麦科沃伦电子技术有限公司 Electronic Technology Co., Ltd. strictly abides by laws and regulations and follows the following privacy protection principles to provide you with safer and more reliable services:
We collect only the information necessary to achieve product functionality based on legal, justified, and necessary principles.
By providing your personally sensitive information, you consent to the processing of your personally sensitive information in accordance with the purposes and methods described in this policy.
When you use our services, we may automatically collect relevant information and store it as service log information.
For example, device model, operating system version, unique device identifier, battery, signal strength, and more.
·Service log information
For example, information you search, view, service failure information, referral URLs, etc. when you use our services.
When you use a location-related service, we may record the location of your device to provide you with relevant services.
When you use the service, we may obtain your geographic location information through IP address, GPS, WiFi or base station;
Information about your location may be included in the information provided by you or other users when using the service;
For example, the account information you provide may include information about your area, and geo-tagging information contained in photos shared by you or others;
·Other related information
To help you make better use of our products or services, we collect relevant information. For example, we collect Bluetooth connection speed information.
We strictly abide by the laws and regulations and the agreement with the users, and use the collected information for the following purposes. If we use your information beyond the following, we will explain it to you again and obtain your consent.
Provide services to you.
Meet your individual needs. For example, language settings, location settings, personalized help services.
Product development and service optimization. For example, when our system fails, we record and analyze the information generated by the system failure to optimize our services.
Management software. For example, perform software certification, software upgrades, and the like.
Invite you to participate in a survey about our services.
In order to provide you with a better experience, to improve our services or for other purposes that you agree to, we may use the information collected through certain services for our other services, subject to relevant laws and regulations. For example, use information about one of our services for another service to show you personalized content or ads, for user research analysis and statistics.
To ensure the security of our services and to help us better understand how our applications are performing, we may record information such as how often you use the application, fault information, overall usage, performance data, and the source of the application. We do not combine the information we store in the analysis software with the personally identifiable information you provide in the application.
We guarantee that the request for permission to the user must be reasonable. You can only request the permissions required to apply an existing key feature or service. Access to user or device data may not be requested for features or uses that are not disclosed, implemented, or not permitted.
The right to request access to data (through progressive authorization) when the user performs the relevant action, letting the user know why we need the relevant permissions or data. Use only the data for the purposes agreed by the user. If we want to use the data for other purposes in the future, we must solicit user input and ensure that the user explicitly agrees to these other uses.
Additional requirements for using specific permissions:
"Call History" permission group: This software works with the watch smart hardware, which has a default SMS, phone or auxiliary handler function.
GPS and location discovery service: This permission is required for Bluetooth scanning and connection.
Network access: The ability of an application to have network access requests.