Last updated: March 28, 2022

Release Date: April 29, 2022

Shenzhen Huaxinzhi Technology Co., Ltd. (Hereinafter referred to as the "Company") attaches great importance to the protection of users' personal information and privacy.That's why we have a privacy policy that covers how we collect, store, use, share, and protect user information, and how we provide you, the user ( "User" or "You"), with access to, updates to, deletes from, and protects that information.We hope that the H wear Privacy Policy (hereinafter referred to as the "Privacy Policy") will clearly explain to you how we treat your personal information and other information.

This Privacy Policy has been developed with your needs in mind, and it is important that you fully understand our personal information collection and use practices, while ensuring that you ultimately control the personal information provided to us.

We will collect and use your information in accordance with the Privacy Policy, but we will not collect personal information in a mandatory bundle just because you agree to this Privacy Policy.

When you use or open relevant functions or use services, we will collect and use relevant information in order to realize the functions and services. You may refuse to provide, without affecting other functions or services, information other than that which is necessary to fulfill basic business functions or is required by law or regulation.We will itemize what information is necessary in our privacy policy.

If you do not log in to your account, we will guarantee the basic function of information push through the identifier information corresponding to the device. If you log in to the account, we will push the information according to the account information.

We collect and use your sensitive personal information when you use certain functions or services as necessary to achieve business functions or as required by laws and regulations. We strictly protect sensitive personal information, and will inform business scenarios involving the handling of sensitive personal information through privacy policies, agreements, and even notifications (such as in-station letters).It is used to remind you that you need to pay special attention to the safety of the use of such information. Please be aware that once the sensitive personal information is leaked or illegally used, it may cause damage to your personal, property safety, personal privacy, etc. Please provide it under the condition of ensuring safety, and we will do our best to ensure the security of your sensitive personal information.

We will explain the types of personal information we collect and their corresponding uses one by one, so that you can understand the types, uses and collection methods of the specific personal information we collect for a specific function.

The list of personal information collected by H wear is as follows:

Precise geolocation, camera (camera), photo album (storage), calendar, microphone permissions are not enabled by default and are only used for specific functions or services with your express authorization, which you can also revoke. In particular, even if you authorize us to obtain these sensitive permissions,Nor does it collect your information when it is not needed for the relevant feature or service.

1. For security For the purpose of function realization and safe and stable operation of H wear products, we may apply for the relevant permission to use the operating system.

2. To protect your right to know ? We will display the relevant operating system permissions that the product may apply for and use through the following list. You can manage the relevant permissions according to your actual needs.

3. According to the upgrade of product ? The type and purpose of the application and access rights may change. We will adjust the list according to these changes in time to ensure that you are informed of the application and use of the rights in a timely manner.

4. Please be informed ? We may also use third party SDKs for our business and product functionality and security needs. These third parties may also apply for or use operating system permissions.

5. In the process of using the product You may use H5 pages or applets developed by third parties, and the plug-ins or applets developed by these third parties may also apply for or use the relevant operating system permissions as necessary for business functions.

The application and use of H wear application permission are described as follows:

1. Access location permissions -Precise positioning and android. Permission. ACCESS _ FINE _ LOCATION. Permission description: Obtain precise geographic location information through Global Positioning System (GPS) or network location information (such as base station and WLAN) after obtaining your authorization

Application scenario/usage scenario: used to implement location-based services

2. Access location permissions -Rough positioning of android. Permission. ACCESS _ COARSE _ LOCATION. Permission description: Obtain approximate geographic location information via Global Positioning System (GPS) or network location information (such as base stations and WLANs) after obtaining your authorization

Application scenario/usage scenario: used to implement location-based services

3. Read Phone Status Permission android.permission.READ_PHONE_STATE Permission description: After obtaining your authorization, read the phone status and identification code (phone permission, device permission). Please rest assured that this permission cannot monitor or obtain any of your call content and information.

Application scenario/usage scenario: It is used to start the application of main functions such as account login and security guarantee by identifying the device ID

4. Read The contents of the SD card (read storage/photo permissions) are android. Permission. READ _ EXTERNAL _ STORAGE. Permission description: After obtaining your authorization, it provides the function of reading the data in the storage space of the phone.

Application scenario/usage scenario: APP is allowed to read pictures, files and other contents in the storage to help you upload your avatar.

5. Write /Delete the contents of the SD card (Write/Delete/Storage/Photo Permissions) android. Permission. WRITE _ EXTERNAL _ STORAGE. Permission description: After obtaining your authorization, provide the function of writing to external storage.

Application scenario/usage scenario: APP is allowed to write/download/store/modify/delete pictures, files and other contents to help you modify your avatar.

6. Take photos and videos android.permission.CAMERA Permission description: After obtaining your authorization, use to take photos

Application scenario/usage scenario: used to help you set and modify your avatar

7. Get known account android.permission.GET_ACCOUNTS Permission description: obtain the account created by the application installed on the device by obtaining the permission to obtain the application account list from the account service in the address book permission group. Please rest assured that this permission only obtains the information related to the application, and cannot obtain personal sensitive information such as your account password.

Application Scenario/Usage Scenario: used to help your app add an associated account

The following sections will help you learn more about how we collect, use, store, transfer (if applicable), and protect your personal information; and help you understand . Ways to copy, delete, correct and withdraw authorized personal information. This policy is closely related to your use of our services, and we recommend that you carefully read and understand all the contents of this policy and make the choices you deem appropriate.

1. How we collect and use personal information

2. How we use cookies and similar technologies

3. How do we share, transfer and publicly disclose your personal information?

4. How we protect your personal information

5. Your rights

6. How we handle children's personal information

7. How is your personal information transferred globally?

8. How to update this policy

9. How to contact us

We are well aware of the importance of personal information to you, and we will abide by the following principles to protect your personal information: the principle of consistency of rights and responsibilities, the principle of clear purpose, the principle of choice and consent, the principles of minimum adequacy, the principles of ensuring security, the principal principle of participation, and the principles of openness and transparency. H wear promises that we will follow the established safety standards of the industry.Take appropriate security measures to protect your personal information.

I. How we collect and use personal information

We collect information that you actively provide when you use the Services, and that we collect through automated means when you use the features or receive the Services, as follows:

1. Register and log in

(1)When you register and log in to H wear and related services, you can create an account through your mobile phone number, you need to provide your mobile phone number + verification code, and you can complete the relevant identification information (head portrait, nickname, gender, height, weight, date of birth), which is collected to help you complete the registration.It will be used to calculate and display heart rate, steps, calories burned, sleep time and so on in smart wearable devices and application pages for you, so that you can better understand your exercise status. This information will be displayed on the Smart Wearables and Apps page, which you can view at any time.

(2)You can use a third-party account to log in to H wear. At this time, you will authorize us to obtain your public information registered on the third-party platform (third-party account openid, avatar, nickname and other information authorized by you), which is used to bind with the H wear account, so that you can directly log in and use the product and related services through the third-party account.

(3)When you set and change your avatar, we will ask you to authorize the camera and album permissions. If you refuse to authorize to provide camera permissions, you will not be able to set and change your avatar by taking photos; if you refuse to authorize to provide album permissions You will not be able to set or change your avatar by uploading an album picture.However, none of the above will affect your normal use of other functions of H wear.

2.Binding of smart wearable devices

(1)In order to support the binding of your smart wearable devices and applications, We will collect your account information, identification information of smart wearable devices, identification information of mobile devices (including IMei number, imsi, Mac address, meid, AndroidID, device hardware serial number, SIM card identification), mobile phone model, system version number and Bluetooth information of smart wearable devices.

(2)When you bind the device by scanning the QR code, we will ask you to authorize the camera and album permissions. If you refuse to authorize to provide the camera permission, you will not be able to bind by scanning the QR code through the camera; if you refuse to authorize to provide the album permission It will not be possible to bind smart wearable devices by scanning QR codes through photo albums.

3.Record and display of sports health information

During your use of our smart wearable devices, we may collect and record information related to your exercise activities, including your number of steps, standing activities and duration, exercise patterns, stride frequency and heart rate. In addition, we may collect personal information about you, including your nickname, gender, date of birth, height and weight.This information will be used to calculate and display your heart rate, steps, calories burned, sleep time, etc. Within the smart wearable device and app pages to give you a better understanding of your exercise status.

This information will be displayed on the Smart Wearables and Apps page, which you can view at any time.

4.Set up a health plan

You can use the health plan in the application. According to the health plan you set, this function can remind you to exercise, drink water, sit for a long time and so on.

In order to do this, we need to collect information about the health plan you set up.

5.Message notification function

If you turn on the notification push function, we may obtain your app list information to provide you with the message push service of other apps on the wearable device. Please be assured that we will not read your notification messages. Your notification messages will only be used to display on wearable devices. We will not save your notification messages.

You can turn off the relevant notification push in the [Permission Management] interface in the [Settings] interface.

In order to ensure the device connection experience and data synchronization stability, when you connect the wearable device, after the phone is turned off and restarted, in order to ensure the connection status between the wearable device and the application, the application needs to connect the device by self-starting. If you turn off the application to start automatically, after you turn off the phone and restart it, if you do not open the APP again,You will not be able to use related functions such as message notification and call reminder. In addition, when you use a wearable device to initiate outdoor sports, you need to connect the wearable device to the application to obtain the positioning information of the application and ensure the availability of data synchronization under outdoor functions.

6.Operations and safety

We are committed to providing you with safe and credible products and use environment, and providing high-quality, efficient and reliable services and information is our core goal. In order to maintain the normal operation of our services and protect the legitimate interests of you or other users or the public from loss, we will collect the necessary information to maintain the safe and stable operation of products and services.

You are fully aware that we do not require your consent to collect and use personal information in the following circumstances:

(1) related to national security and national defense security;

(2) those related to public security, public health and major public interests;

(3) those related to criminal investigation, prosecution, trial and execution of judgments, etc.

(4) In order to safeguard the life, property and other important legitimate rights and interests of the subject of personal information or other individuals, it is difficult to obtain their consent.

(5) The personal information collected is disclosed to the public by the subject of personal information.

(6) Your personal information collected from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels

(7) Necessary for signing the contract according to your requirements

(8) Necessary for maintaining the safe and stable operation of the products and/or services provided, such as detecting and dealing with the faults of the products and/or services.

(9) Necessary for legitimate news reporting.

(10) When it is necessary for academic research institutions to carry out statistical or academic research based on public interests and provide the results of academic research or description to the outside world, the personal information contained in the results shall be de-identified.

7.H wearAPP permission calling description

The following device permissions may be triggered when you use the H wearAPP. In order to enable you to better manage your information, we will synchronously inform you of the purpose of using the permission when applying for the permission in the process of using the product, and if you do not open the permission, it may affect your use of the service. Please check it carefully. Before using specific functions, you can choose whether to authorize the following permissions.At the same time, you can change the authorization at any time through the device permission setting page.

The following are the details of the relevant functions and call permissions:

(1) Permission to allow reading and writing of external storage space: used to read the pictures on the phone when the user sets the dial picture; when the user shares the picture It is used to save the picture in the user's mobile phone, and it is also used to read the picture on the mobile phone when modifying the user's head portrait.

(2) Allow to obtain location permission: When the user opens the outdoor sports function, it can help the user to record the motion trajectory.

(3) Permission to read and write the calendar: used to synchronize the small habits added by the user in the H wearAPP to the system calendar.

(4) Permission to read the address book and call record: used to synchronize the incoming call number and contact name to the wearable device for display when the user uses the "Display Contacts" information function.

(5) Permission to make and connect calls: used to control the mobile phone to make calls from the wearable device when the user uses the "call reminder" function.

(6) Allow access to the camera: for the user to scan the QR code device and modify the APP avatar

(7) Permission to allow access to Bluetooth status: It is used to scan the Bluetooth device and connect the smart wearable device normally when the user binds the slave wearable device.

(8) Permission to access the network: enable the application to be connected to the network normally

(9) Permission to allow access to WiFi status: enable the application to obtain the current WiFi connection status

(10) Permission to allow access to network status: enable the application to obtain the current network connection status.

(11) Allow writing system setting permission: This application can provide the function of modifying the screen time, which can better record the motion trajectory.

(12) Permission to allow other applications to be installed: enable the application to be upgraded, downloaded and installed.

(13) Allow the program to still run after the background process, so that the application can provide the message push function.

8.Change of purpose of collecting and using personal information

Please understand that with the development of our business, the functions and services provided by H wearAPP may be adjusted and changed. In principle, when a new function or service is related to a function or service that we currently offer, the personal information collected and used will have only or reasonable relevance to the purpose for which it was processed. In a scenario that is not directly or reasonably related to the original processing purpose,When we collect and use your personal information, we will inform you again and obtain your consent.

We may also collect other information that cannot be identified to a specific individual (i.e., information that is not personal information), such as statistical data generated by your use of a particular service, such as daily events. This information is collected to improve the services we provide to you. The type and amount of information collected depends on how you use our products and/or services.

In particular, you are reminded that: if the information cannot identify your personal identity alone or in combination with other information, it does not belong to your personal information in the legal sense; when your information can identify your personal identity alone or in combination with other information, or when we use the data that cannot be linked to any specific personal information with other personal information of you. ,This information will be treated and protected as your personal information in accordance with this Privacy Policy during the combined use. According to the law, sharing and transferring personal information that has been de-identified and ensuring that the data recipient cannot recover and re-identify the subject of personal information does not belong to the act of sharing, transferring and publicly disclosing personal information to the outside world.Such data will be processed without further notice to you and without your consent.

2、How we use cookies and similar technologies

What information is collected and how is it used?

H wear and third party service providers and business partners use technologies such as cookies, tags and scripts. These techniques are used to analyze trends, track your activity, and gather statistical information about the entire user community. We will receive individual or aggregate analysis reports collected through the above techniques. These technologies help us better understand your behavior,Let us know which parts of our app you are viewing and improve the functionality.

Identity authentication: to determine whether you have an account login and identity authentication. Cookie carries the userid and serviceToken of a user, wherein the serviceToken is a certificate after the user account is logged in and verified, and whether the user has logged in the account is judged and the identity of the user is extracted on the basis of the serviceTokens, so that the account login function and the identification of the user identity are realized.

Mobile Analytics: To better understand the use of our software in your phone. We will collect the information of app version and system type. The specific method is to carry the User-Agent field based on Cookie. We will not link this information to your personal information.

3、How we share, transfer, and publicly disclose your personal information

(1)Share

1.Principle

(1)Legitimacy principle: if data use activities are involved in the process of cooperation with partners, it must have a legitimate purpose and conform to the legal basis of legitimacy. If the Partner's use of the information is no longer legal, it should not use your personal information, or use it after obtaining the appropriate legal basis.

(2)Legitimate and least necessary: Data must be used for a legitimate purpose and only to the extent necessary to achieve that purpose.

(3)The principle of safety and prudence: We will carefully evaluate the purpose of using data by our partners, comprehensively evaluate the safety and security capabilities of these partners, and require them to comply with the legal agreement of cooperation. We will strictly monitor the security of the software tool development kit (SDK) and application program interface (API) for partners to obtain information to protect data security.

Third-party SDKs currently accessed by H wearAPP involving the collection of user information are as follows:

Alliance + SDK

Partner Type: Data Analysis Service Partner

Cooperation purpose: to provide user behavior data, App operation data collection and visual analysis, to help the company better analysis and decision-making to achieve business growth

Cooperation mode: embed a third-party SDK, and the SDK collects and transmits personal information

Types of personal information collected and used: device MAC address, unique device identification code, device information, application operation record, and location information

Specific fields:

(1) SDK/API/JS code version, browser, Internet service provider, IP address, platform, timestamp, application identifier, application version, application distribution channel, independent device identifier, iOS advertisement identifier (IDFA), Android advertiser identifier, network card (MAC) address, International Mobile Equipment Identity (IMEI), device model, sensor parameters, terminal manufacturer, terminalDevice operating system version, session start/stop times, language location, time zone and network status (WiFi, etc.), hard disk, CPU and battery usage.

(2) The collected user data may also include the user's identifier in the product, geographical location, user-triggered events, errors, and page views for the purpose of user geographical distribution correction, anti-cheating, and anti-brushing.

(3) The user's IP address, device type, and region may also be included in the HTTP/HTTPS request sent by the alliance statistical analysis tool.

Alliance Privacy Policy Link:https://www.umeng.com/policy

Amap SDK

Partner Company Name: AutoNavi Software Co., Ltd.

Partner Type: Location Services Partner

Cooperation purpose: to obtain the user's location

Cooperation mode: integration of third-party SDK, SDK collection and use of personal information

Type of personal information collected: device identification information (MAC address, Android ID, IMEI, IMSI, ICCID), location information, network information, base station ID data information, sensor information

Privacy Policy Link:https://lbs.amap.com/home/privacy/

Please be assured that we will securely monitor the Software Development Kit (SDK) for third-party software to obtain relevant information and require them to handle personal information in accordance with the purpose of the service, service description, privacy policy and any other relevant confidentiality and security measures. In order to protect your legitimate rights and interests, if you find that such SDK or other similar applications are at risk,Please terminate the relevant operation immediately and contact us in time.

2.Delegated processing

For the scenario of entrusted processing of personal information, we will sign relevant processing agreements with the entrusted partners in accordance with the law, and supervise the use of personal information.

3.Joint processing

In the case of joint processing of personal information, we will sign relevant agreements with our partners in accordance with the law and agree on their respective rights and obligations to ensure compliance with the relevant provisions of the law and protect data security in the process of using relevant personal information.

4.Scope of partners

If specific functions and scenarios involve services provided by our affiliates and third parties, the scope of partners includes our affiliates and third parties.

5.Use of data to implement a function or service

When you use the functions provided by our partners in H wearAPP, or when software service providers, smart device providers and system service providers provide services to you jointly with us, we will use the information necessary to achieve business purposes with them, make comprehensive statistics and form indirect crowd portraits.To recommend, present, or promote information that may be of interest to you, or to recommend or present specific features, services, or commercials that are more appropriate for you

6.Enable data usage for security and analytics statistics

(1)Security of use: We attach great importance to the security of accounts, services and content. In order to protect the accounts and property of you and other users, and protect the legitimate rights and interests of you and us from illegal infringement, our partners may share necessary equipment, accounts and log information.

(2)Analysis of product usage: In order to analyze the usage and performance of our products and improve the user experience, our partners may need to use information such as the source and usage of the product (crash, flash back, usage time, etc.), device identification information, and the overall installation and usage of the application.

(2)Transfer

We will not transfer your personal information to any company, organization or individual other than H wear and its affiliates, with the following exceptions:

1.Transfer with express consent: We transfer your personal information to other parties with your express consent

2.In case of merger, acquisition or bankruptcy liquidation, if the transfer of personal information is involved, we will require the new company or organization holding your personal information to continue to be bound by this privacy policy, otherwise we will require the company or organization to ask you for authorization and consent again.

(3)Public disclosure

We will not publicly disclose your information unless we comply with national laws and regulations or obtain your consent. When we publicly disclose your personal information, we use industry-standard security measures.

We will disclose relevant account information when we announce penalties for illegal accounts and fraudulent acts.

(4)Personal information that is exempted from sharing, transferring or publicly disclosing with consent according to law

You understand that under the following circumstances, according to laws, regulations and national standards, we do not need to obtain your authorization to share, transfer and publicly disclose your personal information:

1.Directly related to national security and national defense security

2.Directly related to public security, public health and major public interests

3.Directly related to criminal investigation, prosecution, trial and execution of judgment

4.In order to safeguard your or other individuals' life, property and other major legitimate rights and interests, but it is difficult to obtain my consent;

5.Personal information that you disclose to the public by yourself

6.Collecting personal information from legally publicly disclosed information, such as legitimate news reports, government information disclosure and other channels

4、How we protect your personal information

(1)We have used industry-standard security measures to protect the personal information you provide from unauthorized access, public disclosure, use, modification, damage or loss. We will take all reasonably practicable steps to protect your personal information. For example,The exchange of data (such as credit card information) between your browser and the Service is protected by SSL encryption; we use encryption to ensure the confidentiality of the data ; we use trusted safeguards to protect data from malicious attack ; We will deploy access control mechanism ? Ensure that only authorized personnel have access to personal information;And we will organize security and privacy protection training courses to enhance employees' awareness of the importance of protecting personal information.

(2)Retention period: The personal information provided by you will continue to be authorized for use by us during your use of the Service. When you cancel your account, we will continue to save your information within 6 months after your deletion in accordance with the network security law and other legal provisions.

(3)The Internet is not a completely secure environment, and e-mail, instant messaging, and communication with other users are not encrypted. We strongly recommend that you do not send personal information through such means. Please use a complex password to help us keep your account secure.

(4)The Internet environment is not 100% secure, and we will try to ensure or guarantee the security of any information you send us. If our physical, technical, or administrative safeguards are compromised, resulting in unauthorized access, public disclosure, alteration, or destruction of information that results in damage to your legitimate rights and interests, we will be held legally responsible.

(5)In the unfortunate event of a personal information security incident, we will, in accordance with the requirements of laws and regulations, promptly inform you of the basic situation and possible impact of the security incident, the measures we have taken or will take to deal with it, the suggestions you can independently prevent and reduce risks, and the remedial measures for you.We will promptly inform you of the incident by mail, letter, telephone, push notification, etc. When it is difficult to inform the subject of personal information one by one, we will take a reasonable and effective way to issue announcements.

At the same time, we will also take the initiative to report the disposal of personal information security incidents in accordance with the requirements of the regulatory authorities.

5、Your rights

In accordance with the relevant laws, regulations and standards of China, as well as the common practices of other countries and regions, we guarantee that you exercise the following rights with respect to your personal information:

(1)Access rights

You have the right to access your personal information, except for the exceptions provided by laws and regulations. If you want to exercise the right of data access, you can access it by yourself in the following ways:

1.Access basic information such as avatars

(1)Once in H wear, click on "My"

(2)Conduct information inquiry and access

2.Access mobile phone number and micro-signal:

(1)Once in H wear, click on "My"

(2)Conduct information inquiry and access

3.Access smart wearable device information

(1)After entering H wear, click "Equipment"

(2)Conduct information inquiry and access

(2)Right of correction

When you find that the personal information we process about you is wrong, you have the right to correct or update the wrong or incomplete information after verifying your identity and such correction does not affect the objectivity and accuracy. You can correct it in H wear or feedback to our customer service.

(3)Right of deletion

You may request the deletion of your personal information from us in the following circumstances:

1.If we process personal information in violation of laws and regulations

2.If we collect and use your personal information without your consent

3.If we process personal information in violation of our agreement with you

4.If you no longer use our products or services

5.If we no longer provide you with a product or service

If we decide to respond to your request for deletion, we will also notify those who have obtained your personal information from us and ask them to delete it in a timely manner, unless otherwise required by laws and regulations, or these entities have your independent authorization.

When you delete information from our service, we may not immediately delete the corresponding information from the backup system, but we will delete the information when the backup is updated.

(4)Withdraw authorization

You can change the extent to which you authorize us to continue collecting personal information or withdraw your authorization through the permission settings in the device you are using.

We will not be able to respond to your request as required by law in the following circumstances:

1.Directly related to national security and national defense security

2.Directly related to public security, public health and major public interests

3.Directly related to criminal investigation, prosecution, trial and execution of judgment

4.There is sufficient evidence that you have subjective malice or abuse of rights.

5.Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations.

6.Involving trade secret

(5)Cancel the account

1.Account cancellation must comply with the fact that the account is in a normal state and there is no restriction such as being disabled.

2.After the account is cancelled, the relevant information will be cleared and cannot be retrieved, and the relevant operations cannot be carried out.

(1)The personal information in the account is cleared.

(2)All data recorded in the account is cleared

(3)The data recorded by the smart wearable devices that have been bound to the account are cleared.

3.Logout operation

If you need to cancel your account, please cancel your account in "My-Settings-Cancel Account". In order to protect your rights and interests, please carefully check the instructions on the account cancellation page to complete the cancellation. We generally do not exceed the 15-day time limit for completing your logout request.

If you want to cancel your account, please be careful because the operation of canceling your account will make you unable to use our products and services.

(6)Access the Privacy Policy

You can view this Privacy Policy in its entirety on the registration page, or in "My-Settings-Privacy Policy"

6、How we handle children's personal information

Our products, websites and services are primarily for adults. Children are not allowed to create their own user accounts without the consent of a parent or guardian.

Where personal information is collected from children with parental consent, we will only use or publicly disclose this information as permitted by law, as expressly consented to by parents or guardians, or as necessary for the protection of the child.

7、How your personal information is transferred globally

We do not currently transfer or store your personal information across borders. If we need to transmit or store information across the border in the future, we will inform you of the purpose, recipient, security measures and security risks of the information leaving the country, and obtain your consent.

8、How this policy is updated

Our Privacy Policy is subject to change, and we will not diminish your rights under this Privacy Policy without your express consent. We will post any changes to this policy on this page.

For major changes, we will notify you on the page or by sending you an email and other means that may reach you.

Material changes referred to in this policy include, but are not limited to:

1.Our service model has changed significantly. Such as the purpose of processing personal information, the type of personal information processed, the way of using personal information, etc.

2.We have undergone significant changes in ownership structure, organizational structure and other ways. Such as changes in ownership caused by business adjustment, bankruptcy, mergers and acquisitions, etc.

3.The main object of personal information sharing, transfer or public disclosure has changed.

4.Significant changes in your rights to participate in the processing of personal information and the way in which it is conducted

5.When the department responsible for handling personal information security, the contact method and the complaint channel change,

6.When the Personal Information Security Impact Assessment Report indicates a high risk

9、How to contact us

If you have any questions, comments, or suggestions regarding this Privacy Policy, you may contact us by:

E-mail: kzs168@126.com.

Online customer service QQ: 178258115.

Tel: 13602582167

Huaxinzhi Technology Company Address: 2401C, Bike Technology Building, No. 9 Science Research Road, Maling Community, Yuehai Street, Nanshan District, Shenzhen, Guangdong Province