Privacy Policy

Updated Date: 2024/11/7
Effective Date: 2024/11/7

Introduction

Soulear is a product provided by Shenzhen Sulang Technology Co., Ltd (hereinafter referred to as "we"). When you use our services, we may collect and use your relevant information. We hope to explain to you through this Privacy Policy how we collect, use, store and share this information when using our services, as well as the ways we provide you with to access, update, control and protect this information. This Privacy Policy is closely related to the Soulear service you use. We hope that you will read it carefully and make the choices you think are appropriate according to the guidance of this Privacy Policy when necessary. We try to express the relevant technical terms involved in this Privacy Policy in a concise and concise manner, and provide links to further explanations for your understanding.

By using or continuing to use our services, you agree that we will collect, use, store and share your relevant information in accordance with this Privacy Policy.

If you have any questions about this Privacy Policy or related matters, please contact us at 921902021@qq.com .

1. Information we collect

When we or our third-party partners provide services, we may collect, store and use the following information about you. If you do not provide relevant information, you may not be able to register as our user or enjoy certain services we provide, or you may not be able to achieve the intended effects of the relevant services.

1.1 Media information: When using our application, we will collect the user's media information; this is the core function of our application. The application is a management software for camera hardware devices. The phone is connected to the device through the WiFi provided by the device. After connecting to the device, the application can control the hardware device to take photos, record videos, and save them to the system album. Media permissions are only obtained when the application is running.

1.2 Collect DHCP information

2. Storage of information

2.1 Method and period of information storage 2.2 Notification when a product or service ceases to operate

3. Information Security

We use various security technologies and procedures to prevent the loss, improper use, unauthorized reading or disclosure of information. For example, in some services, we will use encryption technology (such as SSL) to protect the personal information you provide. However, please understand that due to technical limitations and various possible malicious means, in the Internet industry, even if we do our best to strengthen security measures, it is impossible to always guarantee 100% security of information. You need to understand that the system and communication network you use to access our services may have problems due to factors beyond our control.

4. How We Use Information

5. Information Sharing

At present, we do not actively share or transfer your personal information to third parties.

6. Your rights

During your use of our services, we may provide you with corresponding operation settings depending on the specific situation of the product, so that you can query, delete, correct or withdraw your relevant personal information. You can refer to the corresponding specific instructions for operation. In addition, we have set up complaint reporting channels, and your opinions will be handled in a timely manner. If you are unable to exercise your personal information subject rights through the above channels and methods, you can make your request through the contact information provided in this Privacy Policy, and we will respond in accordance with the provisions of laws and regulations.

4. APP permission acquisition instructions

When using our products and services, you need to apply for the following permissions within the necessary scope. Please rest assured that we will not proactively enable these permissions. It is only possible to collect your information through these permissions if you confirm to do so proactively. You can choose whether to authorize us to grant the following permissions:
(1) Camera and Album Permissions: When you use functions such as scanning, profile picture settings, uploading licenses, and screenshot feedback, you need to enable camera or album permissions so that you can take real-time photos or upload pictures or videos. If you do not upload, you will not be able to use the relevant specific functions, but it does not affect your use of other unrelated services.
During the use of this application, we need to apply for your relevant permissions. The above permissions will not be enabled by default and will only be authorized to us with your explicit consent.
We will ask you one by one whether you are allowed to use this permission during the first call, and you can enable the relevant permissions when we ask. You can also refuse to provide the above information. If you do not provide the above information, we will not be able to provide you with relevant services, but it does not affect your use of other functions. In the later stage, you can also manage the relevant permissions on your own in the device system settings.
Third party SDK description:
1. CnJpushAurora Push: Aurora Push provides the app with the ability to push messages and notifications. After integrating the Aurora Push SDK into your app, the Aurora Push SDK will collect personal information necessary for implementing services and push messages and notifications to your end users through encrypted channels. The personal information collected and used by Aurora Push SDK
 includes: ① device information: used to identify unique users and ensure accurate delivery of message push; Optimizing push channel resources, we will integrate message push channel resources based on the activity of different apps on the device, to improve the message delivery rate for developers; Provide developers with smart tags and services to display business statistics information; ② Network and location information: Optimize the network connection requests between SDK and Aurora servers to ensure service stability and continuity; Implement the function of regional push.
2. ComHuaweiHMS (Huawei; Huawei push) ① Device information:used to identify a unique user and ensure accurate delivery of messages; Optimizing push channel resources, we will integrate message push channel resources based on the activity of different apps on the device, to improve the message delivery rate for developers; Provide developers with smart tags and services to display business statistics information; ② Network and location information: Optimize the network connection requests between SDK and Aurora servers to ensure service stability and continuity; Implement the function of regional push.
3. Tencent Open Platform SDK comTencentTauth, type of personal information collected: device identification information, geographic location information. Purpose of use: To assist users in sharing content with third-party applications. SDK provider name: Shenzhen Tencent Computer Systems Co., Ltd. For details, please refer to the link of the personal information protection policy: https://privacy.qq.com/andhttps://mp.weixin.qq.com/cgi-bin/announce?action=getannouncement&key=1503979103&version=1&lang=zh_CN&platform=2;
Obtain the user's phone number, IMEI, software installation list, and MAC address to push relevant information;
style="font-size:16px;font-family:"color:inherit;">permissions: Service log information, device information (device model, operating system version, unique device identifier (IMEI, MAC, Android ID, IDFA (unique to iOS)), battery, Bluetooth, signal strength information), software information (including installed application list, software version number, browser type), IP addressLocation information (may also be obtained through IP addresses, GPS, WLAN (such as WIFI), or base stations based on the iOS system).
SDK subject: Shenzhen Tencent Computer Systems Co., Ltd
Privacy Policy Link: https://privacy.qq.com/policy/tencent-privacypolicy
4. ComTencentThe types of personal information collected by SMTT (TBS Tencent Browsing Service; Tencent Browsing Service; Tencent X5 Browser; Tencent Browser) include device identification information,Bluetooth, and geographic location information. Purpose of use: To assist users in sharing content with third-party applications. SDK provider name: Shenzhen Tencent Computer Systems Co., Ltd. For details, please refer to the link of the personal information protection policy: https://privacy.qq.com/andhttps://mp.weixin.qq.com/cgi-bin/announce?action=getannouncement&key=1503979103&version=1&lang=zh_CN&platform=2;
Obtain the user's phone number, IMEI, software installation list, and MAC address to push relevant information;
5. Tencent Open Platform SDK comTencentTauth, collected personal information types: IMSI, ANDROID ID, Bluetooth, MAC personal information, clipboard personal information, device identification information, geographic location information. Purpose of use: To assist users in sharing content with third-party applications. SDK provider name: Shenzhen Tencent Computer Systems Co., Ltd. For details, please refer to the link of the personal information protection policy: https://privacy.qq.com/andhttps://mp.weixin.qq.com/cgi-bin/announce?action=getannouncement&key=1503979103&version=1&lang=zh_CN&platform=2
6. Tencent Bugly SDK: In order to provide users with more stable services, this application integrates Tencent Bugly SDK to monitor abnormal software crashes. The relevant device information that Tencent Bugly SDK needs to collect mainly includes: log information (including: Third-party developer custom logs, Logcat logs and APP crash stack information), device brand and model, "ge
t running process information", etc. In order to quickly discover problems that arise during use, and quickly locate and solve problems based on relevant information, so as to facilitate timely optimization of the APP. https://privacy.qq.com/document/preview/fc748b3d96224fdb825ea79e132c1a56

7. Changes

We may revise the terms of this Privacy Policy from time to time. When changes occur, we will notify you of the new Privacy Policy when the version is updated and explain the effective date to you. Please read the changed Privacy Policy carefully. If you continue to use our services, you agree that we will process your personal information in accordance with the updated Privacy Policy.

8. Protection of Minors

We encourage parents or guardians to guide minors under the age of 18 to use our services. We recommend that minors encourage their parents or guardians to read this Privacy Policy and that minors seek the consent and guidance of their parents or guardians before submitting personal information.