YYLaser Privacy Agreement
2024-10-23
Shenzhen Youyoule Technology Co., Ltd.
This Agreement is the agreement and practice related to the privacy
data of Shenzhen Youyoule Technology Co., Ltd. (hereinafter referred
to as the Company). Our YYLaser APP is well aware of the importance of
personal information (including sensitive personal information) to
you, and will do our best to protect the security of your personal
information.
The purpose of this Privacy Policy is to inform you about the use of
the information provided by the YYLaser App when you use or access the
App. This Privacy Policy covers the processing of personally
identifiable information ("Personal Data") collected when you use or
access the Application. This Privacy Policy is designed to help you
understand what personal data we collect, why we collect it, and what
we do with it. This Privacy Policy should be read carefully before
using this App as it is important. This Privacy Policy can be printed
or downloaded at any time. If you do not agree to the terms of this
Privacy Policy, you should immediately stop using our Services.
Self start and associated start instructions: In order to ensure that this
application can receive client push broadcast information normally when it
is closed or running in the background, this application must use self start
capability to wake up the self start or associated start behavior of this
application through system broadcast at a certain frequency, which is
necessary for implementing functions and services.
I. How We Collect Personal Information
YYLaser uses the following SDKs for this product:
Our product integrates Tencent Bugly's SDK (com.tencent.bugly),
Tencent Bugly is the monitoring of all kinds of abnormal problems of
the APP program, and when an abnormal crash occurs, the crash
information will be collected and uploaded to the developer's Bugly
account, so that the developer can fix the errors in the program and
give users a better experience. However, information about mobile
phone devices will be collected, mainly including hardware model,
device MAC address, unique device identification code (such as
IMEI/MEID/android ID/SN/OPENUDID/GUID, SIM CARD IMSI information
including information describing the basic situation of personal
commonly used devices), device model, device manufacturer, operating
system and its version, etc., for details, please check the official
website of Bugly, official website link: https://buglyqq.com/
In order to better experience the application functions, we need the
user to authorize the user to enable the following permissions:
1、To obtain the system permissions of the phone:
In order to provide high-quality user product experience, we need to
obtain system Bluetooth permissions, camera permissions, storage
permissions, we obtain these permissions to facilitate the user itself
to better open engraving and other services, if you refuse/prohibit
the grant of this permission will cause: unable to use the mobile
phone to connect the device and use the software function, unable to
take photos and unable to engrave local album photos, unable to submit
log positioning errors with error messages, unable to complete the
display and management functions of mobile phone Chinese parts.
2. Permission to obtain mobile phone identification code information:
When using Tencent Bugly's SDKApp, it will collect information about
mobile devices, mainly including hardware model, device MAC address,
unique device identification code (such as IMEI/MEID/android
ID/SN/OPENUDID/GUID, SIM CARD IMSI information and other information
describing the basic information of personal commonly used devices),
device model, device manufacturer, operating system and its version,
etc. It is used to monitor all kinds of abnormal problems of the APP
program, and when an abnormal crash occurs, the crash information will
be collected and uploaded to the developer's Bugly account, so that
the developer can fix the errors of the program, give users a better
experience, and provide you with better services.
3. To identify your device D, prevent malicious programs and cheating,
improve service security, ensure operational quality and efficiency,
we will collect your device information (including IME1, device serial
number, OAID, MEID, Android ID, IMSI, UID, MAC address, SIM card serial
number), installed APP information or running process information.
4. To achieve garbage cleaning and acceleration functions, we will
request your storage permission to obtain external storage information
(SD card data) for checking the CPU, memory, and SD card status of the phone.
5. When you play videos and other content, in order to adapt to the
status of your device, we will call on sensor information such as
gravity and acceleration to identify the horizontal and vertical screen
status of your device.
6. When you share or receive shared information, you need to access your
clipboard locally and read the passwords, sharing codes, links contained
in it to achieve functions or services such as jumping, sharing, and
activity linkage.
II. How We Use Your Personal Information
We will use your personal information in the following circumstances:
1. To provide you with the services you use, and to maintain and
improve these services.
2. It is necessary to remind you that your consent is not required to
use your personal information under the following circumstances:
-
(1) Directly related to national security and national defense
security.
-
(2) Directly related to public safety, public health, or major
public interests.
-
(3) Directly related to criminal investigation, prosecution, trial,
and enforcement of judgments.
-
(4) For the purpose of protecting the life, property, or other major
lawful rights and interests of the Personal Information Subject or
other individuals, but it is difficult to obtain the consent of the
individual.
-
(5) The personal information collected is disclosed to the public by
yourself.
-
(6) Your personal information is collected from legally and publicly
disclosed information, such as legitimate news reports, government
information disclosure, and other channels.
-
(7) Necessary for the conclusion and performance of a contract at
your request.
-
(8) It is necessary to maintain the safe and stable operation of the
products or services provided, such as discovering and disposing of
faults in products or services.
-
(9) When it is necessary to carry out statistical or academic
research in the public interest, and when the results of academic
research or description are provided to the public, the personal
information contained in the results is de-identified.
- (10) Other circumstances stipulated by laws and regulations.
III. How We Use and Process Personal Information Security
(1) We have used security measures that comply with industry standards
to protect the personal information you provide and prevent
unauthorized access, public disclosure, use, modification, damage or
loss of the data. We will take all reasonable and practicable measures
to protect your personal information. For example, the exchange of
data (such as credit card information) between your browser and the
Service is protected by SSL encryption; We use encryption technology
to ensure the confidentiality of data; We use trusted protection
mechanisms to protect your data from malicious attacks; We put in
place access control mechanisms to ensure that only authorized
personnel have access to personal information.
(2) We will take all reasonable and practicable measures to ensure
that irrelevant personal information is not collected. Unless your
written permission is obtained.
(3) The Internet environment is not 100% secure, and we will do our
best to ensure or guarantee the security of any information you send
to us.
IV. How We Share, Transfer, and Publicly Disclose Your Personal
Information
We are fully aware of the legal liabilities that should be borne when
the personal information subject is harmed by illegal sharing, transfer
and public disclosure of personal information, and we will strictly
follow the following terms for all sharing, transfer and public
disclosure of your personal information:
(i) Sharing
Respect for the privacy of our users is a fundamental principle of
ours. We will not share your personal information with any company,
organization or individual except in the following circumstances:
-
1. Sharing with explicit consent: After obtaining your explicit
consent, we will share your personal information with other parties.
-
2. We may share your personal information externally in accordance
with the requirements of judicial or administrative authorities.
-
3. Sharing with our affiliates: Your personal information may be
shared with our affiliates. We will only share personal information
that is necessary and is subject to the purposes stated in this
Privacy Policy. If the affiliate company wants to change the purpose
of processing personal information, it will seek your authorization
and consent again.
-
4. Sharing with authorized partners: For the purpose stated in this
Policy, some of our services will be provided by authorized
partners. We may share some of your personal information with our
partners to provide better customer service and user experience. We
will only share your personal information for legal, legitimate,
necessary, specific and explicit purposes, and will only share the
personal information necessary to provide services, such as sharing
your information with logistics companies when you purchase our
products online. Our partners are not authorized to use the shared
personal information for any other purpose.
We will sign strict confidentiality agreements with companies,
organizations and individuals with whom we share personal information,
requiring them to process personal information in accordance with our
instructions, this Privacy Policy and any other relevant
confidentiality and security measures.
(ii) Assignment
We will not transfer your personal information to any company,
organization or individual, except in the following circumstances:
-
1. Transfer with explicit consent: After obtaining your explicit
consent, we will transfer your personal information to other
parties.
-
2. In the event of a merger, acquisition or bankruptcy liquidation,
if the transfer of personal information is involved, we will require
the new company or organization that holds your personal information
to continue to be bound by this Privacy Policy, otherwise we will
require the company or organization to seek your authorization and
consent again.
(3) Public disclosure
We will only publicly disclose your personal information in the
following circumstances:
- 1. With your explicit consent.
-
2. Disclosure based on law: We may publicly disclose your personal
information under the circumstances of laws, legal procedures,
litigation or mandatory requirements of government authorities.
V. Privacy Policy
Thank you for taking the time to read this Privacy Policy, which is
copyrighted by Shenzhen Youyoule Technology Co., Ltd.
If you have questions about this Privacy Policy and the practices of
this website, please contact us by email.
Contact: 0755-2104 6904
Email: 335188919@qq.com
Business hours:Monday to Friday, 9:00-18:00 (except national holidays of
the People's Republic)
This Agreement entered into force on 2024-07-06 and was updated on
2024-07-06