Privacy Policy

Updated:June 18, 2024
Effective date:June 18, 2024

We attach great importance to the protection of users' personal information and privacy, so we have formulated a privacy policy covering how to collect, store, use, share and protect user information and the ways we provide you with access, update, delete and protect such information. We hope to clearly to you how we process your personal information and other data through this Privacy Protection Statement (hereinafter referred to as "Privacy Policy").

 

In addition to this Privacy Policy, in some cases, we may also explain to you the purpose, scope and purpose of the corresponding information through instant notifications (including pop-up windows, page prompts, and red dot prompts) and function update instructions. These instant notifications and function update descriptions form part of this Privacy Policy and have the same effect as this Privacy Policy.

①. The personal information collected by this software and the purpose of collecting the personal information

1. When you use this software and its services, we will automatically collect and use the following types of personal information:

(1) Device information. In order to comply with relevant laws and regulations, prevent users from improper use, identify users' illegal activities, and eliminate security failures, to maintain network, operation and system security, ensure the safe operation of software and services, and ensure your normal use of this software, when you use this software , we may collect certain technical information about your device and the software, including: (i) type, name and version of the operating system; (ii) configuration and settings of the software and services, versions of the software and services; ( iii) IMSI information; (iv) advertising ID (such as IDFA); (v) WLAN connection status; (vi) Apple ID; (vii) network access log information.

(2) Virtual item information. When you use the cash withdrawal function of this software, in order to ensure the operation and development of basic functions, anti-cheat detection will be carried out, and virtual items will be converted into corresponding gifts or cash according to the exchange rules of this software. We will obtain relevant information such as the category and quantity of virtual items (such as gold coins, points, etc.) that you obtain by using this software. You will jump to the corresponding payment platform through the WeChat SDK connected to this software to complete the cash withdrawal. At that time, the WeChat SDK will collect details about your withdrawal amount, withdrawal order number, etc. by itself. We recommend that you carefully read the user agreement and privacy policy of the platform before using the WeChat payment platform to withdraw cash.

(3) Order information. In order to help you fulfill your demand for ordering the paid service of this software and provide you with follow-up after-sales service, we will collect the order information of your paid service for this software, including order items, order time, order status, order amount, payment time, etc. . However, we do not collect specific payment information such as payment bank accounts and passwords, and we are not responsible for the collection and security of such information. Such payment information is processed and stored by third-party payment platforms (such as Apple). Before you use the payment services provided by third-party payment platforms, we recommend that you read and be familiar with the privacy policies of these third-party payment platforms. In order for the third-party payment platform to identify the validity and amount of the order to complete your payment instructions, we will share the order status, order amount, and order time with the third-party company.

(4) Software installation list. If you choose to install your favorite style theme icon to your device, or when you use the custom icon function and choose to share your customized style theme with a third-party app or application style theme, we will automatically read your The software installation list information, but will not be uploaded to the server.

(5) Use records. In order to maintain network, operation, and system security, ensure your normal use of this software, improve our services, and provide you with more personalized services, we will collect information about your interaction with your device, including when and how you use it. Use of the software and services and frequency of use, etc.

2. When you use this software and its services, the personal information you voluntarily submit to us or the permissions you grant to us:

(1) Supporting information. If you contact us by e-mail, we may collect your e-mail address, your problems or suggestions you describe to us, and identify your user ID. However, such information is used only to provide support services to you and will not be linked to any other information collected from you through the Software.

(2) Access the number of exercise steps. In order to display your exercise steps normally in the widget after you add the exercise steps widget on your desktop, we need you to authorize us to access the step information counted by your health app or device system, which is only It is saved locally on the device and will not be uploaded to our server. If you refuse to authorize, the motion step widget will not be able to display your daily steps normally, but it will not affect other functions of the software you use. The step count widget synchronizes HealthKit data regularly, and records steps, calories, and walking distance.

(3) Access to album/photo permission. In order to ensure that you can normally set the wallpaper in the style theme as your mobile wallpaper synchronously, and to ensure that you can use the pictures in your mobile phone album to set as custom icons for third-party apps, we need to access your photo album. If you deny access, the above functions will not work normally.

(4) Access to Bluetooth permissions. In order to display the Bluetooth connection status normally when you apply the style theme corresponding to the control panel, you need to actively authorize us to access your Bluetooth status, otherwise the Bluetooth status will not be displayed normally in the control panel.

(5) Access to microphone permissions. In order for you to use the function of "blowing candles" in the software normally, we need you to authorize us to access your microphone to realize the above functions. If you refuse to authorize, you will not be able to use this function normally, but it will not affect your use of other functions of the software .

(6) Information uploaded/published. When you use the custom icon function and upload/publish custom icons to the software, we will collect the custom icons you upload/publish.

(7) Access location permissions. In order for you to use functional plug-ins such as "weather" normally, we need you to authorize us to access your location permission to obtain the weather conditions in your location. If you refuse to authorize, you will not be able to use this function normally.

(8) Access Apple Music and media library. In order for you to use the "Music Zone" function in the software normally, we need you to authorize us to access Apple Music, your music and video related activities, and your media library, such as obtaining the currently playing songs on Apple Music, in the app and widgets for display. If you refuse to authorize, you will not be able to use this function normally, but it will not affect your use of other functions of the software.

②. Personal information collected by third parties and purpose

This software may insert advertisements that promote products or functions of third-party platforms. We only provide advertising promotion cooperation or access redirection services. You need to carefully read the user agreements of such third-party platforms before using products or functions of third-party platforms. and privacy policy, we will not contact the relevant personal information you left when using these products or functions.

The software may choose to use some of the third-party partners or change the partners in different periods, so the partners in the list may be adjusted. Partners collect relevant information as follows:

Third-party SDK name Method and purpose of collection Types of Personal Information Collected Third-Party SDK Privacy Policy Link
Firebase SDK Location, device information (including device ID, IMEI, software installation list, MAC address), network status https://policies.google.com/privacy
Facebook SDK Ip, Network, Location, Device ID, IMEI, Model https://developers.facebook.com/devpolicy/
Tenjin SDK Tenjin SDK https://www.tenjin.com/privacy

③. How to share and transfer your information

1. We will not share your information with any company, organization or individual other than us, except in the following cases:

(1) After obtaining your explicit consent, we will share your information with other parties;

(2) Share your information externally in accordance with the provisions of laws and regulations, the needs of litigation dispute resolution, or the legal requirements of administrative and judicial authorities;

(3) To the extent permitted by laws and regulations, we share your information with its affiliates or partners in order to provide you with more network services;

(4) It is necessary to provide due to the protection of public interests, property or safety;

(5) Handle your disputes or disputes with others according to your needs;

(6) Use based on social and public interests that comply with the law;

(7) Share your information with third parties in accordance with this agreement.

2. We will not transfer your information to any company, organization or individual, except in the following cases:

(1) After obtaining your explicit consent, we will transfer your information to other parties;

(2) Transfer in accordance with applicable laws and regulations, legal procedures, or mandatory administrative or judicial requirements;

(3) When mergers, acquisitions, asset transfers or similar transactions are involved, if information transfer is involved, we will require the new company or organization that holds your information to continue to be bound by this Privacy Policy, otherwise, we will require the The company or organization seeks your authorization again.

④. How to protect your information

1. We have taken reasonable and feasible security protection measures in line with industry standards to protect the security of the information you provide, and to prevent unauthorized access, public disclosure, use, modification, damage or loss of information. We will use encryption technology to improve the security of information; we will use trusted protection mechanisms to prevent information from being maliciously attacked; we will deploy access control mechanisms to ensure that only authorized personnel can access information.

2. We will take all reasonable and feasible measures to ensure that no irrelevant information is collected.

3. Although the above-mentioned reasonable and effective measures have been taken and the standards required by relevant laws and regulations have been complied with, please understand that due to technical limitations and possible malicious means, in the Internet industry, even if we do our best to strengthen security It is impossible to always guarantee 100% security of information, and we will do our best to ensure the security of the information you provide to us. You know and understand that the system and communication network you use to access our services may have problems due to factors beyond our control. Therefore, we strongly recommend that you take active steps to protect the security of your information.

4. We will formulate an emergency response plan, and immediately activate the emergency plan when a user information security incident occurs, and strive to prevent the impact and consequences of such security incidents from expanding. Once a user information security incident (disclosure, loss, etc.) occurs, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, and you can independently Suggestions for preventing and reducing risks, remedial measures for you, etc. We will promptly inform you of the event-related situation in the form of push notifications, emails, letters, text messages, etc.; when it is difficult to inform one by one, we will take reasonable and effective ways to issue announcements. At the same time, we will also report the handling of user information security incidents in response to the requirements of relevant regulatory authorities. You confirm that if we have taken the above-mentioned emergency measures, we will be exempted from all responsibilities for any losses suffered due to the leakage of your information not intentionally caused by us.

⑤. Storage of information

1. The period of storing information. We promise that the period of storing your information is always within the period required by law or reasonably necessary to realize the functions and services of this software. We will immediately delete or anonymize the information beyond the time limit.

2. The place where the information is stored. In accordance with laws and regulations, we store your information collected and generated during operations on Amazon cloud servers.

⑥. Your rights>

1. In accordance with the relevant laws, regulations, and standards of each country, we guarantee you the right to read, correct, modify, and delete your information, the right to withdraw your consent to our collection, use, and disclosure of your information, the right to cancel your account, and the right to complain Your rights regarding personal information security issues. However, please understand and agree that when you withdraw certain authorizations, the related product functions will be unavailable, and we cannot continue to provide you with the specific functions and/or services corresponding to the withdrawal of consents or authorizations.

2. Response to your claims. In order to ensure safety, when you make the above claim, we need to verify your identity before processing your request. Generally, we will process and reply within [15] days. In the following situations, we will not be able to respond to your request in accordance with the requirements of laws and regulations:

(1) Related to national security and national defense security;
(2) Related to public security, public health, or major public interests;
(3) Related to criminal investigation, prosecution, trial and execution of judgments;
(4) There is sufficient evidence that the personal information subject has subjective malice or abuse of rights;
(5) Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations;
(6) Those involving commercial secrets.

⑦. How to handle the information of minors

1. If you are a minor under the age of 14, it is recommended that you ask your guardian to read this Privacy Policy carefully, and use our services and provide us with information after obtaining the explicit consent of your guardian.
2. For the collection of information of minors with the consent of the guardian to use our products or services, we will only use, share, transfer or disclose such information when laws and regulations permit, the guardian expressly agrees, or when it is necessary to protect the minor. information.
3. If your guardian does not agree with you to use our services or provide us with personal information in accordance with this policy, please stop using our services immediately and notify us in time.
4. If you have any questions about the minors under your guardianship using our products/services or the personal information they provide to us, please contact us in time.

⑧. Revision

According to changes in national laws and regulations and our operational needs, we have the right to modify the content of this privacy policy from time to time. Once the revised content is published on the software in any form, it will take effect and replace the previous relevant content. You should pay attention to this privacy policy from time to time. Changes to software-related content. You understand and confirm that if you do not agree with the updated content, you should stop using the software immediately; if you continue to use the software, you are deemed to be aware of the changed content and agree to accept it.

⑨. Scope of application

This Privacy Policy applies to this software and related services, and does not apply to third-party products or services that have separate privacy policies and are not included in this Privacy Policy.
If you use products or services provided by a third party, please pay attention to the user agreements and privacy policies of the third-party products or services. Your use of these third-party services (including any personal information you provide to these third parties) will be governed by the terms of service and privacy policies of these third parties (not this Privacy Policy). Please properly protect your personal information and only provide it to third parties when necessary. The software and related services described in this Privacy Policy may vary depending on factors such as the mobile phone model, system version, and software application version you use. The final products and services are subject to the software and related services you use on your device.

⑩. Contact us

If you have any questions, comments or suggestions about this Privacy Policy or your information, you can send us an email (email: [email protected]), and we will respond within 15 days.