately activate the emergency response plan when a user information security incident occurs, striving to prevent the impact and consequences of such security incidents from expanding. Once a user information security incident (such as leakage or loss) occurs, we will, in accordance with the requirements of laws and regulations, promptly inform you of: the basic situation and possible impacts of the security incident, the disposal measures we have taken or will take, suggestions for you to independently prevent and reduce risks, remedial measures for you, etc. We will promptly inform you of the relevant situation of the incident in the form of push notifications, emails, letters, text messages, etc. When it is difficult to inform each individual, we will adopt a reasonable and effective way to issue an announcement. At the same time, we will also report the disposal situation of the user information security incident according to the requirements of relevant regulatory departments.

5.We hereby specifically remind you that the personal information protection measures provided in this "Privacy Policy" only apply to this software and related services. Once you leave this software and related services and browse or use other websites, services, and content resources, we have neither the ability nor the obligation to protect any personal information you submit on applications or websites outside this software and related services. Whether you log in or browse the above software or websites based on the links or guidance of this software, we will not bear any legal liability for this.

 

VIIManagement of Personal Information

We attach great importance to your management of personal information and will do our utmost to protect your rights to access, modify (update or correct), delete, and withdraw consent regarding your personal information, enabling you to have sufficient capabilities to safeguard your privacy and security.

1.After you complete the account registration and login of this software and conduct reasonable and necessary identity verification, you can view and modify the personal information you submitted to this software and related services. You understand and agree that, in general, you can browse and modify the information you submitted at any time. However, for the sake of security and identity identification (such as number appeal services), you may not be able to modify some of the initial registration information submitted during registration.

2.When your information falls into one of the following situations, in accordance with the requirements of laws and regulations, we may not be able to respond to your request:
(1) Related to national security and national defense security;
(2) Related to public security, public health, and major public interests, etc.;
(3) Related to criminal investigation, prosecution, trial, and execution of judgments, etc.;
(4) There is sufficient evidence indicating that you have subjective malice or are misusing your rights;
(5) Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations;
(6) Involving trade secrets;
(7) Situations stipulated by other laws and regulations.

3.Cancellation of Accounts by Personal Information Subjects

You can cancel the previously registered account at any time. You can operate it on your own through the following methods:
On the mobile phone end (Android/iOS), go to ["Mine" -> Click on the avatar to enter the "APP Settings" page -> Click on "Cancel Account" -> And use "Login Password Verification" / "Mobile Verification Code"]
After canceling the account, we will stop providing products or services to you and, according to your request, delete your personal information, except as otherwise provided by laws and regulations.

VIII. Terms of Use for Minors

Protecting children's personal information is a basic principle of ours. We will collect, use, or disclose the personal information of children or minors under the circumstances permitted by laws and regulations, with the explicit consent of guardians or when necessary to protect their rights and interests. And we will do a good job in protecting children's personal information with the assistance and supervision of children and their guardians:

1.For data that can be identified as children's personal information, we will strictly collect, use, or disclose the personal information of children or minors in accordance with the requirements of laws and regulations such as the "Law of the People's Republic of China on the Protection of Minors" and the "Regulations on the Protection of Children's Personal Information on the Internet.

2.If you are a minor, before using the related services, you should obtain the consent of your guardian in advance and read this "Privacy Policy" together with your guardian under their supervision and guidance.

3.During the process of registering an account or using services, you may need to fill in some necessary information. If you are a child under the age of fourteen, please obtain the consent of your guardian before filling in and fill in the relevant information accompanied by your guardian.

4.We will use various security technologies and procedures to establish a sound management system to protect the personal information of minors from unauthorized access, use, or disclosure. However, it should be noted that no security measure is completely reliable.

IX. Changes to the Privacy Policy

To provide you with better services, this software and related services will be updated and changed from time to time. We will revise this "Privacy Policy" in a timely manner. Such revisions form a part of this "Privacy Policy" and have the same effect as this "Privacy Policy". However, without your explicit consent, we will not reduce the rights you should enjoy according to the currently effective "Privacy Policy". For major changes, we will provide more prominent notices.
The major changes referred to in this policy include but are not limited to:
Our service mode has undergone major changes. Such as the purpose of processing personal information, the type of personal information processed, the way of using personal information, etc.;
We have undergone major changes in terms of control rights. Such as changes in ownership caused by mergers and acquisitions, restructuring, etc.;
The main objects of personal information sharing, transfer, or public disclosure have changed;
Your rights in participating in personal information processing and the ways of exercising them have undergone major changes;
The personal information security impact assessment report indicates a high risk;
In response to the release and implementation of policies or laws, changes are made to respond to national policies or legal norms.

X. Others

1.The title of this "Privacy Policy" is only for the convenience of reading and does not affect the meaning or interpretation of any provisions in this "Privacy Policy".

2.If you have any opinions or suggestions regarding this "Privacy Policy" or the functions related to the collection, preservation, use, sharing, disclosure, protection, etc. of your personal information, you can provide feedback or file complaints through the user feedback channels. We will respond to you as soon as we receive your opinions and suggestions.

3.The copyright of this "Privacy Policy" belongs to the company. Within the limits permitted by law, the company reserves the final right to interpret and modify.

Shenzhen Xinmiao Communication Technology Co., Ltd.