Shenzhen FreeYond Technology Co., Ltd. and its global corporate subsidiaries highly respect your personal information and data. will do our best to protect your personal information and data.
(1) why collect you information?
In order to complete product and service functions, investigate and analyze problems to continuously improve service quality; at the same time, efficiently identify scenarios and provide you with scenario-based and personalized services to help you manage your life and work efficiently and conveniently, and bring you a better user experience , we may collect certain information and basic usage data from your device to provide necessary services.
(2) Which information we will collect?
2.1 Device and application information: including operating system version number, application information (including application installation list), device identifier (such as IMEI, ICCID, EMMCID/UFSID, etc.), MAC address, mobile operator, system, device and application data such as language used, system settings, etc.
2.2 Log information: including login logs, network requests, access time, visit times, visit IP, application operation information (including download, installation, switching, update, uninstallation), error crashes and other information generated during your use of the device and services
2.3 Location information: When you request to use location-based services, such as location services, specific geographic location search, navigation, weather query, street view, etc., you need to provide your RTP information (such as country code, region, cell ID, GPS information, latitude and longitude, etc.).
2.4 Cookies and tracking information: Cookies are plain text files sent from a web server to your mobile device browser and stored on your mobile device. Cookies usually contain identifiers, site names, and some numbers and characters. The content of the cookie is only retrieved or read by the server that created it. We use this type of cookie to store the relevant user settings, access and other preference data. We will not use the cookie beyond the scope and will periodically clear it.
2.5 Local information process: in order to ensure the security of information and equipment, and complete the identification of equipment, when you use the face recognition function on the device, you need to complete your face information locally; When you use the fingerprint identification function, you need to complete your fingerprint information locally; At the same time, in order to meet your file storage and review needs, your audio and video, pictures and other file information will be stored locally for you to manage the corresponding types of files on the device.
(3) How will we use your personal information?
3.1 Register and activate the services you need.
3.2 Judge the device‘s condition: judge the compatibility between the device information and the software, send you the notice of operating system or application update and installation, and complete the version update of the system or application.
3.3 identification and diagnosis: troubleshooting device and application error information, identification of activation failure and other problems, and diagnosis and repair.
3.4 Providing data synchronization services to synchronize, share, and store the data which you upload or download ,and perform data needed to upload and download.
3.5 Providing location-based services: It provides you with your selected location service-related features. You can choose to turn off location-based services on your device without submitting your location data.
3.6 Improving user experience: It will improve and optimize your usage experience based on product and functional service offerings.
(4) Security and measures of information and data
To protect the integrity of the network, we have taken industry-standard security safeguards to protect your personal information from unauthorized access, use, modification, and public disclosure of the data. We will take all reasonably feasible measures to protect your personal information, including but not limited to:
a) We will conduct security checks, use encryption tools and software, and other reasonable security measures and procedures;
b) We will adopt encryption technology to ensure the security and confidentiality of information transmission and storage process, and establish a security event response team to timely locate, analyze and deal with problems;
c) We will limit authorized visitors and take hierarchical permission management measures. Only network administrators and those who need information based on business needs can access users' private personal information from within.