Privacy Policy
Updated Date: 2024/11/7
Effective Date: 2024/11/7
Introduction
Soulear is a product provided by Shenzhen Sulang Technology Co., Ltd (hereinafter referred to as "we").
When you use our services, we may collect and use your relevant information. We hope to explain to you through this Privacy Policy how we collect, use, store and share this information when using our services, as well as the ways we provide you with to access, update, control and protect this information.
This Privacy Policy is closely related to the Soulear service you use. We hope that you will read it carefully and make the choices you think are appropriate according to the guidance of this Privacy Policy when necessary. We try to express the relevant technical terms involved in this Privacy Policy in a concise and concise manner, and provide links to further explanations for your understanding.
By using or continuing to use our services, you agree that we will collect, use, store and share your relevant information in accordance with this Privacy Policy.
If you have any questions about this Privacy Policy or related matters, please contact us at 921902021@qq.com .
1. Information we collect
When we or our third-party partners provide services, we may collect, store and use the following information about you. If you do not provide relevant information, you may not be able to register as our user or enjoy certain services we provide, or you may not be able to achieve the intended effects of the relevant services.
1.1 Media information: When using our application, we will collect the user's media information; this is the core function of our application. The application is a management software for camera hardware devices. The phone is connected to the device through the WiFi provided by the device. After connecting to the device, the application can control the hardware device to take photos, record videos, and save them to the system album. Media permissions are only obtained when the application is running.
1.2 Collect DHCP information
- We take your privacy very seriously and are committed to protecting your personal information. To ensure that you can use our application smoothly, the following is a detailed description of how we collect and use IP addresses: Device Discovery and Connection: Our application collects the device's IP address in the following situations:
- Cold start (that is, when the application is started for the first time or restarted)
- When the network environment changes (such as the device switches from one network to another)
- When the APP is in silent mode or running in the background (to ensure connection to the device's wifi)
- When the user actively clicks to scan the device (for example, when you manually start the device scanning function)
- The collection of IP addresses is used to ensure that your device can accurately discover and connect to other devices, thereby providing a smoother and more efficient user experience.
- Collection frequency:
- We only collect IP addresses when the application is cold started, the network environment changes, and when the user actively starts the device scan. We do not implement any polling or continuous monitoring mechanism to frequently collect IP addresses.
- Data Usage and Storage:
- The collected IP addresses are only used to ensure effective connection between devices and device discovery. We will not use this data for other purposes.
- We take appropriate technical and organizational measures to protect the security of your data and ensure that your information is not accessed without authorization.
2. Storage of information
2.1 Method and period of information storage
- We will store your information in a secure manner, including local storage (such as using APP to cache data), databases and server logs.
- we will only store your personal information for the time necessary to achieve the purpose of the service or under the conditions stipulated by laws and regulations.
2.2 Notification when a product or service ceases to operate
- When our products or services cease to operate, we will notify you by push notification, announcement, etc., and delete your personal information or anonymize it within a reasonable period of time, unless otherwise provided by laws and regulations.
3. Information Security
We use various security technologies and procedures to prevent the loss, improper use, unauthorized reading or disclosure of information. For example, in some services, we will use encryption technology (such as SSL) to protect the personal information you provide. However, please understand that due to technical limitations and various possible malicious means, in the Internet industry, even if we do our best to strengthen security measures, it is impossible to always guarantee 100% security of information. You need to understand that the system and communication network you use to access our services may have problems due to factors beyond our control.
4. How We Use Information
5. Information Sharing
At present, we do not actively share or transfer your personal information to third parties.
6. Your rights
During your use of our services, we may provide you with corresponding operation settings depending on the specific situation of the product, so that you can query, delete, correct or withdraw your relevant personal information. You can refer to the corresponding specific instructions for operation. In addition, we have set up complaint reporting channels, and your opinions will be handled in a timely manner. If you are unable to exercise your personal information subject rights through the above channels and methods, you can make your request through the contact information provided in this Privacy Policy, and we will respond in accordance with the provisions of laws and regulations.
4. APP permission acquisition instructions
When using our products and services, you need to apply for the following permissions within the necessary scope. Please rest assured that we will not proactively enable these permissions. It is only possible to collect your information through these permissions if you confirm to do so proactively. You can choose whether to authorize us to grant the following permissions:
(1) Camera and Album Permissions: When you use functions such as scanning, profile picture settings, uploading licenses, and screenshot feedback, you need to enable camera or album permissions so that you can take real-time photos or upload pictures or videos. If you do not upload, you will not be able to use the relevant specific functions, but it does not affect your use of other unrelated services.
During the use of this application, we need to apply for your relevant permissions. The above permissions will not be enabled by default and will only be authorized to us with your explicit consent.
We will ask you one by one whether you are allowed to use this permission during the first call, and you can enable the relevant permissions when we ask. You can also refuse to provide the above information. If you do not provide the above information, we will not be able to provide you with relevant services, but it does not affect your use of other functions. In the later stage, you can also manage the relevant permissions on your own in the device system settings.
Third party SDK description:
1. CnJpushAurora Push: Aurora Push provides the app with the ability to push messages and notifications. After integrating the Aurora Push SDK into your app, the Aurora Push SDK will collect personal information necessary for implementing services and push messages and notifications to your end users through encrypted channels. The personal information collected and used by Aurora Push SDK includes: ① device information: used to identify unique users and ensure accurate delivery of message push; Optimizing push channel resources, we will integrate message push channel resources based on the activity of different apps on the device, to improve the message delivery rate for developers; Provide developers with smart tags and services to display business statistics information; ② Network and location information: Optimize the network connection requests between SDK and Aurora servers to ensure service stability and continuity; Implement the function of regional push.
2. ComHuaweiHMS (Huawei; Huawei push) ① Device information:used to identify a unique user and ensure accurate delivery of messages; Optimizing push channel resources, we will integrate message push channel resources based on the activity of different apps on the device, to improve the message delivery rate for developers; Provide developers with smart tags and services to display business statistics information; ② Network and location information: Optimize the network connection requests between SDK and Aurora servers to ensure service stability and continuity; Implement the function of regional push.
3. Tencent Open Platform SDK comTencentTauth, type of personal information collected: device identification information, geographic location information. Purpose of use: To assist users in sharing content with third-party applications. SDK provider name: Shenzhen Tencent Computer Systems Co., Ltd. For details, please refer to the link of the personal information protection policy: https://privacy.qq.com/andhttps://mp.weixin.qq.com/cgi-bin/announce?action=getannouncement&key=1503979103&version=1&lang=zh_CN&platform=2;
Obtain the user's phone number, IMEI, software installation list, and MAC address to push relevant information;
style="font-size:16px;font-family:"color:inherit;">permissions: Service log information, device information (device model, operating system version, unique device identifier (IMEI, MAC, Android ID, IDFA (unique to iOS)), battery, Bluetooth, signal strength information), software information (including installed application list, software version number, browser type), IP addressLocation information (may also be obtained through IP addresses, GPS, WLAN (such as WIFI), or base stations based on the iOS system).
SDK subject: Shenzhen Tencent Computer Systems Co., Ltd
Privacy Policy Link: https://privacy.qq.com/policy/tencent-privacypolicy
4. ComTencentThe types of personal information collected by SMTT (TBS Tencent Browsing Service; Tencent Browsing Service; Tencent X5 Browser; Tencent Browser) include device identification information,Bluetooth, and geographic location information. Purpose of use: To assist users in sharing content with third-party applications. SDK provider name: Shenzhen Tencent Computer Systems Co., Ltd. For details, please refer to the link of the personal information protection policy: https://privacy.qq.com/andhttps://mp.weixin.qq.com/cgi-bin/announce?action=getannouncement&key=1503979103&version=1&lang=zh_CN&platform=2;
Obtain the user's phone number, IMEI, software installation list, and MAC address to push relevant information;
5. Tencent Open Platform SDK comTencentTauth, collected personal information types: IMSI, ANDROID ID, Bluetooth, MAC personal information, clipboard personal information, device identification information, geographic location information. Purpose of use: To assist users in sharing content with third-party applications. SDK provider name: Shenzhen Tencent Computer Systems Co., Ltd. For details, please refer to the link of the personal information protection policy: https://privacy.qq.com/andhttps://mp.weixin.qq.com/cgi-bin/announce?action=getannouncement&key=1503979103&version=1&lang=zh_CN&platform=2
6. Tencent Bugly SDK: In order to provide users with more stable services, this application integrates Tencent Bugly SDK to monitor abnormal software crashes. The relevant device information that Tencent Bugly SDK needs to collect mainly includes: log information (including: Third-party developer custom logs, Logcat logs and APP crash stack information), device brand and model, "get running process information", etc. In order to quickly discover problems that arise during use, and quickly locate and solve problems based on relevant information, so as to facilitate timely optimization of the APP. https://privacy.qq.com/document/preview/fc748b3d96224fdb825ea79e132c1a56
7. Changes
We may revise the terms of this Privacy Policy from time to time. When changes occur, we will notify you of the new Privacy Policy when the version is updated and explain the effective date to you. Please read the changed Privacy Policy carefully. If you continue to use our services, you agree that we will process your personal information in accordance with the updated Privacy Policy.
8. Protection of Minors
We encourage parents or guardians to guide minors under the age of 18 to use our services. We recommend that minors encourage their parents or guardians to read this Privacy Policy and that minors seek the consent and guidance of their parents or guardians before submitting personal information.