Release date: July 12, 2022
Effective date: July 12, 2022
Overview of
We attach great importance to the protection of your personal information and will take appropriate security measures to protect your personal information in accordance with laws and regulations. In view of this, the AWEI platform operating entity (referred to as "AWEI" or "we") has formulated this "Personal Information Protection and Privacy Policy"(referred to as "this Policy").
This olicy applies to all products and services provided by AWEI. If our affiliates' products or services use products or services provided by the AWEI platform but do not have an applicable privacy policy, this policy also applies to that privacy policy.
We are well aware of the importance of personal information to you and will do our utmost to protect the security and reliability of your personal information. We are committed to maintaining your trust in us and abide by the following principles to protect your personal information: consistency of rights and responsibilities, clear purpose, choice and consent, minimum necessary, ensuring security, subject participation, and openness and transparency. At the same time, this product promises that we will take corresponding security measures to protect your personal information in accordance with the mature security standards in the industry.
We will collect and use your personal information in accordance with this policy in order to provide you with relevant products or services. If you have any questions, comments or suggestions about the content of this policy, you can contact us through the contact information specified in this policy, and we will respond to you as soon as possible.
Please read and understand this ‘’Privacy Policy‘’carefully before using our products (or services).
This privacy policy will help you understand the following:
· Part 1: Definition
· Part II: Text of the Privacy Agreement
· One,Other business functions
· Two,How do we use cookies and similar technologies
· Three,How do we share, transfer and publicly disclose personal information
· Four.,How do we protect your information
· Five.,Your Rights
· Six.,Information protection for minors
· Seven.,How is your personal information transferred globally?
· Eight.,Applicable Law and Jurisdiction
· Nine.,How to update this policy
· Ten,,application permission description
· Eleven.,How to contact us
· Twelve,,Developer
How we collect and use your personal information
Personal information refers to various information recorded in electronic or other forms that can be used alone or in combination with other information to identify the identity of a specific natural person or reflect the activities of a specific natural person.
This product will only collect and use your personal information for the following purposes described in this policy:
Part 1: Definition
AWEI: refers to AWEI's provision of Internet services to users, namely the AWEI app
AWEI Operation Platform Main Body: Shenzhen Yale Electronics Co., Ltd.
Personal information: refers to various information recorded in electronic or other forms that can be used alone or in combination with other information to identify the identity of a specific natural person or reflect the activities of a specific natural person
Part II: Text of Privacy Agreement
One,Other business functions
Two,How do we use cookies and similar technologies
(I) Cookie
To ensure the normal operation of the website, we will store small data files called cookies on your computer or mobile device. Cookies usually contain identifiers, site names, and some numbers and characters. With the help of cookies, websites can store your preference data. We will not use cookies for any purpose other than the purposes described in this policy. You can manage or delete cookies according to your preferences. For more information, please refer to AboutCookies.org. You can clear all cookies saved on your computer. Most web browsers have a function to prevent cookies, and you can clear all cookies saved on your computer through browser settings options.
(2) Website beacon and pixel tag
In addition to cookies, we also use other similar technologies such as web beacons and pixel tags on our website. For example, the email we send to you may contain a click URL that links to our website content. If you click on the link, we will track the click to help us understand your product or service preferences and improve customer service. Web beacons are usually a transparent image embedded in the website or email. With the help of pixel tags in emails, we can know whether the email is opened. If you do not want your activities to be tracked in this way, you can unsubscribe from our mailing list at any time.
Three,How do we share, transfer, and publicly disclose your personal information
(I) Sharing
We will not share your personal information with any company, organization, or individual other than Shenzhen Yaluo Electronics Co., Ltd., except in the following circumstances:
· 1. Sharing with explicit consent: After obtaining your explicit consent, we will share your personal information with other parties.
· 2. We may share your personal information with others in accordance with laws and regulations, the need to resolve litigation disputes, or mandatory requirements imposed by government authorities or judicial authorities in accordance with the law.
· 3. Within the scope required or permitted by law, it is necessary to provide your personal information to third parties in order to protect the interests, property, or safety of the product and its users or the public from harm.
· 4. Sharing with our affiliates: Your personal information may be shared with affiliates of Shenzhen Yaluo Electronics Co., Ltd. We will only share necessary personal information and be bound by the stated purposes in this privacy policy. If the affiliate wants to change the purpose of processing personal information, it will seek your authorization and consent again.
· 5. Sharing with authorized partners: For the purposes stated in this policy, some of our services will be provided by authorized partners. We may share some of your personal information with our partners to ensure the completion of the services provided to you and to provide you with better customer service and user experience. We will only share your personal information for legitimate, justified, necessary, specific, and clear purposes, and will only share the personal information necessary for providing services. Our partners do not have the right to use the shared personal information for any other purpose.
Currently, our authorized partners include the following three types:
(1) Technical support partners. In order to complete corresponding functions, we will access third-party SDKs for technical support, such as helping us understand product user distribution and data analysis. We may provide the following personal information to such partners. This product may choose to use some of these partners or change partners at different times, so the list of partners may be adjusted.
Name of the third-party SDK | Description of usage scenarios | Types of shared personal information | Privacy Policy |
Youmeng Statistics | Used for user device IMEI registration, start, and open records | Unique device identification code IMEI, IP address, (MAC) address |
(2) Transfer
We will not transfer your personal information to any company, organization, or individual, except in the following circumstances:
· 1. Transfer with explicit consent: After obtaining your explicit consent, we will transfer your personal information to other parties.
· 2. In case of mergers, acquisitions, or bankruptcy liquidation: If personal information is involved in mergers, acquisitions, or bankruptcy liquidation, we will require the new company or organization that holds your personal information to continue to be bound by this privacy policy. Otherwise, we will require the company or organization to seek your authorization and consent again.
(3) Public disclosure
We will only publicly disclose your personal information in the following circumstances:
· 1. With your explicit consent;
· 2. Based on laws: We may disclose your personal information in accordance with laws, legal proceedings, litigation, or mandatory requirements imposed by government authorities or judicial authorities in accordance with the law.
(5) Exception
According to relevant laws and regulations, in the following circumstances, we may collect, share, transfer, or publicly disclose your personal information without obtaining your authorization consent:
· 1. Directly related to national security, national defense security and other national interests;
· 2. Directly related to public safety, public health, public knowledge and other major public interests;
· 3. Directly related to criminal investigation, prosecution, trial and judgment execution;
· 4. To safeguard your or other individuals' vital interests such as life, property, reputation and other important legitimate rights and interests but it is difficult to obtain your consent;
· 5. To sign and perform contracts as required;
· 6. To maintain the safe and stable operation of the products or services provided and necessary for maintenance, such as detecting and disposing of product or service failures;
· 7. For public interest statistical or academic research and necessary to provide academic research or descriptive results, as long as the personal information contained in the results is de-identified;
· 8. Collected from legally disclosed information, such as legal news reports, government information disclosure and other channels;
· 9. Other circumstances stipulated by laws and regulations.
Four,How do we protect your personal information?
(1)We have used security protection measures that meet industry standards to protect the personal information you provide, preventing unauthorized access, disclosure, use, modification, damage, or loss of data. We will take all reasonable and feasible measures to protect your personal information. For example, SSL encryption is used to protect the exchange of data (such as credit card information) between your browser and the "service"; we provide HTTPS secure access to the supporting web services provided by the product; we use trusted protection mechanisms to prevent data from being malicious attacked; we deploy access control mechanisms to ensure that only authorized personnel can access personal information; and we hold security and privacy protection training courses to enhance employees' awareness of the importance of protecting personal information.
(2)We will take all reasonable and feasible measures to ensure that no irrelevant personal information is collected. We promise to store your personal information for a reasonable and necessary period of time required by law or to achieve product functions and services. For personal information that exceeds the deadline, we will immediately delete or anonymize it.
(3)The Internet is not an absolutely secure environment, and email, instant messaging, and other communication methods with other users of this product are not encrypted. We strongly recommend that you do not send personal information through such methods. Please use complex passwords to help us ensure the security of your account.
(4)The Internet environment is not 100% secure, and we will do our best to ensure or guarantee the security of any information you send to us.
(5) After the occurrence of a personal information security incident, we will promptly inform you of the basic situation and possible impact of the security incident, the measures we have taken or will take, suggestions for you to prevent and reduce risks, and remedies for you in accordance with the requirements of laws and regulations. We will promptly inform you of the relevant situation of the incident by email, telephone, push notification, etc. When it is difficult to inform the personal information subject one by one, we will take reasonable and effective measures to issue an announcement. At the same time, we will also proactively report the handling of personal information security incidents in accordance with the requirements of the regulatory authorities.
Five,Your Rights
In accordance with relevant Chinese laws, regulations, standards, and common practices in other countries and regions, we guarantee that you can exercise the following rights with respect to your personal information:
(I) Access to your personal information
If you wish to access or correct personal information in your account, you can do so by visiting My Account - Account Information.
(2) Deleting your personal information
· (1) If our handling of personal information violates laws and regulations;
· (2) If we collect and use your personal information without your consent;
· (3) If our handling of personal information violates our agreement with you;
· (4) If you no longer use our products or services, or you have cancelled your account;
The way to cancel the account is: My - Profile - Cancel the account
· (5) If we no longer provide you with products or services.
(3) Withdraw your authorization
If you wish to revoke your authorization, you can contact us through the contact information in this policy. We will process your request within a reasonable time after receiving your email or registered letter.
However, please understand and agree that when you withdraw certain authorizations, the related product features will become unavailable, and we will not be able to continue to provide you with the specific features and/or services corresponding to the withdrawal of consent or authorization. And your decision to withdraw authorization will not affect the personal information processing that was previously carried out based on your authorization.
(4) Responding to your above-mentioned requests
· (1) Directly related to national security and defense security;
· (2) Directly related to public safety, public health, and major public interests;
· (3) Directly related to criminal investigation, prosecution, trial, and execution of judgment;
· (4) There is sufficient evidence to indicate that you have subjective malice or abuse of power;
· (5) Responding to your request will cause serious harm to the legitimate rights and interests of you or other individuals or organizations;
· (6) Those involving trade secrets.
Six, How do we handle the personal information of minors
(1)Our products, websites, and services are primarily aimed at adults. Minors are not allowed to create their own user accounts without the consent of their parents or guardians. If you are a minor under the age of 14, please be sure to read this policy with your guardian before using our products and/or services, and ensure that you have obtained your guardian's explicit consent before using our services and providing us with your personal information.
(2)For the collection of personal information of minors with the consent of their parents, we will only use or disclose this information when legally permitted, with the explicit consent of the parents or guardians, or when necessary to protect the minors.
(3)If your guardian does not agree with your use of our services or the provision of personal information to us in accordance with this policy, please immediately terminate your use of our services and notify us promptly.
Seven, How is your personal information transferred globally?
We will store personal information collected within the territory of the People's Republic of China in accordance with laws and regulations. At the same time, as we provide products or services through resources and servers located around the world, this means that your personal information may be transferred to overseas jurisdictions in the country/region where you use the product or service, or subject to access from these jurisdictions, after obtaining your authorization and consent.
Such jurisdictions may have different data protection laws or even no relevant laws. In such cases, we will ensure that your personal information is adequately protected within the People's Republic of China. For example, we will request your consent for cross-border transfer of personal information, or implement security measures such as data de-identification before cross-border data transfer.
Eight,Applicable Law and Jurisdiction
This privacy policy applies to the laws of the mainland of the People's Republic of China. Disputes under this privacy policy are subject to the jurisdiction of the court where the defendant resides.
Nine,How to update this policy
(1)Our privacy policy may be changed or revised. Without your explicit consent, we will not reduce your rights under this privacy policy.We will post any changes to this policy on this page. For major changes, we will notify you via email, phone, and push notification.
(2)Major changes referred to in this policy include but are not limited to:
· 1. Our purpose for processing personal information, the types of personal information processed, and the ways in which personal information is used;
· 2. There are significant changes in your rights and methods of exercising your rights in the processing of personal information;
· 3. When the personal information security impact product report indicates a risk.
Ten,Application Permission Description
When you are taking or editing pictures and shooting videos, in order to provide you with corresponding services, we may need you to open the following terminal system permissions:
· (1) Camera permission, for taking photos;
· (2) Album (iOS)/storage (Android) permissions, used to read and store photos and videos;
· (3) Storage: used to access pictures, videos, audio, data files, and other content on your device, allowing you to use device storage space and providing file download, data storage, and other services;
· (4) Read device status (obtain device IMSI and IMEI numbers): This is convenient for creating uniquely identified users based on the IMEI number when users are testing features, and serves as the user's ID. This facilitates quick login for users;
· (5) You can manage all permissions in the Settings-Application Management or Application Permissions settings system, allowing and canceling permissions independently.
· (6)The APP will frequently self-start and associated start, this function is used to keep the watch Bluetooth connected to the app after the app exits, and receive information in real time after you allow it.
· (7) The SDK used by the APP is as follows:
Wechat SDK (wechat login).
Amap SDK(Retrieving the device will be displayed on Amap).
If you refuse to enable any of the above permissions, you will only be unable to access the corresponding functions, but you can continue to use other functions of this product.
· (8) Obtain location permission item: In order for the Bluetooth of the mobile phone system to accurately search for nearby devices.
Eleven,How to contact us
If you have any questions, comments, suggestions or complaints about this policy or the content of the service, you can contact us through the following ways: Please contact customer service:
yale@awei.hk
Twelve,Developer
Shenzhen Yaluo Electronics Co., Ltd.