Microeasy Privacy Policy
Updated: June 7, 2023
Effective time: June 7, 2023
Microeasy (hereinafter referred to as "we", "us" or "our") is well aware of the importance of personal information to you, and we will take corresponding security protection measures in accordance with the requirements of laws and regulations, and try our best to protect your personal information (hereinafter referred to as "personal information" or "information") as safe and controllable. In view of this, we have formulated this Policy (hereinafter referred to as "this Policy" or "this Privacy Policy") to explain to you how we collect and process your personal information and protect your privacy when you use the services provided by the [Microeasy] APP client (hereinafter collectively referred to as the "Software"). We hereby remind you that this Policy only applies to the services provided by this software, and does not apply to the services provided to you by other third parties.
This Policy is closely related to your use of our software or services, and when you download, install, launch, log in and use our software or services, we will process and protect your personal information in accordance with the provisions of this Policy. The terms in this Policy that are (may) materially related to your rights and interests will be emphasized in bold font, so please pay attention to them. Before you decide to register, log in or use the Services, please confirm that you are aware of and fully understand all the contents of this Policy. If you click "Agree and Continue", it is deemed that you have read and agreed to this Policy and voluntarily accept all the contents of this Policy.
1. The personal information collected by the software and the purpose of collecting personal information
We do not collect personal information such as your address, email address, call logs, address book, text messages, and schedules. It also does not collect information that can be used to identify you or others when you use the app, service, or website. Therefore, there is no disclosure of your personal information.
1. When you use this software and its services, we will automatically collect and use the following types of personal information:
(1) Device information
1. The information collected includes:
When you agree to the Agreement and start using our Services on a mobile device, we will collect information related to your device, including hardware model, operating system version number, International Mobile Equipment Identity (IMEI), unique device identifier, network device hardware address, IP address, Device ID (Device ID), device serial number, device MAC address, and software installation list.
2. The purpose of collecting the information is:
(1) By obtaining IMEI, Android ID, device MAC address, IP address, and device serial number, it is used to uniquely identify users, so as to carry out data statistics such as user addition, user retention, user activity, and user behavior conversion analysis, so as to provide analysis services normally.
(2) The statistical analysis service has a basic anti-cheating function, which proposes cheating equipment by obtaining the hardware address and IP address of the user's network equipment, and corrects the user's geographical distribution data to improve the accuracy of the report data.
(3) In order to facilitate you to have an easier access experience, we will conduct feature analysis and user group portraits of user device information, so that we can better understand the differences in user groups of different models and the use of in-app functions, so as to help us conduct in-app behavior statistics, for which we will collect your device identification code, operating system version number, and device hardware model.
(4) In order to facilitate you to use shortcut widgets, folder widgets, custom icon replacement and other functions, you can choose which application of the component style or icon to be replaced to which mobile phone, so you need to collect software installation list information.
3. Scope of information collection:
(1) When you agree to the privacy agreement, we need to uniquely identify the user for statistical purposes, so we will collect your IMEI, Android ID, MAC address, IP address, MAC address, device serial number, hardware model, operating system version number, and network device hardware address.
(2) When you start to perform tasks such as clicking on function entrances, application components, and application icons, we will collect device information for statistical purposes.
(3) When the application enters the background, we need to collect statistics on the uniquely identified user and record the behavior of using the application function; We need to collect statistics on user retention and user activity, so we collect device information including device ID, IMEI, Android ID, MAC address, and IP address.
(4) When you edit the jump path of a widget or custom icon, it will display your software installation list.
(3) Software installation list
If you choose to apply your favorite style theme icon to your device, in order to identify whether your device has installed the corresponding app corresponding to the icon, we will automatically read your software installation list information so that we can set the style theme icon you selected for the installed software.
(1) The information collected includes:
It will obtain your network status information, network permissions, IMEI, application installation permissions, location permissions, MAC address information, read and write permissions, and running process information.
(2) The purpose of collecting the information
(1) Used to identify the user
(2) For advertising-related services such as advertising display, advertising data detection/statistics, etc.
(3) For advertising and monitoring attribution
(4) Personalized advertising recommendations.
(3) Scope of collection of information:
(1) Access network status: Detect whether the current network status is 2G, 3G, 4G or WiFi, so as to determine whether the size of the creative needs to be compressed and optimize the transmission efficiency of the material.
(2) Network access: used to connect to the Internet when advertising is requested.
(3) Disk read/write permissions and application installation permissions: Advertisers evaluate the effect according to the installation situation.
III. How to Share and Transfer Your Information
1. We will not share your information with any company, organization or individual other than us, except for the following:
(1) After obtaining your explicit consent, we will share your information with other parties;
(2) Share your information externally in accordance with laws and regulations, litigation and dispute resolution needs, or according to the requirements of administrative and judicial authorities in accordance with the law;
(3) To the extent permitted by laws and regulations, we share your information with its affiliates or partners in order to provide you with more network services;
(4) It is necessary to provide it because of the protection of the public interest, property or safety;
(5) To handle disputes or controversies between you and others at your request;
(6) It is used in accordance with the laws and regulations of the public interest;
(7) Share your information with third parties in accordance with this Agreement.
2. We will not transfer your information to any company, organization or individual, except for the following:
(1) After obtaining your explicit consent, we will transfer your information to other parties;
(2) the transfer is made in accordance with applicable laws and regulations, the requirements of legal procedures, or mandatory administrative or judicial requirements;
(3) In the event of a merger, acquisition, asset transfer or similar transaction, if information transfer is involved, we will require the new company or organization that holds your information to continue to be bound by this Privacy Policy, otherwise, we will require the company or organization to seek your authorization and consent again.
4. How to protect your information
1. We have taken reasonable and feasible security protection measures that meet industry standards to protect the security of the information you provide and prevent the information from being accessed, publicly disclosed, used, modified, damaged or lost without authorization. We use encryption technology to improve the security of information; We use trusted protection mechanisms to protect information from malicious attacks; We put in place access controls to ensure that only authorized personnel have access to information.
2. We will take all reasonable and feasible measures to ensure that no irrelevant information is collected.
3. Although the above-mentioned reasonable and effective measures have been taken and the standards required by relevant laws and regulations have been complied with, please understand that due to technical limitations and various malicious means that may exist, in the Internet industry, even if we do our best to strengthen security measures, it is impossible to always ensure that the information is 100% secure, and we will try our best to ensure the security of the information you provide to us. You acknowledge and understand that the systems and communication networks you use to access our services may have problems due to factors beyond our control. Therefore, we strongly recommend that you take proactive steps to protect the security of your information.
4. We will formulate an emergency response plan, and immediately activate the emergency plan when a user information security incident occurs, and strive to prevent the impact and consequences of such security incidents from expanding. In the event of a user information security incident (leakage, loss, etc.), we will, in accordance with the requirements of laws and regulations, promptly inform you: the basic situation and possible impact of the security incident, the measures we have taken or will take to deal with it, the suggestions you can independently prevent and reduce risks, and the remedial measures for you. We will inform you of the incident in a timely manner by email, letter, text message, etc.; If it is difficult to notify each of them, we will make an announcement in a reasonable and effective manner. At the same time, we will also report on the handling of user information security incidents at the request of relevant regulatory authorities. You acknowledge that we will be exempted from all liability for any losses suffered as a result of the disclosure of your information that we did not intentionally cause, provided that we have taken the above emergency measures.
5. The storage < of information br/>
1. Duration of storage of information. We undertake to store your information for as long as is legally required or reasonably necessary to realize the functions and services of the Software. If the information exceeds the expiration date, we will delete or anonymize it immediately.
2. Where the information is stored. In accordance with the provisions of laws and regulations, we will store your information collected and generated in the course of domestic operations within the territory of the People's Republic of China.
6. Your rights
1. In accordance with the relevant laws, regulations and standards of China, we guarantee that you exercise the right to read, correct, modify and delete your information, revoke your right to consent to our collection, use and disclosure of your information, cancel your account, and complain about the security of your personal information. However, please understand and agree that when you withdraw certain authorizations, the product functions related to them will become unavailable, and we will not be able to continue to provide you with the specific functions and/or services corresponding to the withdrawal of consent or authorization.
2. Response to your claims. For security reasons, we will not process your request until you have verified your identity when you make the above claims. In general, we will process and respond within [15] days. In the following cases, we will not be able to respond to your request in accordance with the requirements of laws and regulations:
(1) Related to national security and national defense security;
(2) Where it is related to public safety, public health, or major public interests;
(3) In connection with criminal investigation, prosecution, trial and enforcement of judgments;
(4) There is sufficient evidence that the Personal Data Subject has subjective malice or abuses rights;
(5) Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations;
(6) Involving trade secrets.
7. How to deal with the information of minors
1. If you are a minor under the age of 14, it is recommended that you ask your guardian to read this Privacy Policy carefully, and use our services and provide us with information after obtaining the explicit consent of your guardian.
2. For the collection of minors' information with the consent of their guardians to use our products or services, we will only use, share, transfer or disclose this information as permitted by laws and regulations, with the explicit consent of the guardians, or as necessary to protect minors.
3. If your guardian does not agree to your use of our services or provide us with personal information in accordance with this Policy, please terminate your use of our services immediately and notify us in time.
4. If you have any questions about the use of our products/services by the minors under your guardianship or the personal information they provide to us, please contact us in time.
8. Revision
According to the changes in national laws and regulations and our operational needs, we have the right to modify the content of this Privacy Policy from time to time, and the modified content will take effect once it is published on the Software in any form and replace the previous relevant content, and you should pay attention to the changes in the relevant content of the Software from time to time. You acknowledge and confirm that if you do not agree with the updated content, you should immediately stop using the Software; If you continue to use the Software, you will be deemed to have been aware of the changes and agreed to accept them.
9. Scope of application
This Privacy Policy applies to the Software and related services, and does not apply to third-party products or services that have separate privacy policies and are not incorporated into this Privacy Policy.
If you use a product or service provided by a third party, please pay attention to the user agreement and privacy policy of the third party product or service. Your use of these third-party services, including any personal information you provide to these third parties, will be governed by the terms of service and privacy policies of those third parties (not this Privacy Policy). Please protect your personal information appropriately and provide it to third parties only when necessary. The software and related services described in this Privacy Policy may vary depending on the model of the mobile phone you are using, the system version, the version of the software application, and other factors. The final products and services are subject to the software and related services you use on your device.
10. Applicable Law and Jurisdiction
The validity and interpretation of this Agreement shall be governed by the laws of the People's Republic of China. If any provision of this Agreement conflicts with the laws of the People's Republic of China, it shall be reinterpreted in accordance with the relevant laws. The invalidity or reinterpretation of these Terms shall not affect the validity and enforcement of the remaining Terms. You agree to negotiate and resolve disputes arising out of these Terms. If the negotiation fails, you agree to submit the dispute or controversy to the people's court with jurisdiction in the place where the defendant is located.
11. How to contact us
If you have any questions, comments or suggestions about this Privacy Policy or related matters of your personal information, you can send us an email (email: chexia000@outlook.com) and we will give you feedback within 15 days.