CYCPLUS Fit User Privacy Policy

 

Version Update Date: July 19, 2024
Version Effective Date: July 26, 2024

This policy applies only to the CYCPLUS Fit App products or services provided by Chengdu Chendian Intelligent Technology Co., Ltd. (hereinafter referred to as "Chendian" or we").

 

The content of this policy is as follows:

  1. How We Collect and Use User Information
  2. How We Share, Transfer, and Publicly Disclose User Information
  3. How We Protect User Information
  4. User Rights
  5. How We Handle Children's Personal Information
  6. How User Information is Stored and Transferred Globally
  7. How This Policy is Updated
  8. How to Contact Us

To ensure the security of user information, we adhere to the following principles to protect your user information:

  1. Consistency of Rights and Responsibilities
  2. Clear Purpose
  3. Consent and Choice
  4. Minimum Necessary Use
  5. Security Assurance
  6. Subject Participation
  7. Openness and Transparency

We also commit to implementing appropriate security measures in accordance with industry-standard security practices to protect your user information. Please carefully read and understand this privacy policy before using our products or services.

 

1. How We Collect and Use User Information

1.1 Information We Collect and Use During Your Use of Our Products or Services

We will only collect and use your user information for the purposes described in this policy. The purpose of collecting user information is to provide you with products or services. You have the right to choose whether to provide this information, but in most cases, if you do not provide it, we may not be able to provide you with the corresponding services or respond to your issues.

When using our services, we may collect information you provide to us or information necessary for providing services, including:

  1. Android ID Collection: Used for third-party or our error analysis and client identification.
  1. Storage Permissions: Obtained to manage local cache.
  2. Photo Album Permissions: Obtained to read local albums for avatar changes and picture sharing.
  3. Location Permissions: Obtained for device location tracking.
  4. Bluetooth Permissions: Obtained for connecting devices to the App.
  5. Phone Information Permissions: Obtained for uploading log data.
  6. Read Application List Permissions.

The user information we collect helps you complete registration, protect account security, upload avatars, and provide data upload and sharing. The information you provide will be continuously authorized for our use during your use of the service. We will cease using and delete this information once you stop using the push service.

We ensure the collected user information is de-identified or anonymized in accordance with the law. Information that cannot identify an individual's identity alone or in combination with other information is not considered personal information under the law. If we combine non-personal information with other information to identify your personal identity or use it in combination with your personal information, we will treat and protect such information as your personal information according to this privacy policy during the combined use.

To better operate and improve our technology and services, or due to changes in business strategy, if the user information collection, usage, or processing needed for the products or services we provide exceeds the scope described above, or if we intend to use collected user information for other purposes not specified in this privacy policy, or if we intend to use the information collected for a specific purpose for other purposes, we will notify you within a reasonable time after obtaining user information or before processing user information and obtain your consent.

 

1.2 Exceptions to Consent and Authorization

Please understand that in accordance with laws, regulations, and relevant national standards, we may collect and use your user information without obtaining your consent in the following circumstances:

  1. When it is directly related to national security or national defense security.
  2. When it is directly related to public safety, public health, or major public interests.
  3. When it is directly related to criminal investigation, prosecution, trial, and execution of judgments.
  4. When it is necessary to protect your or other individuals' life, property, or other significant legal rights and interests, but it is difficult to obtain your consent.
  5. When the user information you provide is publicly available to the public by yourself.
  6. When the user information is collected from legally publicly disclosed information, such as legal news reports or government information disclosures.
  7. When it is necessary to sign or perform contracts according to your requirements.
  8. When it is necessary to maintain the safe and stable operation of software and related services, such as detecting and handling failures in software and related services.
  9. When the personal information controller is a news unit and it is necessary for lawful news reporting.
  10. When it is necessary for statistical or academic research conducted by academic research institutions for public interest, and when providing the results of academic research or descriptions externally, the personal information contained in the results is de-identified.
  11. Other circumstances stipulated by laws and regulations.

 

1.3 Instructions for Third-Party SDK Permission Use

1.Third-Party SDK Name: Google Sign-In SDK
Provider Name: Google LLC
Types of Information Collected:

Personal Information: Name, email address, avatar

Device Information: Device identifiers, IP address, OS version

Purpose of Use: Simplify login process, enabling users to quickly log in and register without needing to create separate accounts or remember multiple usernames and passwords, ensuring the security and authenticity of user identities.
Privacy Policy Link: Google Privacy Policy

 

2.Third-Party SDK Name: Facebook Login SDK
Provider Name: Meta Platforms Inc.
Types of Information Collected:

Personal Information: Name, email address, avatar

Device Information: Device identifiers, IP address, OS version

Purpose of Use: Simplify login process, allowing users to quickly log in and register without needing to create separate accounts or remember multiple usernames and passwords, ensuring the security and authenticity of user identities.
Privacy Policy Link: Facebook Privacy Policy

 

3.Third-Party SDK Name: Facebook Share SDK
Provider Name: Meta Platforms Inc.
Types of Information Collected:

Personal Information: Name, email address, avatar

Public Social Media Information: Friend lists, publicly shared content

Purpose of Use: Simplify login process, enabling users to quickly log in and register without needing to create separate accounts or remember multiple usernames and passwords, ensuring the security and               authenticity of user identities.
Privacy Policy Link: Facebook Privacy Policy

 

4.Third-Party SDK Name: Mapbox Maps SDK for Android
Provider Name: Mapbox Inc.
Types of Information Collected:

Location Information: Precise and approximate location data

Device Information: Device identifiers, IP address, OS version, device model

App Usage Information: Usage frequency, accessed features, error reports, performance data

Purpose of Use: Provide map services, displaying and using maps, navigation, geocoding, etc.
Privacy Policy Link: Mapbox Privacy Policy

 

2. How We Share, Transfer, and Publicly Disclose Your User Information

 

2.1 Sharing

We do not share your user information with any companies, organizations, or individuals, except in the following cases:

  1. With Explicit Consent: We will share your user information with other parties after obtaining your explicit consent.
  2. As Required by Law: We may share your user information according to laws, regulations, or mandatory government requirements.
  3. Sharing with Our Affiliates: Your user information may be shared with our affiliates. We will only share necessary user information and are bound by the purposes stated in this privacy policy. If affiliates change the purpose of processing user information, they will seek your authorization again.
  4. Sharing with Authorized Partners: Certain services are provided by authorized partners to achieve the purposes stated in this policy. We may share some of your user information with partners to provide better customer service and user experience. We will only share user information for legitimate, justified, necessary, specific, and clear purposes and will only share necessary user information for providing services. To better operate and improve technology and services, you agree that we and our authorized partners can use the collected information for other services and purposes, in compliance with relevant laws and regulations.

 

2.2 Transfer

We will not transfer your user information to any companies, organizations, or individuals, except in the following cases:

  1. With Explicit Consent: We will transfer your user information to other parties after obtaining your explicit consent.
  2. In the Event of Mergers, Acquisitions, or Bankruptcy Liquidation: If the transfer of user information is involved, we will require the new entity holding your user information to continue being bound by this privacy policy. Otherwise, we will require the entity to seek your authorization again.

 

2.3 Public Disclosure

We will only publicly disclose your user information in the following circumstances:

  1. With Your Explicit Consent:
  2. Based on Legal Disclosures: We may publicly disclose your user information in accordance with laws, legal procedures, litigation, or mandatory requirements by government authorities.

 

2.4 Exceptions to Authorization Consent When Sharing, Transferring, or Publicly Disclosing Information

Please understand that according to laws, regulations, and relevant national standards, we may share, transfer, or publicly disclose your user information without obtaining your consent in the following circumstances:

  1. When it is directly related to national security or national defense security.
  2. When it is directly related to public safety, public health, or major public interests.
  3. When it is directly related to criminal investigation, prosecution, trial, and execution of judgments.
  4. When it is necessary to protect your or other individuals' life, property, or other significant legal rights and interests, but it is difficult to obtain your consent.
  5. When the user information you provide is publicly available to the public by yourself.
  6. When the user information is collected from legally publicly disclosed information, such as legal news reports or government information disclosures.

 

3. How We Protect Your User Information

  1. We have implemented industry-standard security measures to protect the user information you provide, preventing unauthorized access, disclosure, use, modification, damage, or loss of data. We take all reasonable and feasible measures to protect your user information. For example, data exchanges between your browser and "services" are protected by SSL encryption; we also provide HTTPS secure browsing for the website; we use encryption technology to ensure data confidentiality; we use trusted protection mechanisms to prevent malicious attacks on data; we deploy access control mechanisms to ensure only authorized personnel can access user information; and we conduct security and privacy protection training courses to raise employee awareness of the importance of protecting user information.
  2. We use encryption technology to ensure the confidentiality of data transmission and storage. We use trusted protection mechanisms to prevent malicious attacks on data and data storage servers.
  3. We deploy access control mechanisms to ensure only authorized personnel can access personal information; and control the number of authorized personnel according to business needs and personnel hierarchy, managing authorized personnel's access rights at different levels; access to personal data is logged, and administrators regularly audit it.
  4. We carefully select business partners and service providers, incorporating personal information protection requirements into our business contracts or audits and assessments.
  5. We conduct security and privacy protection training courses, tests, and promotional activities to enhance employees' awareness of the importance of protecting personal information.

In summary, we will do our best to protect your personal information. However, no security measures can be completely flawless, and no product or service, website, data transmission, computer system, or network connection is absolutely secure. In the unfortunate event of a personal information security incident, we will inform you in accordance with laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, suggestions for you to independently prevent and reduce risks, and remedial measures for you. We will inform you of relevant information about the incident via email, SMS, push notifications, etc. If it is difficult to inform each individual information subject, we will take reasonable and effective means to publish announcements. At the same time, we will also report the handling of personal information security incidents to the regulatory authorities as required.

 

4. Your Rights

In accordance with relevant Chinese laws, regulations, standards, and other countries' and regions' common practices, we guarantee that you can exercise the following rights regarding your user information:

 

4.1 Access Your User Information

You have the right to access your user information, except for exceptions stipulated by laws and regulations. If you wish to exercise your data access rights, you can directly log into the CYCPLUS Fit App to access it. If you cannot access this user information through the above link, you can send an email to steven@cycplus.com. We will respond to your access request within 15 days.

 

4.2 Correct Your User Information

If you find any errors in the user information we process about you, you have the right to request that we correct them. You can send an email to steven@cycplus.com. We will respond to your correction request within 30 days.

 

4.3 Delete Your User Information

In the following circumstances, you can request us to delete user information:

  1. If our behavior of processing user information violates laws and regulations;
  2. If we collect and use your user information without obtaining your consent;
  3. If our behavior of processing user information violates our agreement with you;
  4. If you no longer use our products or services or have canceled your account;
  5. If we no longer provide you with products or services.

We will evaluate your deletion request and take appropriate steps if the request meets the applicable regulations. When you request deletion, we may require identity verification to ensure the security of your account. When you delete information from our services, due to applicable laws and security technologies, we may not immediately delete the corresponding information from the backup system, and we will securely store your information until the backup can be cleared or anonymized.

 

4.4 Change the Scope of Your Authorization Consent

Each business function requires some basic user information to be completed (see "Section 1" of this policy). For the collection and use of user information, you can provide or withdraw your authorization consent at any time. When you withdraw consent, we will no longer process the corresponding user information. At the same time, please note that withdrawing your consent may result in certain consequences, such as us being unable to continue providing you with corresponding services or specific functions, but your decision to withdraw consent will not affect the user information processing previously carried out based on your authorization.

 

4.5 User Information Subject Cancelling Account

You can cancel your previously registered account at any time through the CYCPLUS Fit App. Operation steps: After logging in, go to My Page --> About App --> Cancel Account. Once the account cancellation is confirmed, it will take effect immediately, and we will stop providing you with products or services and delete or anonymize your information according to your request, except as otherwise required by laws and regulations. This may also result in your loss of access to the data in your account, so please operate with caution.

 

4.6 User Information Subject Obtaining User Data

You have the right to obtain a copy of your user information, and you can authorize data synchronization to third-party platforms through the CYCPLUS Fit App. Under the premise of technical feasibility, such as data interface matching, we can also directly transfer your data to a third party designated by you as requested.

 

4.7 Restriction on Automated Decision-Making in Information Systems

In some business functions, we may only make decisions based on non-human automated decision-making mechanisms such as information systems and algorithms. If these decisions significantly affect your legal rights, you have the right to request an explanation from us, and we will provide appropriate remedies.

 

4.8 Responding to Your Above Requests

To ensure security, you may need to provide a written request or other means to prove your identity. We may first require you to verify your identity before processing your request. We will respond within 15 days.

For your reasonable requests, we do not charge fees in principle, but for multiple repeated requests beyond reasonable limits, we will charge a certain cost depending on the situation. For unreasonable repeated requests, requests requiring excessive technical means (for example, the need to develop new systems or fundamentally change existing practices), requests that pose risks to others' legal rights, or requests that are extremely impractical, we may refuse them. Please also understand that, due to security considerations, relevant legal requirements, or technical limitations, we may not be able to respond to some of your requests, such as the following circumstances:

  1. When it is related to the personal information controller fulfilling legal obligations;
  2. When it is directly related to national security or national defense security;
  3. When it is directly related to public safety, public health, or major public interests;
  4. When it is directly related to criminal investigation, prosecution, trial, and execution of judgments;
  5. When there is sufficient evidence that the user information subject is subjectively malicious or abusing rights;
  6. When it is necessary to protect the significant legal rights and interests of the user information subject or other individuals, but it is difficult to obtain consent;
  7. When responding to the user information subject's request will cause serious harm to the legitimate rights and interests of the user information subject or other individuals or organizations;
  8. When it involves trade secrets.

 

5. How We Handle Children's Personal Information

We attach great importance to the protection of children's personal information. Our products, websites, and services are mainly for adults. Children should not create their own user accounts without parental or guardian consent. Although local laws and customs define children differently, we consider anyone under the age of 14 to be a child.

For the collection of children's user information with parental or guardian consent, we will only store, use, or disclose this information as permitted by law, with explicit consent from parents or guardians, or when necessary to protect the child. Otherwise, we will strive to delete the relevant data as soon as possible.

Given the limitations of existing technology and business models, it is difficult for us to actively identify children's personal information. If you find that we have collected children's personal information without parental consent, please contact us in time, and we will strive to delete it promptly upon discovery. If we find the situation ourselves, we will also delete it promptly, except as otherwise required by law.

 

6. How Your User Information is Stored and Transferred Globally

In principle, the user information we collect and generate within the People's Republic of China will be stored within the People's Republic of China. We will only retain your user information for the period necessary for the purposes described in this policy and the shortest period required by laws and regulations. After exceeding the above retention period, we will delete or anonymize your user information in accordance with applicable laws and regulations. Except as otherwise provided by laws and regulations, or for purposes such as public interest, scientific historical research, etc., or with your separate authorization consent, we may need to retain relevant data for a longer time.

As we provide products or services through resources and servers worldwide, this means that after obtaining your authorization consent, your user information may be transferred to foreign jurisdictions where you use the products or services, or accessed from these jurisdictions. These jurisdictions may have different data protection laws or may not have relevant laws. In such cases, we will ensure that your user information is adequately protected, equivalent to the protection provided within the People's Republic of China. For example, we may request your consent for cross-border transfer of user information or implement data de-identification measures before cross-border data transfer.

 

7. How This Policy is Updated

Our privacy policy may change. We will not reduce your rights under this privacy policy without your explicit consent. We will post any changes to this policy on this page. For significant changes, we will also provide more prominent notifications. The significant changes referred to in this policy include but are not limited to:

  1. Significant changes in our service model, such as the purpose of processing user information, the type of user information processed, and the manner of use of user information;
  2. Significant changes in our ownership structure, organizational structure, etc., such as changes in owners due to business adjustments, bankruptcy mergers, etc.;
  3. Changes in the main recipients of user information sharing, transfer, or public disclosure;
  4. Significant changes in your rights and how you exercise them in terms of user information processing;
  5. Changes in the department responsible for handling user information security, contact methods, and complaint channels;
  6. When the user information security impact assessment report indicates a high risk.

 

8. How to Contact Us

If you have any questions, opinions, or suggestions about this privacy policy, please contact us via email at steven@cycplus.com. We will respond within 15 days.

档铺网——在线文档免费处理