MAssistant Privacy Policy
Update time: August 20, 2024
Introduction
Welcome to use our MAssistant products and services! We are fully aware of the importance of personal information to you. Your trust is very important to us. We will strictly comply with laws and regulations to take appropriate security measures and strive to protect your personal information. Based on this, we have formulated this " MAssistant Privacy Policy" (hereinafter referred to as "this Policy"/"this Privacy Policy") to help you fully understand how we collect, use, share, store and protect your personal information and how you can manage your personal information during your use of our products and services , so that you can make better choices.
Before you use our products and services, please be sure to read and understand this policy carefully, especially the terms marked in bold/bold underlined, and make sure you fully understand and agree to them before you start using them. If you have any questions, suggestions or comments about the content of this policy, you can contact us through the contact information provided at the end of this article.
Your agreement to this privacy policy indicates that you have understood the functions provided by the App and the necessary personal information required for the operation of these functions, and have given the corresponding authorization for collection and use. However, it does not mean that you have separately agreed to enable additional functions and process non-essential personal information. We will separately seek your consent for enabling relevant additional functions, processing non-essential personal information, and processing sensitive personal information based on your actual usage.
This policy will help you understand the following:
1. How do we collect and use your personal information?
II. How do we share, transfer, and publicly disclose your personal information?
III. How do we protect your personal information?
IV. Your Rights
V. How do we handle personal information of minors?
VI. How is your personal information stored?
VII. How to update this policy
8. How to contact us
1. How do we collect and use your personal information?
Personal information refers to various information related to an identified or identifiable natural person recorded electronically or otherwise, excluding information that has been anonymized.
We will collect and use your personal information when you use the corresponding product functions for the following purposes described in this policy. If we use the information for other purposes not specified in this policy, or use the information collected for a specific purpose for other purposes, we will seek your consent in advance.
(I) Circumstances in which you authorize us to collect and use your personal information
1. Connect and control your devices
When you use this service , we need to connect your mobile terminal (such as your mobile phone) to your device through the network. To this end, we will collect your device movement, WLAN access point, Bluetooth and base station sensor information, TV installed applications , etc. to help you complete the device connection and display the device name. By connecting your other devices, you can use remote control, screen projection, application installation, application management and other functions .
2. Other functions
If a function or product/service that requires the collection of your personal information is not described in this policy, or we exceed the stated purpose and the scope of direct or reasonable connection with the collection of your personal information, we will inform you again and obtain your consent in accordance with relevant laws and regulations.
We would like to remind you:
a. Because the products and services we provide vary depending on the model and version of the TV, the type and scope of personal information collected and used in the corresponding business scenarios will vary. Please refer to the specific product/service functions.
b. Your use of the product represents your authorization for us to collect and use such personal information to achieve the above functions.
(II) Exceptions with your authorization and consent
In accordance with relevant laws, regulations and national standards, we will collect and use your personal information in the following circumstances without seeking your authorization or consent:
1. Related to national security and national defense security;
2. Related to public safety, public health, and major public interests, such as: necessary to respond to public health emergencies, or to protect the life, health, and property safety of natural persons in an emergency;
3. Related to criminal investigation, prosecution, trial and execution of judgment;
4. To protect the life and property of you or other individuals, but it is difficult to obtain their consent;
5. The personal information collected is disclosed to the public by you or your guardian;
6. Your personal information is collected from legally disclosed information, such as legal news reports and government information disclosure channels;
7. Necessary for the conclusion and performance of a contract to which you are a party;
8. Necessary for maintaining the safe and stable operation of the products and/or services provided, such as discovering and handling product and/or service failures;
9. Carry out news reporting and public opinion supervision for the public interest and process personal information within a reasonable scope;
10. Perform duties or obligations prescribed by laws and regulations or other circumstances prescribed by laws and regulations or reasonably existing .
3. Operating system permission call
We may call upon some of your device permissions. The following are the business functions corresponding to the called permissions and the purpose of our calling permissions.
1. Device permissions: Album permissions
Corresponding business functions: local photo projection, local video projection
Purpose of calling permissions: Used to write and read gallery and other file information through APP
2. Device permissions: storage permissions
Corresponding business functions: photo projection, video projection
Purpose of calling permissions: Used to write and read the gallery and picture display framework through the APP to obtain cache space and other file information
3. Device permissions: location permissions
Corresponding business function: Remote control
Purpose of calling permissions: used to obtain nearby Bluetooth devices to pair Bluetooth connections
II. How do we share, transfer, and publicly disclose your personal information?
1. Sharing
We will not share your personal information with any company, organization or individual other than ourselves , except in the following circumstances:
1. Sharing with explicit consent: We will share your personal information with other parties after obtaining your explicit consent.
share your personal information with external parties in accordance with laws and regulations or the mandatory requirements of government authorities .
3. Sharing with our affiliates: Your personal information may be shared with our affiliates. We will only share necessary personal information and will be subject to the purposes stated in this Privacy Policy. If an affiliate wants to change the purpose of processing personal information, it will ask for your authorization and consent again.
4. To achieve the purposes stated in this policy, some third-party plug-ins (such as software development kits (SDKs), application programming interfaces (APIs)) will be integrated into our products or services to support specific functions of our products or services. To this end, we need to share or transfer specific personal information with the following third parties, and the following third-party SDKs may also collect personal information directly from you through our App. We will conduct technical inspections and behavioral audits of the partners or service providers regularly or irregularly, and require them to comply with the cooperation agreement to maximize their collection and use of data in accordance with laws, regulations and contracts.
(1) SDK name: Umeng
Third-party company name: Umeng Tongxin (Beijing) Technology Co., Ltd.
Purpose of use: Conduct APP operation statistics and analysis
Name of information collected or shared: device Mac address, unique device identifier (IMEI/ AndroidID /IDFA/OAID/OPENUDID/GUID, SIM card IMSI information), system type, application performance monitoring, and application crash information.
Privacy Policy link: https://www.umeng.com/page/policy
(II) Transfer
We will not transfer your personal information to any company, organization or individual, except in the following circumstances:
1. Transfer with explicit consent: We will transfer your personal information to other parties with your explicit consent;
2. In the event of a merger, acquisition or bankruptcy liquidation, if personal information is transferred, we will require the new company or organization that holds your personal information to continue to be bound by this Privacy Policy. Otherwise, we will require the company or organization to re-solicit your authorization and consent.
(III) Public Disclosure
We will only disclose your personal information in the following circumstances:
1. After obtaining your explicit consent;
may disclose your personal information publicly when required by law, legal procedures, litigation or government authorities .
(IV) Exceptions to prior authorization and consent when sharing, transferring, or publicly disclosing personal information
According to relevant laws and regulations, in the following circumstances, the sharing, transfer, and public disclosure of personal information does not require the prior authorization and consent of the subject of personal information:
1. Directly related to national security and national defense security;
2. Necessary for the conclusion or performance of a contract to which the individual is a party;
3. Necessary for the performance of statutory duties or obligations;
4. Directly related to public safety, public health, and major public interests. For example: necessary to respond to public health emergencies, or to protect the life, health, and property safety of natural persons in an emergency;
5. Directly related to criminal investigation, prosecution, trial and execution of judgment;
6. To protect the life, property, or major legal rights and interests of the subject of personal information or other individuals, but it is difficult to obtain the consent of the individual;
7. Process personal information that is disclosed by individuals themselves or has been legally disclosed within a reasonable scope in accordance with the provisions of laws and regulations, such as legal news reports and government information disclosure channels.
8. Necessary for maintaining the safe and stable operation of the products and/or services provided, such as discovering and handling product and/or service failures;
9. Perform duties or obligations prescribed by laws and regulations or other circumstances prescribed by laws and regulations or reasonably existing .
III. How do we protect your personal information?
(I) We have used security measures that meet industry standards to protect the personal information you provide and prevent the data from being accessed, disclosed, used, modified, damaged or lost without authorization. We will take all reasonable and feasible measures to protect your personal information. For example, we will use trusted protection mechanisms to prevent data from being maliciously attacked; we will deploy access control mechanisms to ensure that only authorized personnel can access personal information; and we will hold security and privacy protection training courses to enhance employees' awareness of the importance of protecting personal information.
(II) Except as provided for in this Policy, we will not provide, sell, rent, share or trade your personal information to any unrelated third party, unless we obtain your prior permission, or the third party and we (including our affiliates) provide services to you individually or jointly, and after the service ends, it will be prohibited from accessing all the information it previously had access to.
(III) Except as provided for in this Policy, we do not allow any third party to collect, edit, sell or disseminate your personal information by any means. If any user engages in the above activities, we will immediately terminate the service policy with the user upon discovery.
(IV) Despite the aforementioned security measures, please also note that there are no "perfect security measures" on the information network. If unfortunately our physical, technical or management protection measures are damaged, we will promptly activate the emergency plan to prevent the security incident from expanding, report it to the national competent authority in accordance with the requirements of laws and regulations, and promptly take reasonable and effective means of push and announcement to inform you of the types of information, causes and possible harm caused by the leakage, tampering or loss of personal information that has or may occur; the disposal measures we have taken or will take, your own suggestions for preventing and reducing risks, remedial measures for you; and our contact information. Please note that according to the provisions of laws and regulations, if the measures we take can effectively avoid the harm caused by information leakage, tampering or loss, we can choose not to notify you; however, if the regulatory authorities believe that there may be harm and require us to notify you, we will notify you as required.
IV. Your Rights
In accordance with relevant laws, regulations, standards, and common practices in other countries and regions, we guarantee that you can exercise the following rights over your personal information:
1. Access and Correction of Your Personal Information
1. You have the right to access and correct your personal information, except for exceptions provided by laws and regulations;
2. If you are unable to access the personal information you wish to access, or are unable to correct your personal information, you may contact us using the contact information set forth in Article 8 of this Policy.
(II) Deleting your personal information
You may request us to delete your personal information in the following circumstances:
1. If the purpose for which we process your personal information has been achieved, cannot be achieved, or is no longer necessary to achieve the purpose;
2. If we stop providing products or services, or the shelf life has expired;
3. If we process your personal information based on consent, you withdraw your consent;
4. If our handling of your personal information violates laws, administrative regulations or our agreement with you;
5. If you no longer use our products or services, or you have actively cancelled your account;
6. If we no longer provide products or services to you.
If we decide to respond to your deletion request, we will also notify the entities that obtained your personal information from us and request them to delete it in a timely manner, unless otherwise provided by laws and regulations, or these entities obtain your independent authorization. When you delete information from our services, we may not immediately delete the corresponding information from the backup system, but we will delete the information when the backup is updated. Please understand that according to the provisions of laws and regulations, if the retention period prescribed by laws and administrative regulations has not expired, or if it is technically difficult to delete personal information, we will stop processing except for storage and taking necessary security protection measures.
(III) Change or withdraw your authorization
You can change the scope of consent or withdraw your authorization by adding, deleting information, changing privacy settings, or turning on/off the corresponding functions of your device , and by contacting us through the methods specified in Article 8 of this Policy.
However, please note that each product or service often requires the collection of necessary personal information to be implemented. Please understand that when you withdraw your consent, we will no longer be able to provide you with the corresponding products or services, but it will not affect the personal information processing services previously carried out based on your authorization.
4. Right to obtain interpretation
to explain our personal information processing rules . You can contact us through the contact information provided in Article 8.
5. Constraining information system automatic decision-making
In certain business functions, we may make decisions solely based on non-manual automatic decision-making mechanisms, including information systems and algorithms. If these decisions significantly affect your rights and interests, you can contact us through the contact information provided in Article 8 of this Policy .
(VI) Responding to your above requests
For security reasons, you may need to provide a written request or otherwise prove your identity. We may ask you to verify your identity before processing your request.
Once we have sufficient information to confirm that we can process your request, we will respond to your request within 15 working days. In principle, we do not charge any fees for your reasonable requests, but for repeated requests that exceed reasonable limits, we will charge a certain cost fee depending on the circumstances. We may reject requests that are unreasonably repeated, require too many technical means (for example, the need to develop a new system or fundamentally change existing practices), pose risks to the legitimate rights and interests of others, or are extremely impractical (for example, involving information stored on backup tapes).
We will be unable to respond to your request in the following circumstances :
1. Related to our performance of obligations prescribed by laws and regulations;
2. Directly related to national security and national defense security;
3. Directly related to public safety, public health, and major public interests;
4. Directly related to criminal investigation, prosecution, trial and execution of judgment;
5. We have sufficient evidence to show that the subject of personal information has subjective malice or abuses his rights (for example, your request will endanger public security and the legitimate rights and interests of others, or your request exceeds the scope that can be covered by general technical means and commercial costs);
6. For the purpose of safeguarding the major legitimate rights and interests of the personal information subject or other individuals related to life and property, but it is difficult to obtain the consent of the individual ;
7. Responding to the request of the personal information subject will cause serious damage to the legitimate rights and interests of the personal information subject or other individuals or organizations.
V. How do we handle personal information of minors?
(I) We attach great importance to the protection of personal information of minors. If you are a minor, we require you to ask your parents or other guardians to read this Policy carefully and use our services or provide us with information only with the consent of your parents or other guardians.
(ii) In the case of collecting children’s personal information when using our products or services with the consent of their parents or other guardians, we will only use, share, transfer or disclose this information when permitted by laws and regulations, with the explicit consent of their parents or guardians, or when necessary to protect minors.
(III) If you are a parent or other guardian of a child, please pay attention to whether the child in your custody uses our services with your authorization and consent. If you have any questions about the personal information of the child in your custody, please contact us through the contact information in Article 8.
VI. How is your personal information stored?
(I) We will only retain your personal information for the period necessary to achieve the purposes described in this policy . After the retention period, we will delete or anonymize your personal information, except where national laws, regulations, normative documents or government policies and orders require otherwise or where we need to retain your personal information to fulfill our compliance obligations , such as the law requiring that product and service information and transaction information be retained for no less than three years from the date of completion of the transaction . We mainly refer to the following standards to determine the storage period of personal information and the longer of them shall prevail:
1. Complete the transaction purpose related to you , maintain the corresponding transaction and business records, and respond to your possible inquiries or complaints;
2. Ensure the safety and quality of the services we provide to you;
3. You agree that we may retain your personal information for a longer period of time;
4. Laws and regulations have other special provisions on retention periods.
VII. How to update this policy
(I) Our Privacy Policy may change. However , we will not reduce your rights under this Privacy Policy without your explicit consent . We will post any changes to this Policy on this page. For major changes, we will also provide more prominent notices (such as website announcements, pop-up prompts , etc. ).
(II) Major changes referred to in this Policy include but are not limited to:
1. Our service model undergoes major changes, such as the purpose of processing personal information, the type of personal information processed, and the way personal information is used;
2. We have major changes in our ownership structure and organizational structure, such as changes in business operations, bankruptcy, or mergers and acquisitions;
3. Changes in the main objects of sharing, transfer or public disclosure of personal information;
4. There are major changes in your rights to participate in the processing of personal information and the way in which they are exercised;
5. When our responsible department for handling personal information security, contact information and complaint channels change;
6. When the personal information security impact assessment report indicates that there is a high risk.
8. How to contact us
If you have any questions about this policy or other related matters, you can contact us as follows:
Email: swsam2023666@gmail.com