"Wallpaper Studio: Widgets & Live Maker" is developed and operated by Zhuhai Zhongsen Network Technology Co., Ltd. (hereinafter referred to as "our company"). This description is intended to help users understand how we collect and process user information when using "Xindong Theme Wallpaper".
This privacy policy is closely related to the products and/or services you use to use the heart theme wallpaper.
Before using all products and/or services of Xindong Theme Wallpaper, please read and thoroughly understand the "Xindong Theme Wallpaper Privacy Policy" and make sure you understand our rules for processing your personal information and other information, and make corresponding decisions that you deem appropriate. choose. If you do not agree with any content of this privacy policy, it means that you have chosen to give up the use of Xindong Theme Wallpaper products and/or services, and please immediately stop using Xindong Theme Wallpaper products and/or services. When you use any of our products and/or services, it means that you agree and fully understand the entire contents of this privacy policy.
1. Scope of information collection
In order to complete necessary activities such as account registration, login, and in-app purchases, you need to submit true, legal, and valid information, including but not limited to contact numbers, etc.
In order to provide continuous services and ensure service quality, we will record and save your login and use information during your use of this service, including but not limited to software and hardware feature information, user identifiers, etc.
2. How to collect information
2.1 We collect your information through your active submission and by generating corresponding records during your use of our services.
2.2
We may collect and use your information through preferences and other related technologies. Specific uses for which we use preferences include: Remembering who you are. For example: Preferences help us identify you as one of our registered users.
2.3 In the process of using "Wallpaper Studio: Widgets & Live Maker", you need to apply for and use some permissions. The permission application and usage instructions are as follows
1. In order to ensure the safe and stable operation of the APP, we may apply for or use relevant permissions of the operating system;
2. In order to protect your right to know, we use the following list to display the relevant operating system permissions that the product may apply for and use. You can manage the relevant permissions according to actual needs;
3. Depending on product upgrades, the types and purposes of applying for and using permissions may change. We will promptly adjust the list based on these changes to ensure that you are informed of the application and use of permissions in a timely manner;
4. Please be aware that for the functional and security needs of our business and products, we may also use third-party SDKs, and these third parties may also apply for or use relevant operating system permissions;
5. In the process of using the product, you may use H5 pages or mini-programs developed by third parties. These plug-ins or mini-programs developed by third parties may also apply for or use relevant operating systems as necessary for business functions. Permissions;
6. This description applies to the Android version and iOS version of the heart-beating theme wallpaper product. The specific scope of application will be explained in the following list.
Android operating system application permissions:
1. Read the contents of the SD card (read storage space/photo permission) Permission: android.permission.READ_EXTERNAL_STORAGE
Permission function description: Provides the function of reading the photo album image data in the mobile phone storage space
Usage scenarios and purposes: Allow apps or widgets to read images, files and other content in storage. It is mainly used to help you upload widget background images, covers and other images, files, information and other functions.
2. Access data network status Permission: ACCESS_NETWORK_STATE
Permission function description: Obtain the network status function of mobile phone data traffic
Usage scenarios and purposes: Use 4G/wifi switch status and other information in the X panel widget
3. Access data network status Permission: ACCESS_WIFI_STATE
Permission function description: Get the network status function of mobile phone WIFI
Usage scenarios and purposes: Use wifi switch status and other information in the X panel/dashboard widget
4. Access to the Internet network permission Permission: android.permission.internet
Permission function description: Network access permission, use this permission when the APP needs to access the network
Usage scenarios and purposes: Used when loading data when the APP is started
5. Get phone status Device information (IMEI/MAC/Android ID/IDFA/OpenUDID/GUID/SIM card IMSI/geographic location, etc.)
Permission function description: Provides access to information such as mobile phone device identification. Please rest assured that this permission cannot monitor or obtain any of your call content and information
Usage scenarios and purposes: We may use your device information to ensure that desktop widgets can run normally on the mobile desktop after exiting the APP, as well as information that our affiliates and partners have obtained your authorization or can provide to us in accordance with the law. , used to determine account security, transaction security, identity verification, service log information, identify violations of laws and regulations, detect and prevent security incidents, and take necessary recording, analysis, disposal measures/security guarantees and other main functions in accordance with the law.
6. Self-start permissions at boot; RECEIVE_BOOT_COMPLETED
Permission function description: Start swimming program or service after booting
Usage scenarios and purposes: Allow apps or desktop widgets to automatically start the desktop widget service after booting. Widget-related data has been provided
7. Bluetooth permissions Permissions: BLUETOOTH and BLUETOOTH_ADMIN.
Permission function description: Get Bluetooth switch status, etc.
Usage scenarios and purposes: Allow the App widget to obtain the on/off status of Bluetooth and display relevant information in the X panel widget
8. Get application installation list (software installation list) Permission: QUERY_ALL_PACKAGES
Permission function description: Get application installation list on Android phone
Usage scenarios and purposes: Obtain the application installation list and quickly select to start the APP for quick launch widget
9. Pangolin advertising service Permission: permission.TT_PANGOLIN,
Permission function description: To solve security risk vulnerabilities, sending and registering broadcast events requires calling the interface with delivery permission
Usage scenarios and purposes: To provide you with better and better services
10. Pangolin SDK Service Permissions: RITE_EXTERNAL_STORAGE, ACCESS_COARSE_LOCATION, REQUEST_INSTALL_PACKAGES, GET_TASKS
Permission function description: Obtain the basic information required for Chuanshan cooperation for advertising display
Usage scenarios and purposes: Pangolin provides adding location permissions or parameters that will help deliver more accurately positioned service ads
11. Camera permissions Permissions: CAMERA
Permission function description: Use camera to take pictures
Usage scenarios and purposes: When using AR transparent wallpaper, user authorization is required to obtain camera permissions to capture images and set AR transparent wallpaper
12. Obtain the hardware MAC address of the network device Permission: getMacAddress
Permission function description: Obtain device serial number, network device hardware address MAC, etc.
Usage scenarios and purposes: We obtain the MAC address in order to restore the Crash scene more realistically, provide data analysis services such as sharing and reflow, so as to share messages with the target device and designated social accounts, provide anti-cheating services, and collect gateway number retrieval error logs and other data to provide statistical analysis service capabilities.
13. Obtain running process information
Function description: Get the current process name
Usage scenarios and purposes: Do different initializations according to different processes, and judge the process information when Umeng reports the crash information reported by the SDK.
14. Location permission
Acquisition method: dynamic acquisition, user authorization is required
Function description: Obtain user location information
Usage scenarios and purposes: Used for weather information display and advertising services of widgets.
15. Get the clipboard content (get the pasteboard information)
How to obtain: Obtain when parsing the invitation code
Function description: Copy information to the system clipboard and obtain
Usage scenarios and purposes: used to copy the user's invitation code information and paste it into the redemption interface to redeem members, used to copy the user's uid information and send it to customers to locate issues
16. Record audio permission
How to obtain: Obtained when setting a custom sound using the voice widget
Function description: Obtain audio recording permission for recording sound
Usage scenarios and purposes: In the voice widget, when using a custom sound, you need to obtain the permission to record audio, record your own voice and set it to the voice widget.
17. Task information permission
Acquisition method: dynamic acquisition, user authorization is required
Function description: Obtain qq, WeChat application usage status permission, used for qq/WeChat skin, text lock function settings
Usage scenarios and purposes: When using 3D wallpaper, a sensor is required to identify the offset position of the mobile phone to change the position and direction of the wallpaper.
18. Sensor permissions - obtain sensor information (gyro sensor, acceleration sensor, linear acceleration sensor, gravity sensor)
Acquisition method: static acquisition
Usage scenarios and purposes: When using 3D parallax wallpaper, a gyroscope sensor and a gravity sensor are needed to identify the mobile phone's offset position to change the wallpaper's position and direction. When using particle-related 3D wallpapers, an acceleration sensor and a linear acceleration sensor are needed to achieve the particle acceleration effect. The advertising shake trigger click function requires the use of a linear acceleration sensor.
19. Notification usage rights
Permission: android.permission.BIND_NOTIFICATION_LISTENER_SERVICE
Acquisition method: dynamic acquisition, user authorization is required
Permission function description: Monitor incoming call information on the notification bar
Usage scenarios and purposes: The call show function monitors incoming call information on the notification bar and displays a customized incoming call interface
20. Telephone related permissions
Acquisition method: dynamic acquisition, user authorization is required
Permissions: ANSWER_PHONE_CALLS, READ_CALL_LOG, READ_CONTACTS, CALL_PHONE, WAKE_LOCK, DISABLE_KEYGUARD
Permission function description: read phone contacts and call history information, answer and hang up calls, lock the screen and wake up the phone
Usage scenarios and purposes: When using the call show function, the contact information is read and displayed, the customized call interface can pop up in the lock screen state, and the call can be actively answered and hung up
21. Application obtains IP address personal information
Acquisition method: static acquisition
Permission function description: The weather component obtains positioning information based on the current IP to obtain weather information
Usage scenarios and purposes: weather widget, used in city positioning
2.4 In order to provide you with widget display time, power, number of steps and other functions normally, we will collect your relevant device information. With your consent, the app will collect this information each time it is launched. This information may include:
(1) Device attributes: mobile phone model, system version, network type, screen resolution, screen size, battery power, available storage space, application and file names and types, current application version number and other information;
(2) Device serial number or other device identifier: such as international mobile equipment identity code IMEI, network device hardware address, advertising identifier IDFA and other device serial numbers, unique identity identifiers, network device hardware address MAC, etc.;
(3) Device signal: the network status, Bluetooth status, WIFI access point information, etc. of the device you are using.
2.5 Personalized recommendation: In order to provide you with a better wallpaper experience, we may recommend wallpaper content that you may be interested in based on your wallpaper browsing, clicking, searching and other habits and preferences. If you do not want us to make such personalized content recommendations for you, you can click "Close" in "My - Personalized Recommendations" in the APP. When you use the wallpaper search function, if you need to paste text copied from other applications, we will apply for clipboard permission, and you can quickly paste the search after you agree to the authorization;
In order to help software research and development, design new products and services, improve existing software products and services, and optimize user experience: we will use your software information and commonly used device information (such as your device model, operating system Version, device configuration, unique device identifier, device geographical location, storage space, international mobile equipment identity code IMEI, network device hardware address MAC, advertising identifier IDFA, etc.), device connection information (type of browser, telecom operator, The network environment, the language used) and the status information, document information, log information, and cloud service use of equipment status analysis, understand the use of software products and services, and adapting. The improvement of functions and services provides data support.
We collect the installation list to determine whether it is necessary to call up the app's component selection page. We obtain the MAC address in order to restore the Crash scene more realistically, provide data analysis services such as sharing and reflow, so as to share messages to the target device and designated social accounts, provide anti-cheating services, and collect data such as gateway account retrieval error logs to provide statistics. Analytical service capabilities.
3. Information use
In order to provide you with better, more convenient and safer services, we may use the collected information for the following purposes in compliance with relevant laws and regulations:
Provide services to you.
Service optimization and development. For example, we will optimize our services based on information generated when the services respond to your needs.
Other related scenarios that may require the use of collected information. If the usage scenario is not reasonably related to the initial scenario, we will obtain your consent again before using the information.
IV. Information Disclosure We will not share your information with any unrelated third party without your consent, except in the following circumstances:
4.1 We may share your information with our affiliates, third-party service providers, contractors and agents for the following purposes only:
Necessary to provide the corresponding functions or services in "II. Scope of Information Collection" and necessary for the purposes described in "IV. Information Use".
If we share your information with any of the above third parties, we will work hard to ensure that the third parties comply with this Statement and other appropriate confidentiality and security measures we require them to comply with when using your information.
4.2
In order to ensure the stable operation and function realization of our client and enable you to use and enjoy more services and functions, our application will embed the SDK of authorized partners or other similar applications. We will conduct strict security testing on the application programming interface (API) and software tool development kit (SDK) used by authorized partners to obtain relevant information, and agree on strict data protection measures with authorized partners to ensure that they comply with this policy and any other Relevant confidentiality and security measures are used to process personal information. The following are the third-party SDKs connected to "Wallpaper Studio: Widgets & Live Maker":
Third Party Services
Provider Name
Information and Purpose Collected
Privacy Policy Link
Statistics
Umeng SDK
Device information (IMEI/Mac/Android ID/IDFA/OPENUDID/GUID/SN/SSID/SIM card IMSI/geographic location, etc.), obtain running process information (reported information is to view process information) span>
4.3
As our business continues to develop, we and our affiliates may engage in mergers, acquisitions, asset transfers or similar transactions, and your information may be transferred as part of such transactions. We will comply with the requirements of relevant laws and regulations, notify you before transfer, ensure the confidentiality of information during transfer, and continue to perform corresponding responsibilities and obligations after changes.
4.4 We may also disclose your information for the following reasons:
Comply with applicable laws, regulations and other relevant regulations.
Comply with court judgments, rulings, or other legal proceedings.
Comply with the requirements of relevant government agencies or other competent authorities.
We have reason to believe that we need to comply with laws, regulations and other relevant requirements.
Reasonably necessary to implement relevant service agreements or this privacy statement, safeguard social and public interests, handle complaints/disputes, and protect the personal and property safety or legitimate rights and interests of our customers, us or our affiliates, other users or employees the use of.
With your legal authorization.
If we disclose your information for the above reasons, we will inform you in time on the basis of complying with the relevant provisions of laws and regulations and this statement.
5. Information storage
5.1 The information collected about you is stored on our server in mainland China.
5.2 Generally, we only retain your information during the period of providing services to you, and the retention period will not exceed the time necessary to meet the relevant purpose of use. However, under the following circumstances, and only for purposes related to the following circumstances, we may need to retain your information or part of it for a longer period of time:
Comply with applicable laws, regulations and other relevant regulations.
Comply with the requirements of a court judgment, order or other legal process.
Comply with the requirements of relevant government agencies or other competent authorities.
We have reason to believe that we need to comply with laws, regulations and other relevant requirements.
Reasonably necessary to implement relevant service agreements or this privacy statement, safeguard social and public interests, handle complaints/disputes, and protect the personal and property safety or legitimate rights and interests of our customers, us or our affiliates, other users or employees the use of.
6. Information Security
6.1 We strive to ensure information security to prevent loss, improper use, unauthorized reading or disclosure of information.
We use a variety of security technologies to protect information security. For example, we will use security measures such as multiple server backups and password encryption to prevent information leakage, damage, and loss.
We have established strict management systems and processes to ensure information security. For example, we strictly limit who can access information and conduct audits to require them to comply with confidentiality obligations.
We attach great importance to information security compliance and fully protect your information security through numerous international and domestic security certifications.
But please understand that due to technical limitations and various possible malicious means, in the Internet environment, even if you do your best to strengthen security measures, it is impossible to always guarantee 100% security of information. You need to understand that the systems and communication networks you use to access our services may have problems due to factors beyond our control.
If a security incident such as personal information leakage occurs, we will activate an emergency plan to prevent the security incident from expanding, report it promptly in accordance with the "National Cybersecurity Incident Emergency Plan" and other relevant regulations, and notify us by sending emails, push notifications, announcements, etc. Your relevant situation and give you safety suggestions.
6.2
In order to more effectively protect your information security, we also hope that you can strengthen your awareness of self-protection. We will only assume responsibility to the extent that our services directly lead to the leakage of your personal information. Therefore, please keep your account and password information properly to avoid leakage of your personal information. Unless you judge that it is necessary, you will not provide your account password and other personal information to any third party.
7. Access and control
7.1 You can access, modify and delete your relevant information during the use of our services. How you access, modify and delete information will depend on the specific service you use.
7.2 If you find that we collect and use your information in violation of laws and regulations or the agreement between the two parties, you can ask us to delete it. If you find that your information collected and stored by us is incorrect and cannot be corrected by yourself, you can also ask us to correct it.
7.3 When accessing, modifying and deleting relevant information, we may require you to perform identity verification to ensure account security. Please understand that due to technical limitations and legal and regulatory requirements, some of your requests may not be responded to.
7.4 Due to legal and regulatory requirements, information security protection and other legitimate reasons, some of your information may not be accessible, modified or deleted.
7.5 You can contact us through the contact information listed in the privacy policy or contact our online customer service staff to complete the cancellation process. After we receive your request, all data in your account will be cleared within 24 hours, and this operation cannot be restored.
Please note and know that you will back up all information related to your account before logging out, and please confirm that all services related to this account have been properly handled. After the logout is completed, we will delete or anonymize your personal information. Please know and understand that relevant log records will be retained for no less than 6 months in accordance with relevant laws and regulations.
7.6 If you have any questions about the realization of the above rights, you can contact us according to the relevant contact information in "Contact Us".
7.7
We may revise the terms of this Privacy Statement from time to time, and such revisions shall form part of this Privacy Statement. If there are any important rule changes that may substantially reduce your rights under this Privacy Statement or expand the scope of collection and use of information, we will notify you in a prominent position before the revision takes effect. In this case, if you continue to use our services, you agree to be bound by the revised privacy statement.
8. How to contact us
If you have any questions about this policy or other related matters, please fill in the relevant information according to the guidelines we provide and send your questions to [zhongsenkj@163.com]. We will review the issues involved as soon as possible and verify them. Reply within thirty days of your user status.
Company name: Zhuhai Zhongsen Network Technology Co., Ltd.