HAHA Lock Privacy Policy
HAHA Lock (hereinafter referred to as "we","us" or "our") knows the importance of personal information to you,
We will do our best to protect the safety and reliability of your personal information. We are committed to maintaining your trust in us,
Adhere to the following principles to protect your personal information: the principle of consistent rights and responsibilities, the principle of clear purpose
Select the principle of consent, the principle of minimum sufficiency, the principle of ensuring security, the principle of subject participation, and the principle of openness and transparency.
At the same time, we promise that we will take appropriate security measures to protect you according to the mature security standards in the industry
's personal information. Please carefully read and understand this Privacy Policy before using our products (or services).
How we collect and use your personal information
Personal information refers to various information recorded electronically or in other ways that can identify the identity of a specific natural person or reflect the activities of a specific natural person, either alone or in combination with other information.
We will only collect and use your personal information for the following purposes described in this policy:
Unique device identification code
In order to continuously optimize applications, we will collect application startup time, exception error log and other data during application operation, including your unique device identification code (IMEI/android ID/DEVICE_ID/IDFA, SIM card IMSI information, OAID) to provide our analysis services, and improve performance and user experience through application startup data and exception error log analysis to provide users with better services
Additional services based on Bluetooth technology
You can use Bluetooth functions after enabling Bluetooth permission, including device control, device status acquisition, device discovery, and device distribution network,
In these functions, we will communicate with the terminal device through Bluetooth. Please know that even if you have agreed to enable the Bluetooth permission,
We will only use Bluetooth for communication in these scenarios: display the device status on the home page and the device panel;
Control the equipment on the home page and the equipment panel; The home page and the add device page are used to discover devices and device distribution networks.
Additional services based on location information
When Android system uses Bluetooth service, you need to turn on the location information service to use it. In fact, we do not collect your location information.
Camera based camera use
This function requires you to agree to "use the camera" and other relevant permissions. This function is used to scan the barcode with MAC address,
After obtaining the address, you will try to connect to the Bluetooth device directly through the address. If you decline the authorization request,
We will not be able to provide you with relevant services.
Additional services based on storage permissions
We apply to you for this permission to ensure the stable operation of the client.
After you enable our permission to read/write your device storage,
We will read or write necessary information about pictures, files, and crash logs from your device's storage space,
It is used to provide you with the function of information publishing or recording crash log information locally.
How do we share, transfer and publicly disclose your personal information
Share
We will not share your personal information with any other company, organization or individual, except for the following circumstances:
-
Sharing with explicit consent: After obtaining your explicit consent, we will share your personal information with other parties.
-
We may share your personal information according to laws and regulations or mandatory requirements of competent government departments.
-
Share with our affiliates: Your personal information may be shared with our affiliates. We will only share necessary personal information and are bound by the purposes stated in this privacy policy. If an associated company wants to change the purpose of processing personal information, it will ask for your authorization again.
-
Share with authorized partners: Some of our services will be provided by authorized partners only for the purpose stated in this privacy policy. We may share some of your personal information with partners to provide better customer service and user experience. For example, companies we employ to provide third-party data statistics and analysis services may need to collect and access personal data for data statistics and analysis. In this case, these companies must comply with our data privacy and security requirements. We will only share your personal information for legal, legitimate, necessary, specific and clear purposes, and only share the personal information necessary for providing services.
For companies, organizations and individuals with whom we share personal information, we will sign strict confidentiality agreements with them, requiring them to handle personal information in accordance with our instructions, this privacy policy and any other relevant confidentiality and security measures.
transfer the possession of
We will not transfer your personal information to any company, organization or individual, except for the following circumstances:
-
Transfer with explicit consent: after obtaining your explicit consent, we will transfer your personal information to other parties;
-
In case of merger, acquisition or bankruptcy liquidation, if personal information transfer is involved, we will require the new company or organization holding your personal information to continue to be bound by this privacy policy, otherwise we will require the company or organization to ask for your authorization consent again.
Public disclosure
We will only publicly disclose your personal information under the following circumstances:
-
With your explicit consent;
-
Law based disclosure: We may publicly disclose your personal information under the mandatory requirements of laws, legal procedures, lawsuits or government authorities.
How we protect your personal information
-
We have used security measures that comply with industry standards to protect your personal information from unauthorized access, public disclosure, use, modification, damage or loss. We will take all reasonable and feasible measures to protect your personal information. For example, when exchanging data (such as credit card information) between your browser and the Service, it is protected by SSL encryption; At the same time, we provide https safe browsing mode for our website; We will use encryption technology to ensure the confidentiality of data; We will use a trusted protection mechanism to prevent data from being attacked maliciously; We will deploy an access control mechanism to ensure that only authorized personnel can access personal information; And we will hold security and privacy protection training courses to enhance employees' awareness of the importance of protecting personal information.
-
We will take all reasonable and feasible measures to ensure that irrelevant personal information is not collected. We will only retain your personal information for the period required to achieve the purposes described in this policy, unless the retention period needs to be extended or permitted by law.
-
The Internet is not an absolutely secure environment, and email, instant messaging, and communication with other users are not encrypted. We strongly recommend that you do not send personal information through such methods. Please use a complex password to help us ensure the security of your account.
-
The Internet environment is not 100% secure. We will try our best to ensure or guarantee the security of any information you send us. If our physical, technical, or management protection facilities are damaged, resulting in unauthorized access, public disclosure, tampering, or destruction of information, resulting in damage to your legitimate rights and interests, we will bear the corresponding legal responsibility.
-
In the event of an unfortunate personal information security incident, we will, in accordance with the requirements of laws and regulations, promptly inform you of the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, suggestions that you can independently prevent and reduce risks, and remedial measures for you. We will inform you of the event in a timely manner by mail, letter, telephone, push notification, etc. If it is difficult to inform the personal information subject one by one, we will take a reasonable and effective way to publish the announcement.
At the same time, we will actively report the disposition of personal information security incidents according to the requirements of the regulatory authorities.
Your rights
In accordance with the relevant laws, regulations and standards of China, as well as the prevailing practices of other countries and regions, we guarantee that you can exercise the following rights on your personal information:
- Access your personal information
You have the right to access your personal information, except for exceptions stipulated by laws and regulations. If you want to exercise the data access right, you can view it through the personal information page in the application.
- Correct your personal information
When you find that our personal information about you is incorrect, you have the right to ask us to make corrections. You can modify it through the application's personal information page.
- Delete your personal information
In the following cases, you can request us to delete your personal information:
- If we handle personal information in violation of laws and regulations;
- If we collect and use your personal information without your consent;
- If our handling of personal information violates the agreement with you;
- If you no longer use our products or services;
- If we no longer provide you with products or services.
You can send a request to delete your personal information when you cancel your account through the application. If we decide to respond to your request for deletion, we will also notify the entities that have obtained your personal information from us and require them to delete it in a timely manner, unless otherwise specified by laws and regulations, or these entities have obtained your independent authorization.
When you delete information from our service, we may not delete the corresponding information in the backup system immediately, but we will delete the information in the backup update.
How to update this privacy policy
We may adjust or change this privacy policy from time to time, and any update of this privacy policy will be published on our website by marking the update time. Unless otherwise required by laws, regulations or regulatory provisions, the adjusted or changed content will take effect 7 days after being notified or published. If you continue to use any of our services or visit our relevant websites after the adjustment or change of the privacy policy, we believe that this represents that you have fully read, understood and accepted the revised privacy policy and are bound by it.
How to contact us
If you have any questions, comments or suggestions about this privacy policy, please contact us through the following ways:
Email: uulock2022@163.com