Updated on: July 12, 2022


 Release date: July 12, 2022
 Effective date: July 12, 2022

Overview of
We attach great importance to the protection of your personal information and will take appropriate security measures to protect your personal information in accordance with laws and regulations. In view of this, the AWEI platform operating entity (referred to as "AWEI" or "we") has formulated this "Personal Information Protection and Privacy Policy"(referred to as "this Policy").

This  olicy applies to all products and services provided by AWEI. If our affiliates' products or services use products or services provided by the AWEI platform but do not have an applicable privacy policy, this policy also applies to that privacy policy.

We are well aware of the importance of personal information to you and will do our utmost to protect the security and reliability of your personal information. We are committed to maintaining your trust in us and abide by the following principles to protect your personal information: consistency of rights and responsibilities, clear purpose, choice and consent, minimum necessary, ensuring security, subject participation, and openness and transparency. At the same time, this product promises that we will take corresponding security measures to protect your personal information in accordance with the mature security standards in the industry.

We will collect and use your personal information in accordance with this policy in order to provide you with relevant products or services. If you have any questions, comments or suggestions about the content of this policy, you can contact us through the contact information specified in this policy, and we will respond to you as soon as possible.

Please read and understand this ‘’Privacy Policy‘’carefully before using our products (or services).

This privacy policy will help you understand the following:

      · Part 1: Definition

      · Part II: Text of the Privacy Agreement

                  · One,Other business functions

                  · Two,How do we use cookies and                                           similar  technologies

                  · Three,How do we share, transfer and                                       publicly  disclose personal                                             information

                  · Four.,How do we protect your                                                 information

                  · Five.,Your Rights

                  · Six.,Information protection for minors

                  · Seven.,How is your personal                                                      information   transferred                                                globally?

                  · Eight.,Applicable Law and Jurisdiction

                  · Nine.,How to update this policy

                  · Ten,,application permission description

                  · Eleven.,How to contact us

                  · Twelve,,Developer

How we collect and use your personal information
Personal information refers to various information recorded in electronic or other forms that can be used alone or in combination with other information to identify the identity of a specific natural person or reflect the activities of a specific natural person.
This product will only collect and use your personal information for the following purposes described in this policy:

Part 1: Definition
AWEI: refers to AWEI's provision of Internet services to users, namely the AWEI app
AWEI Operation Platform Main Body: Shenzhen Yale Electronics Co., Ltd.
Personal information: refers to various information recorded in electronic or other forms that can be used alone or in combination with other information to identify the identity of a specific natural person or reflect the activities of a specific natural person

Part II: Text of Privacy Agreement

One,Other business functions

  1. In order to continuously improve and optimize our service experience, troubleshoot product failures, and ensure account security, we may collect your device model, operating system, unique device identifier, IP address, access network method, type and status, software usage history, click history, operation log information, language and time zone, browser model and browsing history using this product, and EXIF data.
    2.When you provide feedback, consultation or complaints about this product, in order to facilitate contact with you or help you solve problems, we may need you to provide your name, mobile phone number, email address and other valid contact information. If you refuse to provide the above information, it will affect the timely handling of issues and feedback.

Two,How do we use cookies and similar technologies
(I) Cookie
To ensure the normal operation of the website, we will store small data files called cookies on your computer or mobile device. Cookies usually contain identifiers, site names, and some numbers and characters. With the help of cookies, websites can store your preference data. We will not use cookies for any purpose other than the purposes described in this policy. You can manage or delete cookies according to your preferences. For more information, please refer to AboutCookies.org. You can clear all cookies saved on your computer. Most web browsers have a function to prevent cookies, and you can clear all cookies saved on your computer through browser settings options.
(2) Website beacon and pixel tag
In addition to cookies, we also use other similar technologies such as web beacons and pixel tags on our website. For example, the email we send to you may contain a click URL that links to our website content. If you click on the link, we will track the click to help us understand your product or service preferences and improve customer service. Web beacons are usually a transparent image embedded in the website or email. With the help of pixel tags in emails, we can know whether the email is opened. If you do not want your activities to be tracked in this way, you can unsubscribe from our mailing list at any time.

Three,How do we share, transfer, and publicly disclose your personal information

(I) Sharing
We will not share your personal information with any company, organization, or individual other than Shenzhen Yaluo Electronics Co., Ltd., except in the following circumstances:

        · 1. Sharing with explicit consent: After obtaining                your explicit consent, we will share your                        personal information with other parties.

        · 2. We may share your personal information                      with others in accordance with laws and                        regulations, the need to resolve litigation                      disputes, or mandatory requirements                            imposed by government authorities or                          judicial authorities in accordance with the                    law.

        · 3. Within the scope required or permitted by                    law, it is necessary to provide your personal                  information to third parties in order to                          protect the interests, property, or safety of                    the product and its users or the public from                  harm.

        · 4. Sharing with our affiliates: Your personal                       information may be shared with affiliates of                 Shenzhen Yaluo Electronics Co., Ltd. We will                 only share necessary personal information                   and be bound by the stated purposes in this                 privacy policy. If the affiliate wants to change               the purpose of processing personal                               information, it will seek your authorization                   and consent again.

        · 5. Sharing with authorized partners: For the                      purposes stated in this policy, some of our                    services will be provided by authorized                        partners. We may share some of your                            personal information with our partners to                    ensure the completion of the services                            provided to you and to provide you with                      better customer service and user experience.                We will only share your personal information                for legitimate, justified, necessary, specific,                    and clear purposes, and will only share the                  personal information necessary for providing                services. Our partners do not have the right                  to use the shared personal information for                    any other purpose.

Currently, our authorized partners include the following three types:
(1) Technical support partners. In order to complete corresponding functions, we will access third-party SDKs for technical support, such as helping us understand product user distribution and data analysis. We may provide the following personal information to such partners. This product may choose to use some of these partners or change partners at different times, so the list of partners may be adjusted.


Name of the third-party SDK

Description of usage scenarios

Types of shared personal information

Privacy Policy

Youmeng Statistics

Used for user device IMEI registration, start, and open records

Unique device identification code IMEI, IP address, (MAC) address

Youmeng Privacy Policy



(2) Transfer
We will not transfer your personal information to any company, organization, or individual, except in the following circumstances:

· 1. Transfer with explicit consent: After obtaining your explicit consent, we will transfer your personal information to other parties.

· 2. In case of mergers, acquisitions, or bankruptcy liquidation: If personal information is involved in mergers, acquisitions, or bankruptcy liquidation, we will require the new company or organization that holds your personal information to continue to be bound by this privacy policy. Otherwise, we will require the company or organization to seek your authorization and consent again.

(3) Public disclosure
We will only publicly disclose your personal information in the following circumstances:

· 1. With your explicit consent;

· 2. Based on laws: We may disclose your personal information in accordance with laws, legal proceedings, litigation, or mandatory requirements imposed by government authorities or judicial authorities in accordance with the law.

(5) Exception
According to relevant laws and regulations, in the following circumstances, we may collect, share, transfer, or publicly disclose your personal information without obtaining your authorization consent:

        · 1. Directly related to national security, national defense security and other national interests;

        · 2. Directly related to public safety, public health,  public knowledge and other major                    public interests;

        · 3. Directly related to criminal investigation,    prosecution, trial and judgment execution;

        · 4. To safeguard your or other individuals' vital   interests such as life, property, reputation and other important legitimate rights and interests but it is difficult to obtain your   consent;

        · 5. To sign and perform contracts as required;

        · 6. To maintain the safe and stable operation of   the products or services provided and          necessary for maintenance, such as  detecting and disposing of product or   service  failures;

         · 7. For public interest statistical or academic research and necessary to provide academic         research or descriptive results, as long as   the  personal information contained in the  results is de-identified;

         · 8. Collected from legally disclosed information,    such as legal news reports, government  information disclosure and other channels;

         · 9. Other circumstances stipulated by laws and  regulations.

Four,How do we protect your personal information?

(1)We have used security protection measures that meet industry standards to protect the personal information you provide, preventing unauthorized access, disclosure, use, modification, damage, or loss of data. We will take all reasonable and feasible measures to protect your personal information. For example, SSL encryption is used to protect the exchange of data (such as credit card information) between your browser and the "service"; we provide HTTPS secure access to the supporting web services provided by the product; we use trusted protection mechanisms to prevent data from being malicious attacked; we deploy access control mechanisms to ensure that only authorized personnel can access personal information; and we hold security and privacy protection training courses to enhance employees' awareness of the importance of protecting personal information.

(2)We will take all reasonable and feasible measures to ensure that no irrelevant personal information is collected. We promise to store your personal information for a reasonable and necessary period of time required by law or to achieve product functions and services. For personal information that exceeds the deadline, we will immediately delete or anonymize it.

(3)The Internet is not an absolutely secure environment, and email, instant messaging, and other communication methods with other users of this product are not encrypted. We strongly recommend that you do not send personal information through such methods. Please use complex passwords to help us ensure the security of your account.

(4)The Internet environment is not 100% secure, and we will do our best to ensure or guarantee the security of any information you send to us.

(5) After the occurrence of a personal information security incident, we will promptly inform you of the basic situation and possible impact of the security incident, the measures we have taken or will take, suggestions for you to prevent and reduce risks, and remedies for you in accordance with the requirements of laws and regulations. We will promptly inform you of the relevant situation of the incident by email, telephone, push notification, etc. When it is difficult to inform the personal information subject one by one, we will take reasonable and effective measures to issue an announcement. At the same time, we will also proactively report the handling of personal information security incidents in accordance with the requirements of the regulatory authorities.

Five,Your Rights
In accordance with relevant Chinese laws, regulations, standards, and common practices in other countries and regions, we guarantee that you can exercise the following rights with respect to your personal information:

(I) Access to your personal information
If you wish to access or correct personal information in your account, you can do so by visiting My Account - Account Information.

(2) Deleting your personal information

  1. In the following circumstances, you can request us to delete your personal information through the contact information in Article 11 of this policy

· (1) If our handling of personal information violates laws and regulations;

· (2) If we collect and use your personal information without your consent;

· (3) If our handling of personal information violates our agreement with you;

· (4) If you no longer use our products or services, or you have cancelled your account;

The way to cancel the account is: My - Profile - Cancel the account

· (5) If we no longer provide you with products or services.

  1. If we decide to respond to your request for deletion, we will also notify the entities that obtained your personal information from us and request them to delete it in a timely manner, unless otherwise specified by laws and regulations or if these entities have obtained your independent authorization.

(3) Withdraw your authorization
If you wish to revoke your authorization, you can contact us through the contact information in this policy. We will process your request within a reasonable time after receiving your email or registered letter.
However, please understand and agree that when you withdraw certain authorizations, the related product features will become unavailable, and we will not be able to continue to provide you with the specific features and/or services corresponding to the withdrawal of consent or authorization. And your decision to withdraw authorization will not affect the personal information processing that was previously carried out based on your authorization.

(4) Responding to your above-mentioned requests

  1. To ensure security, you may need to provide a written request or otherwise prove your identity. We may first require you to verify your identity before processing your request. We will respond within fifteen days.
  2. For your reasonable requests, we do not charge fees in principle, but for repeated requests that exceed reasonable limits, we will charge a certain amount of costs depending on the situation. For those requests that are unprovoked, require excessive technical means (such as the need to develop new systems or fundamentally change existing practices), pose risks to the legitimate rights and interests of others, or are very unrealistic (such as involving information stored on backup tapes), we may refuse them.
    In the following circumstances, we will not be able to respond to your request in accordance with legal and regulatory requirements.

    · (1) Directly related to national security and  defense security;
    · (2) Directly related to public safety, public  health,  and major public interests;

    · (3) Directly related to criminal investigation,     prosecution, trial, and execution of judgment;

    · (4) There is sufficient evidence to indicate that   you have subjective malice or abuse of power;

    · (5) Responding to your request will cause   serious harm to the legitimate rights and             interests of you or other individuals or   organizations;

    · (6) Those involving trade secrets.

    Six, How do we handle the personal information of minors
    (1)Our products, websites, and services are primarily aimed at adults. Minors are not allowed to create their own user accounts without the consent of their parents or guardians. If you are a minor under the age of 14, please be sure to read this policy with your guardian before using our products and/or services, and ensure that you have obtained your guardian's explicit consent before using our services and providing us with your personal information.
    (2)For the collection of personal information of minors with the consent of their parents, we will only use or disclose this information when legally permitted, with the explicit consent of the parents or guardians, or when necessary to protect the minors.
    (3)If your guardian does not agree with your use of our services or the provision of personal information to us in accordance with this policy, please immediately terminate your use of our services and notify us promptly.

    Seven, How is your personal information transferred globally?
    We will store personal information collected within the territory of the People's Republic of China in accordance with laws and regulations. At the same time, as we provide products or services through resources and servers located around the world, this means that your personal information may be transferred to overseas jurisdictions in the country/region where you use the product or service, or subject to access from these jurisdictions, after obtaining your authorization and consent.
    Such jurisdictions may have different data protection laws or even no relevant laws. In such cases, we will ensure that your personal information is adequately protected within the People's Republic of China. For example, we will request your consent for cross-border transfer of personal information, or implement security measures such as data de-identification before cross-border data transfer.

    Eight,Applicable Law and Jurisdiction
    This privacy policy applies to the laws of the mainland of the People's Republic of China. Disputes under this privacy policy are subject to the jurisdiction of the court where the defendant resides.

    Nine,How to update this policy
    (1)Our privacy policy may be changed or revised. Without your explicit consent, we will not reduce your rights under this privacy policy.We will post any changes to this policy on this page. For major changes, we will notify you via email, phone, and push notification.
    (2)Major changes referred to in this policy include but are not limited to:

    · 1. Our purpose for processing personal   information, the types of personal                          information processed, and the ways in   which personal information is used;

    · 2. There are significant changes in your   rights and methods of exercising your             rights in the processing of personal  information;

    · 3. When the personal information security  impact product report indicates a risk.

    Ten,Application Permission Description
    When you are taking or editing pictures and shooting videos, in order to provide you with corresponding services, we may need you to open the following terminal system permissions:

    · (1) Camera permission, for taking photos;

    · (2) Album (iOS)/storage (Android) permissions,  used to read and store photos and videos;

    · (3) Storage: used to access pictures, videos,  audio, data files, and other content on your         device, allowing you to use device storage  space and providing file download, data               storage, and other services;

    · (4) Read device status (obtain device IMSI and   IMEI numbers): This is convenient for                     creating uniquely identified users based on  the IMEI number when users are testing               features, and serves as the user's ID. This  facilitates quick login for users;

    · (5) You can manage all permissions in the Settings-Application Management or                   Application Permissions settings system, allowing and canceling permissions                       independently.

    · (6)The APP will frequently self-start and associated start, this function is used to keep the watch Bluetooth connected to the app after the app exits, and receive information in real time after you allow it.

    · (7) The SDK used by the APP is as follows:

    Wechat SDK (wechat login).

    Amap SDK(Retrieving the device will be displayed on Amap).

    If you refuse to enable any of the above permissions, you will only be unable to access the corresponding functions, but you can continue to use other functions of this product.

    · (8) Obtain location permission item: In order for the Bluetooth of the mobile phone system to accurately search for nearby devices.

    Eleven,How to contact us
    If you have any questions, comments, suggestions or complaints about this policy or the content of the service, you can contact us through the following ways: Please contact customer service:
    yale@awei.hk

    Twelve,Developer

    Shenzhen Yaluo Electronics Co., Ltd.