Privacy Policy

Updated date: March 20, 2023

Effective Date: March 20, 2023

 

Introduction

Welcome to read "Guangzhou Tozed Kangwei Intelligent Technology Co., Ltd.-Privacy Policy". This Privacy Policy was developed and provided by gztozed. We are well aware of the importance of personal information to you, and we will protect your personal information and privacy in accordance with laws and regulations. We formulate this "Privacy Policy" and specially remind: I hope you read and understand this Privacy Policy carefully before using related services, so as to make better choices.

 

Please be sure to read and understand this policy carefully, and use the platform and related services after confirming your full understanding and agreement. Once you start using it, it means that you have fully understood and agreed to this policy.

 

The "Privacy Policy" will explain to you how we collect, use, store and share this information when you use our services. We will treat this information with a high degree of diligence and prudence, and use and disclose your personal information in accordance with the provisions of this Privacy Policy. When you use or continue to use our services, you are deemed to have agreed to the entire content of this Privacy Policy, and you agree to our collection, use, storage and sharing of your information in accordance with this Privacy Policy.

 

Android system access permissions

(1) "android.permission.ACCESS_NETWORK_STATE"

Permission description: View network status

Existence description: APP needs to be connected to the Internet to determine whether it is currently in a network environment

 

(2) "android.permission.ACCESS_WIFI_STATE"

Permission description: View WLAN status

Existence Description: Obtain the current status of WiFi access and information about WLAN hotspots

 

(3) "android.permission.INTERNET"

Permission description: access to the network

Existence description: add a bound device, user update data needs to be updated in the state of the network

 

(4) "android.permission.WRITE_EXTERNAL_STORAGE"

Permission description: modify/delete the content in the SD card

Description of existence: When the App is upgraded. Store log exported files

 

(5) "android.permission.READ_EXTERNAL_STORAGE"

Permission Description: Read the contents of the SD card

Description of existence: When the App is upgraded. Access photo files in the camera roll

 

(6) "android.permission.CHANGE_WIFI_STATE"

Permission Description: Change WiFi connection status

Presence instructions: turn WiFi on or off

 

(7) "android.permission.READ_PHONE_STATE"

Permission Description: Obtain device network information

Existence description: read device identification, used for uni statistics service

 

(8) " android.permission.CHANGE_NETWORK_STATE "

Permission Description: Change network connection status

Description of existence: switch network status

 

(9) "android. permission. CAMERA "

Permission description: Allow access to the camera to take pictures

Existence Description: User avatars are uploaded using the camera function.

 

(10) "android. permission. FLASHLIGHT "

Permission description: Allow access to flash

Presence note: Use flash when taking pictures.

 

(11) " android.permission.MOUNT_UNMOUNT_FILESYSTEMS "

Permission description: mount, unmount external file system

Existence Description: The file that stores the log export.

 

(12) "android. permission. WAKE_LOCK "

Permission Description: Allows the program to run background processes after the phone screen is turned off

Description of existence: The program runs in the background.

 

(13)  "android.permission.WRITE_SETTINGS"

Permission description: Allow reading and writing system settings

Existence Description: Obtain WLAN status.

 

(14)  "android.permission.READ_MEDIA_IMAGES"

Permission Description: Allow access to photo albums

Existence Description: Access photo files in the photo album.

 

IOS system access permission

 

Camera permission: used for avatar photo taking and uploading.

 

Photo permission: used to obtain photo uploads in the album.

 

You can access the system "Settings" at any time to manage the permissions of this application.

 

How we protect the security of personal information

(1) We attach great importance to the security of your personal information, and will strive to take reasonable security measures (including technical and management aspects) to protect your personal information and prevent the personal information you provide from being used improperly or in unauthorized situations. access, public disclosure, use, modification, damage, loss or disclosure.

 

(2) We will use no less than industry standard encryption technology, anonymization processing and related reasonable and feasible means to protect your personal information, and use security protection mechanisms to prevent your personal information from being maliciously attacked.

 

(3) We will establish a dedicated security department, security management system, and data security process to ensure the security of your personal information. We adopt a strict data use and access system to ensure that only authorized personnel can access your personal information, and conduct security audits on data and technology in due course.

 

(4) Although the above-mentioned reasonable and effective measures have been taken and the standards required by relevant laws have been complied with, please understand that due to technical limitations and various malicious means that may exist, in the Internet industry, even if we do our best to strengthen It is impossible to always guarantee 100% security of information, and we will do our best to ensure the security of the personal information you provide to us.

 

(5) We will formulate emergency response plans, and immediately activate emergency plans when user information security incidents occur, and strive to prevent the impact and consequences of these security incidents from expanding. Once a user information security incident (disclosure, loss) occurs, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, and your own protection and advice on risk reduction, remedies for you. We will promptly inform you of the event-related situation through push notifications, emails, letters, text messages and other related forms. When it is difficult to inform you one by one, we will take reasonable and effective ways to issue announcements. At the same time, we will also report the handling of user information security incidents in accordance with the requirements of relevant regulatory authorities.

 

 

protection of minors

We attach great importance to the protection of minors' personal information. According to relevant laws and regulations, if you are a minor under the age of 18, you should obtain the consent of your parent or legal guardian before using this service. If you are the guardian of a minor, please contact us in time when you have any questions about the personal information of the minor under your guardianship.

 

Complaints and reporting channels

If you find any behavior that affects the security of users' personal information or other violations during the use of the software, please give feedback through the following channels. We promise to accept and process within 15 working days after receiving the email feedback.

 

Feedback email: xiangjie@sztozed.com

 

scope of application

This policy applies to all of our services. Certain services have their own specific privacy guidelines/statements that more specifically describe how we process your information within that service. If there is any inconsistency between this policy and the privacy guidelines/statements of specific services, the specific privacy guidelines/statements shall prevail. Please note that this policy does not apply to services provided by other companies or individuals. Your use of these third-party services is governed by their privacy policies (rather than this policy), and you need to read their policies carefully.

 

 

change

We may revise the content of this policy in due course. In this case, if you continue to use our services, you agree to be bound by the revised policy.

(a)  If we decide to change the privacy policy, we will post these changes in this policy, on our website and where we deem appropriate, so that you can understand how we collect and use your personal information, who can access this information, and where We will disclose this information under the circumstances.

 

 

contact us

If you have any questions about this Privacy Policy or our data processing practices, please contact us at: tozedxiangjie@gmail.com

 

(b)  The Company reserves the right to modify this policy at any time, so please check it frequently. If there are major changes to this policy, the company will notify you through a website notification.

 

 

To prevent disclosure of your personal information, such as contact information or postal address, to third parties. Please properly protect your personal information and only provide it to others when necessary. If you find that your personal information is leaked, especially if the user name and password of this application are leaked, please contact the customer service of this application immediately so that this application can take corresponding measures.

 

Guangzhou Tozed Kangwei Intelligent Technology Co., Ltd.