With the concepts of safety,
communication, care and companionship
iecute
(hereinafter referred to as "we") provides device-side software
services by Shenzhen Xinmiao Communication Technology Co., Ltd. We are
fully aware of the importance of your personal information and will do
our utmost to protect the security and reliability of your personal
information. We are committed to maintaining your trust in us and abide
by the following principles to protect your personal information: the
principle of consistency of rights and responsibilities, the principle
of clear purpose, the principle of consent by choice, the principle of
minimal sufficiency, the principle of ensuring security, the principle
of subject participation, the principle of openness and transparency,
etc. Meanwhile, we will adopt corresponding security protection
measures to protect your personal information in accordance with the
mature security standards in the industry.
Please
read and understand this "Privacy Policy" carefully before using our
products (or services), and confirm that you understand our rules for
processing your personal information.
This policy will help you understand the following contents:
I. The scope of application of this "Privacy Policy"
II. The scope and methods of possible collection of personal information
III. The storage of personal information
IV. The possible ways of using personal information
V. The possible ways of sharing personal information
VI. The protection of personal information security
VII. The management of personal information
VIII. Terms of use for minors
IX. Changes to the privacy policy
X. Others
I. The Scope of Application of this "Privacy Policy"
Unless
otherwise stipulated in this "Privacy Policy", the terms used in this
"Privacy Policy" have the same meanings as those defined in the "User
Service Agreement".
1. This "Privacy Policy" does not apply to the following situations:
1.1
The collection and use of your personal information by third-party
services (including any third-party applications and websites) accessed
through this software and related services;
1.2
The collection and use of your personal information by other third
parties that provide advertising services in this software and related
services.
2.The
software and related services may include or be linked to information
or other services (including websites) provided by third parties. Such
third-party services may be operated by the relevant third parties.
Your use of such third-party services (including any personal
information you provide to third parties) shall be subject to the
service terms and privacy policies of the third parties (rather than
this "Privacy Policy"). You need to read their terms carefully. Please
protect your personal information properly and only provide it to
others when necessary. We shall not be responsible for any use of the
information provided by you by any third party.
II. The Scope and Methods of Possible Collection of Personal Information
When
you are using this software and related services, you understand and
agree that we may collect, store and use the following data related to
your personal information. These information can be used for functions
such as registration, login and account binding. If you do not provide
the relevant information, you may not be able to register as our user
or enjoy certain services provided by us, or achieve the expected
effects of relevant services.
When
you are using certain functions of this software and related services,
according to the relevant laws and regulations of the People's Republic
of China, you may need to provide your real identity information
through your account. We will assist you in choosing an appropriate way
to complete the real-name verification according to your identity
attributes. If you only need to use basic functions such as browsing
and searching, you do not need to register an account of this software,
nor do you need to provide relevant information.
1. Information provided by you to us
1.1
Information filled in or provided by you when registering, logging in
or using this software and related services. We will collect your
nickname, avatar and mobile phone number. The collection of these
information is to help you complete account registration and protect
the security of your account. Mobile phone numbers are sensitive
information, and the collection of such information is to meet the
requirements of the network real-name system stipulated by relevant
laws and regulations. If you do not provide such information, you may
not be able to use our services normally.
2. Information Obtained Due to Your Use of This Software and Services
2.1
Log Information: When you use this software and related services, we
will automatically collect your usage of our services and save it as
relevant network logs. This includes information such as your device
model, system version, network status, and abnormal information, which
will be stored in files as logs.
2.2
Device or Application Information: Some mobile devices or applications
have unique application program numbers. For example, the configuration
information, device version number, device identification code, etc.
provided by the mobile device, browser, or other programs you use to
access this software and related services. To provide you with better
services and improve your user experience, this software and related
services may record hardware model numbers, operating system version
numbers, International Mobile Equipment Identity (IMEI), Network
Equipment Hardware Address (MAC), and other software and hardware data.
2.3
Location Information: When you enable the device location function and
use the relevant services provided by this software and related
services based on location, after obtaining your consent, we will use
various information for positioning so that you can obtain the relevant
services without manually entering your own geographical coordinates.
This information includes IP addresses, GPS signals, and other sensor
information that can provide relevant location information (such as
information about nearby devices, WLAN access points, and base stations
that may be required). We will collect the location information of both
the mobile phone and the bound watch for functions such as basic
positioning and electronic fences in the software. You can stop
providing your geographical location information to this software and
related services by turning off the location function. We understand
that most mobile devices allow you (for specific products or services)
to turn off the location service. For specific suggestions, please
contact the service provider or manufacturer of your mobile device.
2.4
Contact List Information: When you use the contact list import
function, after obtaining your express consent, we will only display
your contact list information for you to select contacts and help the
device quickly add contacts. The above information belongs to personal
sensitive information. Refusing to provide this information will only
prevent you from using the above functions, but will not affect your
normal use of other functions of this software and related services.
Additionally, you can turn off the relevant function at any time.
2.5
WeChat Chat Information: When you use the voice input, voice-to-text
conversion functions in WeChat Chat, we will collect your voice content
and text information because the collection is necessary to implement
the above functions. After real-time processing, we will forward it to
the watch.
2.6
Photo Information: When photos are uploaded after being taken by the
watch, you can view the photos in remote photography. When you delete
the local photo thumbnail, the photo stored in the cloud space will
also be deleted. We will strictly protect the safety of album
information in accordance with relevant laws and regulations and will
not use it for other purposes other than this function.
III. The Storage of Personal Information
1. Location of Information Storage
In
accordance with the provisions of relevant laws and regulations, the
information and materials about you that we collect will be stored on
the servers of this software platform within the territory of the
People's Republic of China. Exceptions are as follows:
(1) When there are clear stipulations in laws and regulations.
(2) When obtaining your explicit authorization.
(3) When you conduct personal active behaviors such as cross-border transactions via the Internet.
2. Storage Period
We
will retain your personal information only for the period necessary for
the purpose of providing this software and services, except as
otherwise provided by laws and regulations.
IV. The Possible Ways of Using Personal Information
1.To
achieve the functions of this software and related services, we will
use the personal information collected from you in accordance with the
stipulations of this "Privacy Policy". If there are any other uses
other than those mentioned, we will obtain your consent in advance.
Specifically, we will use the collected personal information for the
following purposes:
(1) To provide you with the highest quality services possible through this software and related services;
(2)To offer you more relevant advertisements instead of the traditionally widely distributed ones;
(3)When
it is necessary for providing corresponding services, for identity
verification, customer service, security prevention, fraud monitoring,
archiving and backup purposes, striving to ensure the security of the
products and services we provide to you;
2.To
endeavor to ensure the security of the services and help us better
understand the operation situation of this software and related
services, we may record the information and data of your use of this
software and related services. For example, the frequency of your use
of this software and related services, crash data, overall usage
situation, performance data, etc。
3.We
will conduct statistics on the usage of this software and related
services and may share these statistical information with the public or
third parties to demonstrate the overall usage trend of our software
and related services. However, these statistical information will not
contain any of your personal information.
4.The function of reading your contact list is mainly used for importing contacts from the phone book。
5.Permission List and Its Uses
Permission Name |
Permission Description |
Usage |
|
android.permission.INTERNET |
Use of network |
Necessary permission for networking |
|
android.permission.VIBRATE |
Vibration |
Prompt for vibration failure when scanning codes |
|
android.permission.WRITE_EXTERNAL_STORAGE |
File storage |
To store application configuration files and user ID files generated by algorithms |
|
android.permission.READ_PHONE_STATE |
Read device identification code |
To generate a specific user ID through algorithms |
|
android.permission.ACCESS_NETWORK_STATE |
Monitoring of network status and Wi-Fi status & searching |
1. For monitoring network traffic and updating the application package under Wi-Fi conditions. |
|
android.permission.ACCESS_COARSE_LOCATION |
Location permission |
For security fences and for the location of map anchors when the device location is unavailable. |
|
android.permission.CAMERA |
Camera permission |
For security fences and for the location of map anchors when the device location is unavailable. |
|
android.permission.RECORD_AUDIO |
Recording permission |
For recording in WeChat chat and video call functions. |
|
android.permission.WAKE_LOCK |
Screen wake-up |
For waking up the screen and unlocking during video calls. |
|
android.permission.READ_CONTACTS |
Read contacts |
For importing contacts from the user's mobile phone when using the phonebook function. |
|
android.permission.CALL_PHONE |
Call function |
For making calls to communicate with the device. |
|
android.permission.MODIFY_AUDIO_SETTINGS |
Volume control |
For controlling the volume of video calls. |
|
android.permission.INSTALL_PACKAGES |
Application installation |
For invoking the installer when the user updates the app. |
|
android.permission.QUERY_ALL_PACKAGES |
Querying app installation/uninstallation status |
The Tencent Guangdiantong Advertising SDK uses it to detect the installation and uninstallation status of apps. |
|
android.permission.BLUETOOTH |
Bluetooth |
For switching Bluetooth headsets during video calls. |
|
1.We
will handle your information with a high level of diligence. After
obtaining your explicit consent, we may share your personal information
with third parties. In addition, we may share your personal information
with relevant third parties in accordance with the requirements of laws
and regulations, mandatory government requirements, or judicial rulings.
2.After
obtaining your consent, we may share your personal information with our
affiliated parties. Subject to the ways and purposes of using personal
information that you have agreed to in this "Privacy Policy", we will
only share the necessary personal information with affiliated parties.
If affiliated parties truly need to use personal information beyond the
aforementioned authorized scope due to business needs, they will seek
your authorization and consent again.
3.To
achieve several purposes stated in this "Privacy Policy", some of our
services will be provided by authorized third parties. We may share
certain personal information of yours with such authorized third
parties to provide better customer service and user experience. We will
only share your personal information for legal, legitimate, necessary,
specific, and explicit purposes, and will only share the personal
information necessary to provide such services. The authorized third
parties have no right to use the shared personal information for any
other purposes.
4.You consent to our sharing information with the following authorized third parties:
(1)Software
service providers, smart device providers, or system service providers.
When third-party software, devices, or systems are combined with this
product and related services to provide you with location-based
services, we may, based on your authorization and settings for system
location, collect your location information and relevant device
information (such as hardware model number, operating system version
number, International Mobile Equipment Identity (IMEI), Network
Equipment Hardware Address (MAC)) and provide them to the
aforementioned providers. In special circumstances, it may also include
other information you have filled in separately. If you refuse the
collection and use of such information, you can make settings in the
device system or close the software providing the services。
(2)Advertising
service providers. Without your authorization, we will not share your
personal information with advertising service providers.
5.For
the third parties with whom we share your personal information, we will
investigate their data security capabilities and environments, sign
strict confidentiality agreements with them, and require them to handle
your personal information in accordance with the ways and purposes you
have consented to, in accordance with this "Privacy Policy" and any
other relevant confidentiality and security measures.
6.With
the continuous development of our business, we may carry out mergers,
acquisitions, asset transfers, or similar transactions. Your personal
information may be transferred as part of such transactions. In the
event of the aforementioned changes, we will notify you of the relevant
situation before transferring your personal information and continue to
protect your personal information in accordance with the laws and
regulations and security standards not lower than those required by
this "Privacy Policy" or require the new personal information
controller to continue to protect your personal information.
7.Without
your prior consent, we will not share your personal information with
any third parties other than the company and its affiliated parties,
except in the following circumstances:
(1) Having obtained your explicit authorization and consent first;
(2) You have shared it with third parties on your own;
(3) Directly related to national security, national defense security, public security, public health, and public interests;
(4)
Disclosure or provision is necessary according to the requirements of
applicable laws and regulations, mandatory administrative and judicial
requirements, or directly related to criminal investigation,
prosecution, trial, and execution of judgments. On the premise of
complying with the laws and regulations, when we receive requests for
the aforementioned disclosure of information, we will require the other
party to produce the corresponding legal documents, such as subpoenas
or investigation letters. We will conduct a 审慎 review of all requests
to ensure that they have a legal basis and are limited to the data that
administrative and judicial departments have the legal right to obtain
for specific investigation purposes;
(5)
Within the scope permitted by the laws and regulations, it is necessary
to maintain the legitimate rights and interests of other users of the
platform, the company and its affiliated parties, such as life,
property, etc., or to ensure the safe and stable operation of the
product or service for rights protection, such as finding, preventing,
and handling illegal activities such as fraud and reducing credit risk
(excluding publicly disclosing or providing personal information for
profit-making purposes in violation of the commitments made in this
"Privacy Policy");
(6)
Collecting personal information from legally publicly disclosed
information, such as through legal news reports, government information
disclosure, etc.;
(7) Other circumstances as stipulated by the laws and regulations.
1.We
attach great importance to the security of your personal information
and will strive to adopt various reasonable security measures
(including technical and managerial aspects) that meet industry
standards to protect your personal information, preventing the personal
information you provide from being misused or being accessed, publicly
disclosed, used, modified, damaged, lost, or leaked without
authorization.
2.We
will use reasonable and feasible means such as encryption technology
and anonymization processing to protect your personal information and
utilize trusted protection mechanisms to prevent your personal
information from being maliciously attacked.
3.Although
we have taken the above reasonable and effective measures and have
complied with the standards required by relevant laws and regulations,
please understand that due to technological limitations and various
possible malicious means, in the Internet industry, even if we do our
best to strengthen security measures, it is impossible to always
guarantee 100% information security. We will do our utmost to ensure
the security of the personal information you provide to us. You are
aware and understand that the system and communication network you use
to access our services may encounter problems due to factors beyond our
control. Therefore, we strongly recommend that you take active measures
to protect the security of your personal information, including but not
limited to using complex passwords, regularly changing passwords, and
not revealing your account passwords and other personal information to
others.
4.We
will formulate emergency response plans and immediately activate the
emergency response plan when a user information security incident
occurs, striving to prevent the impact and consequences of such
security incidents from expanding. Once a user information security
incident (such as leakage or loss) occurs, we will, in accordance with
the requirements of laws and regulations, promptly inform you of: the
basic situation and possible impacts of the security incident, the
disposal measures we have taken or will take, suggestions for you to
independently prevent and reduce risks, remedial measures for you, etc.
We will promptly inform you of the relevant situation of the incident
in the form of push notifications, emails, letters, text messages, etc.
When it is difficult to inform each individual, we will adopt a
reasonable and effective way to issue an announcement. At the same
time, we will also report the disposal situation of the user
information security incident according to the requirements of relevant
regulatory departments.
5.We
hereby specifically remind you that the personal information protection
measures provided in this "Privacy Policy" only apply to this software
and related services. Once you leave this software and related services
and browse or use other websites, services, and content resources, we
have neither the ability nor the obligation to protect any personal
information you submit on applications or websites outside this
software and related services. Whether you log in or browse the above
software or websites based on the links or guidance of this software,
we will not bear any legal liability for this.
We
attach great importance to your management of personal information and
will do our utmost to protect your rights to access, modify (update or
correct), delete, and withdraw consent regarding your personal
information, enabling you to have sufficient capabilities to safeguard
your privacy and security.
1.After
you complete the account registration and login of this software and
conduct reasonable and necessary identity verification, you can view
and modify the personal information you submitted to this software and
related services. You understand and agree that, in general, you can
browse and modify the information you submitted at any time. However,
for the sake of security and identity identification (such as number
appeal services), you may not be able to modify some of the initial
registration information submitted during registration.
2.When
your information falls into one of the following situations, in
accordance with the requirements of laws and regulations, we may not be
able to respond to your request:
(1) Related to national security and national defense security;
(2) Related to public security, public health, and major public interests, etc.;
(3) Related to criminal investigation, prosecution, trial, and execution of judgments, etc.;
(4) There is sufficient evidence indicating that you have subjective malice or are misusing your rights;
(5)
Responding to your request will cause serious damage to the legitimate
rights and interests of you or other individuals or organizations;
(6) Involving trade secrets;
(7) Situations stipulated by other laws and regulations.
3.Cancellation of Accounts by Personal Information Subjects:
You can cancel the previously registered account at any time. You can operate it on your own through the following methods:
On
the mobile phone end (Android/iOS), go to ["Mine" -> Click on the
avatar to enter the "APP Settings" page -> Click on "Cancel Account"
-> And use "Login Password Verification" / "Mobile Verification
Code"]
After
canceling the account, we will stop providing products or services to
you and, according to your request, delete your personal information,
except as otherwise provided by laws and regulations.
VIII. Terms of Use for Minors
Protecting
children's personal information is a basic principle of ours. We will
collect, use, or disclose the personal information of children or
minors under the circumstances permitted by laws and regulations, with
the explicit consent of guardians or when necessary to protect their
rights and interests. And we will do a good job in protecting
children's personal information with the assistance and supervision of
children and their guardians:
1.For
data that can be identified as children's personal information, we will
strictly collect, use, or disclose the personal information of children
or minors in accordance with the requirements of laws and regulations
such as the "Law of the People's Republic of China on the Protection of
Minors" and the "Regulations on the Protection of Children's Personal
Information on the Internet.
2.If
you are a minor, before using the related services, you should obtain
the consent of your guardian in advance and read this "Privacy Policy"
together with your guardian under their supervision and guidance.
3.During
the process of registering an account or using services, you may need
to fill in some necessary information. If you are a child under the age
of fourteen, please obtain the consent of your guardian before filling
in and fill in the relevant information accompanied by your guardian.
4.We
will use various security technologies and procedures to establish a
sound management system to protect the personal information of minors
from unauthorized access, use, or disclosure. However, it should be
noted that no security measure is completely reliable.
IX. Changes to the Privacy Policy
To
provide you with better services, this software and related services
will be updated and changed from time to time. We will revise this
"Privacy Policy" in a timely manner. Such revisions form a part of this
"Privacy Policy" and have the same effect as this "Privacy Policy".
However, without your explicit consent, we will not reduce the rights
you should enjoy according to the currently effective "Privacy Policy".
For major changes, we will provide more prominent notices.
The major changes referred to in this policy include but are not limited to:
Our
service mode has undergone major changes. Such as the purpose of
processing personal information, the type of personal information
processed, the way of using personal information, etc.;
We
have undergone major changes in terms of control rights. Such as
changes in ownership caused by mergers and acquisitions, restructuring,
etc.;
The main objects of personal information sharing, transfer, or public disclosure have changed;
Your rights in participating in personal information processing and the ways of exercising them have undergone major changes;
The personal information security impact assessment report indicates a high risk;
In
response to the release and implementation of policies or laws, changes
are made to respond to national policies or legal norms.
X. Others
1.The
title of this "Privacy Policy" is only for the convenience of reading
and does not affect the meaning or interpretation of any provisions in
this "Privacy Policy".
2.If
you have any opinions or suggestions regarding this "Privacy Policy" or
the functions related to the collection, preservation, use, sharing,
disclosure, protection, etc. of your personal information, you can
provide feedback or file complaints through the user feedback channels.
We will respond to you as soon as we receive your opinions and
suggestions.
3.The
copyright of this "Privacy Policy" belongs to the company. Within the
limits permitted by law, the company reserves the final right to
interpret and modify.
Shenzhen Xinmiao Communication Technology Co., Ltd.