Privacy Policy

Last Updated: 【June 30, 2022】

Effective Date: 【June 30, 2022】

Shenzhen Changfeng Imaging Equipment Co., Ltd. (hereinafter referred to as "we") is a high-tech enterprise integrating product research and development, production, and sales. We understand the importance of personal information to you. In accordance with legal requirements, we protect your personal information and privacy. We have formulated this privacy policy and specifically remind: We hope you carefully read and understand this privacy policy before using our applications and related services to make appropriate choices. This privacy policy applies to our developed App products such as Saramonic, BOYA Central, etc.

Overview

We will introduce to you through this privacy policy how we handle personal information in different scenarios. When you activate or use our applications to achieve the functions and services you choose, or to comply with legal requirements, we will process relevant information. In addition to the information necessary to achieve basic functions and services and required by laws and regulations, you may refuse us to process other information, but this may result in our inability to provide corresponding functions and services. We will explain each relevant situation in detail in the privacy policy, with important clauses regarding your personal information rights highlighted in bold for your special attention.

In addition to this privacy policy, in specific scenarios, we will also inform you through real-time notifications (including pop-ups, page prompts, etc.) and feature update descriptions of the corresponding information collection purposes, scope, and usage methods. These real-time notifications and feature update descriptions are part of this privacy policy and have equal legal effect as this privacy policy.

Below, we will help you understand in detail how we collect, use, store, transmit, disclose, and protect personal information; and how you can inquire about, correct, supplement, delete, copy, and transfer personal information. Among them, important content regarding your personal information rights is highlighted in bold for your special attention.

1. How We Collect and Use Personal Information

1.1 Information Publication

1.1.1 Audio and video, images and text
When you shoot audio and video or photos, we will request authorization for camera, album, and microphone permissions based on the type of functionality you use. If you refuse authorization, you will not be able to use the shooting function, but it will not affect your use of other functions.

1.1.2 Tools
When you use tools such as audio and video effects, filters, and beauty tools provided in the application to shoot content, we will use sensor information according to your operations and the type of tools used to adapt to your selected tools. Some tools require processing of your personal information:

(1)If you choose to use tools that need to match faces in images for better visual effects when shooting content, we need to identify your facial feature information. During this process, unless otherwise specified and with your separate consent, we will not transmit, store, or provide the above information to third parties. This information will be processed locally on your device (e.g., smartphone). If you refuse authorization, you will not be able to use this feature, but it will not affect your use of other functions.

(2)If you choose to use geolocation when shooting or editing content, we will use your geolocation information with your permission. If you refuse authorization, you will not be able to use this function, but it will not affect your use of other functions.

(3)When we refer to services provided by third-party developers, we will disclose the relevant policies and terms of third parties processing your personal information.

1.2 Other Functions

1.2.1 Message notifications
You understand and agree that we may send one or more types of notifications (e.g., message notifications, security verifications, user experience surveys) to you through the contact information you provide during the use of products and/or services.

1.2.2 Sharing
In sharing scenarios, the software client needs to access your clipboard locally to read links for redirection and sharing functions or services. The client only recognizes the clipboard content locally; otherwise, the client will not upload other information in your clipboard to our server. In addition, we may need to access your phone gallery to facilitate sharing of videos and photos.

1.2.3 Calendar appointments
When you use recording, event reminders, or appointment functions, we will request permission to access your device calendar. After you enable the relevant permissions, we will access your calendar to help you schedule or adjust the time of recorded events and activities, and remind you through calendar functions at the scheduled time. Refusing authorization will prevent you from using appointment services, but will not affect the normal use of other functions.

1.3 Operation and Safe Operation

We are committed to providing you with a safe and trustworthy product and usage environment. Providing high-quality and reliable services and information is our core goal. To maintain the normal and stable operation of related products or services, and to protect your or other users' or the public's safety and legitimate interests, we will collect the following necessary information:

(1)To ensure the safe operation and quality and efficiency of software and services, we will collect data such as your hardware model, operating system version, device identifiers (e.g., Android IDs such as IMEI, AndroidID, OAID, IMSI, ICCID, GAID, MEID; iOS IDs such as IDFV, IDFA; different identifiers have different expiration dates, whether they can be reset by users, and acquisition methods), network device hardware addresses (MAC addresses), hardware serial numbers, IP addresses, WLAN access points (such as SSIDs, BSSIDs), Bluetooth, base stations, software version numbers, network access methods, types, statuses, network quality data, operations, usage, service logs, sensor information, etc.

(2)To prevent malicious programs and ensure operational quality and efficiency, we may collect information such as installed application information or running process information, overall application operation and usage frequency, application crash situations, overall installation and usage situations, performance data, application sources.

(3)We may use your account information, device information, service log information, and information obtained from our affiliates and partners with your authorization or as permitted by law to judge account security, transaction security, perform identity verification, identify illegal activities, detect and prevent security incidents, and take necessary recording, analysis, and disposal measures as required by law.

1.4 Use of Cookies and Similar Technologies

Cookies and device information identifiers and similar technologies are widely used technologies on the Internet. When you use applications and related services, we may use related technologies to send one or more cookies or anonymous identifiers to your device to collect and identify information about your visits and use of this product. We promise not to use cookies for any purposes other than those described in this privacy policy. We use cookies and similar technologies mainly to achieve the following functions or services:

Ensure the security and efficient operation of products and services, including but not limited to data security, network security, and application security.

Provide products and services to you according to your specific needs or preferences.

Conduct product design, improvement, and optimization, including but not limited to fault isolation, failure analysis, and performance optimization of products and services.

Conduct security monitoring and auditing, including but not limited to malicious program detection, vulnerability analysis, and security event response.

Conduct statistical analysis of product and service operation status, including but not limited to statistical analysis of traffic, flow rate, and effectiveness, and provide statistical analysis reports for product and service operators to improve products and services.

Provide targeted advertising based on your behavior information, including but not limited to the identification of user needs and preferences based on the collection and analysis of user behavior information, providing advertisements and content that users are more interested in, improving the effectiveness of advertising and content, and providing advertising analysis reports for advertisers to improve advertising delivery and effectiveness.

Enable the website, applications, or services to remember your preferences, such as language selection, font size, etc., to provide more personalized services.

Through this privacy policy, you have read, understood, and accepted the product and service in terms of collecting, using, and handling your personal information and accepting the related uses of cookies and similar technologies. Please use the data deletion function provided by the system after stopping using the application, or disable the cookies or similar technology functions provided by the system, or contact the business that provides the product and service and the system owner directly to delete the above-mentioned personal information.

1.5 Changes to the Service Content

Please be informed that as our business evolves, we may adjust the products or services provided. If the purposes, methods, or scope of processing personal information change due to such adjustments, we will inform you again and obtain your consent in accordance with relevant legal requirements.

1.6 Exemptions from Consent Requirement for Processing Personal Information in Accordance with Law

Please understand that in the following situations, we may process your personal information without obtaining your authorization in accordance with laws and regulations:

a) Necessary for the conclusion or performance of a contract at your request;

b) Necessary for compliance with legal obligations or duties, such as directly related to national security, national defense, criminal investigation, prosecution, trial, and execution of judgments;

c) Necessary for protecting the life, health, and property safety of natural persons in response to public health emergencies or emergencies;

d) Necessary for the implementation of news reporting and public opinion supervision activities in the public interest, within a reasonable scope;

e) Processing your personal information that you have voluntarily made public or other personal information that has already been legally made public (such as legally published news reports, government information disclosure, etc.) within a reasonable scope;

f) Other circumstances as stipulated by laws and regulations.

2. Data Use by Partners and Transfer/Disclosure of Personal Information

2.1 Partners Involved in Data Usage Process

2.1.1 Basic Principles

During our cooperation with partners, we adhere to the following principles:

a) Legal Principle: Any data processing activities must comply with legal principles.

b) Legitimacy and Minimum Necessity Principle: Data usage must have legitimate purposes and be limited to what is necessary to achieve those purposes.

c) Security and Prudence Principle: We prudently evaluate the purposes for which partners use data, conduct comprehensive assessments of their security capabilities, and require compliance with legal agreements. We rigorously monitor the security of software development kits (SDKs) and application programming interfaces (APIs) used by partners to protect data security.

Directory of Accessible Partner SDKs

2.1.2 Data Processing Delegation

In scenarios involving the delegation of personal information processing, we sign relevant processing agreements with entrusted partners according to legal requirements and supervise their use of personal information.

2.1.3 Joint Processing

In scenarios involving joint processing of personal information, we sign agreements with partners according to legal requirements and stipulate respective rights and obligations to ensure compliance with relevant laws and data security.

2.1.4 Scope of Partners

If specific functions and scenarios involve services provided by our affiliates or third parties, the scope of partners includes our affiliates and third parties.

2.2 Scenarios of Cooperation

2.2.1 Business Functionality

a) Geolocation Services: When you use geolocation-related services, location service providers may use your GPS information and device information through SDKs or related technologies to provide location results. Refusing such usage will only affect the geolocation service functionality but not other functionalities.

b) Message Notifications: To adapt message push functionalities to the terminal models you use (e.g., Huawei, Xiaomi, OPPO, VIVO), terminal device manufacturers may use your phone model, version, and related device information through SDKs or similar technologies.

c) Participation in Activities: When you choose to participate in our marketing activities and with your consent, we and our partners may need to use your name, postal address, contact details, etc.

d) Customer Service: Customer service providers may need to use your account and related information to promptly address your complaints, suggestions, and other requests. If necessary, they may also need to contact you via your phone number or other communication methods.

e) Wallet Functionality: Various services within the wallet functionality are provided by our affiliates and partners. When you use wallet-related functions, our affiliates and partners may collect information necessary for the functionality based on your authorization when opening the corresponding wallet function.

f) Payment Services: Payment functions are provided by third-party payment institutions we cooperate with. These institutions may need to collect your name, ID card number, card type and number, validity period, and mobile phone number. ID card and bank card information are sensitive personal information necessary for payment functions. Refusing to provide them will prevent you from using this function but will not affect other functionalities.

2.2.2 Advertising

We may share de-identified device information or statistical information with advertising service providers, suppliers, and other partners ("advertising partners"). This information is difficult or impossible to associate with your real identity and helps us analyze and measure the effectiveness of advertisements and related services.

a) Advertising Push and Delivery: Advertising partners involved in advertising push/promotion and delivery/analysis services with advertisers may use de-identified or anonymized device, network, channel information, and tag information to achieve effective ad delivery, optimization, and improved ad reach.

b) Advertising Statistical Analysis: Advertising partners providing advertising statistical analysis services may use your device, network, ad clicks, browsing, display, and ad conversion data for analyzing, measuring, and enhancing the effectiveness of advertisements and related services.

c) Use of Information by Advertising Partners: Advertising partners may combine the above information with other data they lawfully obtain to optimize advertising effectiveness. We require them to use information in accordance with legal, legitimate, and necessary principles to protect users' legal rights from infringement.

d) Advertising Contact Information: Contact information such as your phone number or address voluntarily filled out and submitted in advertisements may be collected and used by advertisers or their commissioned partners.

2.2.3 Security and Statistical Analysis

a) Ensuring Security: We prioritize the security of products and services to protect users' legitimate rights and interests from unlawful infringement. Our partners may use necessary device, account, and log information.

b) Analyzing Product Situations: Partners providing analysis services may need to use service situations (crash and flash records), device identification information, overall application installation and usage information, etc., to analyze the stability of application products and services.

c) Academic Research: In compliance with data security and legitimate purposes, we may collaborate with research institutes, universities, and other institutions using de-identified or anonymized data to enhance research capabilities in relevant fields and promote technological development.

2.3 Change of Operating Entity

As our business continues to develop, we may merge, acquire, or transfer assets, potentially resulting in the transfer of your personal information. In such cases, we require the successor to protect your personal information in accordance with legal regulations and security standards no lower than those stated in this privacy policy. If the successor changes the original purposes or methods of processing, we will request your authorization consent again.

2.4 Cessation of Operations

If we cease to operate products or services, we will promptly stop collecting your personal information. We will notify you individually or through announcements about the cessation of operations and delete or anonymize personal information related to discontinued products or services.

2.5 Disclosure

We will not proactively disclose information you have not voluntarily made public unless required by national laws and regulations or with your consent.

2.6 Exemptions from Consent under the Law

According to relevant laws and regulations, we may collect and use your personal information without your consent in the following circumstances:

a) Related to our fulfillment of legal obligations.

b) Directly related to national security and defense.

c) Directly related to public safety, public health, or significant public interests.

d) Directly related to criminal investigation, prosecution, trial, and execution of judgments.

e) Necessary for protecting your or others' vital interests such as life and property but difficult to obtain your consent.

f) Personal information voluntarily disclosed by you to the public.

g) Collection of personal information from legally disclosed information sources, such as lawful news reporting or government information disclosure channels.

h) Necessary for signing and performing contracts at your request.

i) Necessary for ensuring the secure and stable operation of products and/or services, such as discovering and handling product and/or service faults.

j) Other circumstances stipulated by laws and regulations.

3. Managing Your Personal Information

We highly value your ability to manage your personal information and strive to protect your rights to access, copy, correct, supplement, delete, withdraw consent, deactivate your account, and lodge complaints or reports to ensure you have the capability to understand and safeguard your personal information security.

However, please understand that specific business functions and services may require your information to function. If you withdraw your consent or authorization, we cannot continue to provide corresponding functions and services, nor process your personal information accordingly. Your decision to withdraw consent or authorization will not affect the processing of your personal information that we conducted based on your prior authorization.

The pathways for managing methods provided in different versions or operating systems may vary, so please refer to the actual settings.

3.1 Settings Management

3.1.1 Basic Functional Mode

Audio and video recording are basic functions of ours. Therefore, if you only allow us to process personal information necessary to achieve basic functions, you can choose to enable Basic Functional Mode.

In this mode, we will only process your personal information based on the need to provide basic functions and protect system security. You can browse audio, video, and article content but cannot post any content including comments, likes, or favorites. The videos and other information you see will also be randomly pushed from selected content. You can use the search function, and we will provide search results based only on your search keywords without optimizing search results.

3.1.2 System Permission Settings

a) You can enable or disable permissions such as geolocation, address book, camera, microphone, photo album, and calendar in the device's settings, change the scope of authorization, or withdraw your authorization. After withdrawing authorization, we will no longer collect information related to these permissions, but it will not affect the processing of your personal information based on your prior authorization.

b) You can choose whether to receive system notifications sent by applications in the device's settings, or set the form of system notifications you wish to receive. Also, in [Settings] - [Notification Settings], you can choose whether to receive in-app notifications sent by applications, or set the scope of in-app notifications you wish to receive.

4. How We Protect the Security of Personal Information

We place great importance on the security of your personal information and will make efforts to adopt reasonable security measures to protect your personal information, ensuring that our personal information processing activities comply with legal requirements, administrative regulations, or other applicable systems, and prevent unauthorized access, personal information leakage, tampering, or loss.

4.1 Security Technology Measures

We use encryption, de-identification technology, anonymization processing, and other reasonable and feasible means not lower than industry standards to protect your personal information and use security protection mechanisms to prevent malicious attacks on your personal information.

4.2 Management System

We establish dedicated security management systems and data security processes to ensure the security of your personal information. We implement strict data usage and access control systems to ensure that only authorized personnel can access your personal information. We regularly provide security education and training for personnel and conduct security audits of data and technology as needed.

We will formulate and implement emergency response plans for personal information security incidents. In the event of a personal information security incident, we will promptly initiate the emergency response plan to control the impact of such incidents and prevent adverse consequences. If a personal information security incident (leakage, tampering, loss) occurs or may occur, we will inform you promptly of the types of personal information affected, the causes, potential harms, remedial measures we have taken, measures you can take to mitigate risks, and how to contact us, in accordance with legal requirements. We will notify you of the incident-related information through push notifications, emails, letters, SMS, or other forms. If it is difficult to inform you individually, we will announce it in a reasonable and effective manner.

At the same time, we will report the disposal of personal information security incidents to relevant regulatory authorities as required.

4.3 Security Tips

Despite the reasonable and effective measures mentioned above and compliance with the standards required by relevant laws and regulations, please understand that due to technological limitations and various malicious means, in the Internet industry, it is not always possible to guarantee the security of information one hundred percent, we will endeavor to ensure the security of the personal information you provide to us.

You understand and acknowledge that the system and communication networks you use to access our services may encounter problems beyond our control. Therefore, we strongly recommend that you take proactive measures to protect the security of your personal information, including but not limited to using complex passwords, regularly changing passwords, and not disclosing your account passwords and related personal information to others.

5. How We Store Personal Information

5.1 Storage Location

In accordance with legal requirements, we store the personal information collected and generated during operations within the territory of the People's Republic of China. We do not transfer the above information overseas. If we transfer information overseas, we will follow relevant national regulations or obtain your consent.

5.2 Storage Period

a) We will only retain your personal information for the period necessary to provide you with software products or services, such as:

b) If you deactivate your account, proactively delete personal information, or when information exceeds the necessary retention period, we will delete or anonymize your personal information, except in the following cases:

6. How We Protect Minors

6.1 General Terms for Minors

a) If you are a minor under the age of 18, before using related services, you should jointly read and agree to this privacy policy under the supervision and guidance of your parents or other guardians.

b) If you are the guardian of a minor under the age of 14, before using related services, you should read and agree to this privacy policy on behalf of your ward.

c) In accordance with relevant national laws and regulations, we protect the personal information of minors and only collect, use, share, or disclose the personal information of minors when permitted by law, explicitly consented by parents or guardians, or necessary to protect minors. If we discover that we have collected personal information of minors without confirmed consent from parents or guardians, we will attempt to delete such information promptly. We have established strict rules for the collection and use of personal information of minors (under 14 years old) and adolescents (over 14 years old but under 18 years old) to protect their personal information security.

d) If you are a guardian of a minor and have questions about the personal information of the minor you supervise, please contact us through the contact information provided in this privacy policy.

7. Accessing and Revising the Privacy Policy

7.1 Access

a. You can view this privacy policy on the registration and login pages, or after logging into your account, under [Settings] - [Privacy Policy].

b. Please note that to meet operational needs, we may develop different versions based on factors such as your mobile phone model, system version, mobile client, etc. Therefore, the functionality of the software in specific versions may differ from what is described in this privacy policy, but it will not affect the purpose, method, and scope of data processing. The specific available functions are subject to actual usage.

7.2 Updates and Notifications

a. To provide you with better services, software products, and services will be updated and changed from time to time, and we will revise this privacy policy accordingly. Without your explicit consent, we will not reduce the rights you should enjoy under the current effective privacy policy.

b. After updating this privacy policy, we will release the updated version in the application and remind you of the updated content through in-app messages or other appropriate methods so that you can timely understand the latest version of this privacy policy.

c. We may also help you manage your personal information better through feature updates. Please pay attention to relevant feature descriptions.

8. Contact Us

8.1 Complaints and Reports

If you believe that your personal information rights may have been infringed upon or if you discover clues that infringe upon personal information rights, you can contact us through [Settings] - [Feedback and Help] to enter the feedback interface. We will respond to your complaints and reports within fifteen working days after verification.

8.2 Other Issues

If you have questions or suggestions regarding personal information protection issues, you can choose to contact us through the following methods:

We will review your questions or suggestions as soon as possible and respond within fifteen working days after verifying your user identity.