Leefine ("we." "our, or "us") understand the importance of your personal information, we will protect it in accordance with laws and regulations. We have made this Privacy policy ("this Policy”)and specifically advise that read and understand this Policy carefully before you use Leefine and related services(uour services”)to make appropriate choices.
This policy will help you understand:
We collect and use your information in accordance with the policy, However, we will not collect it in a package as a way to force bundles even if you agree this Policy.
When you use the services or turn on features, we collect and use the necessary information for the functionality and services. You may refuse to provide and it do not affect other features or services unless necessary to achieve basic business functions or as required by law and regulation. We will itemize what is necessary in the Policy.
If your account is not signed in, We will guarantee the basic function of information push by using the device's corresponding identifier information.If you log in to your account, we will implement information push based on account information.
Contacts, precise geographic locations, cameras, microphones, photo album permissions are not turned on by default, only when you are authorized to use them for specific features or services, or you can withdraw authorization. In particular, we do not collect your information when the relevant features or services are not required, even if we have obtained these sensitive permissions with your authorization.
This Policy applies to your access to and use of our services through Leefine applications, Leefine soft ware development Kit (SDK) and application Programming Interface (API) for third-party websites and applications.
The following will help you learn more about how we collect, use. store, transfer, share, transfer (if applicable) and protect personal information.and understand how to query. access, delete, correct, and withdraw authorized personal information.Among them.the important content of the terms about your personal information interests we have been prompted in bold form, please pay particular attention to this part.
1. Information We Collect and How We Use It
2. Where we store and how long we keep your information
3. Additional information for permission to use
4. Third-party platform login
5..Additional information on the use of Third-party (SDK / API ) access rights
6. How we share, transfer, and publicly disclose personal information
7. How we protect the security of personal information
8. Controlling Your Personal Information
9. Terms of use for minors
10. Changes and notifications of the Policy
11. Permission use
12. Contact us
1.1 To realize the core functions of Leefine Kids watch
Leefine Kids watch provides location services, step count, voice calls, chats, and other features. If you agree to this Privacy Policy and have paired a Watch device, this app will require your Storage, Location, Camera, Call, Microphone, and Contacts permissions and access to your photo albums. It also needs to collect your information for the following purposes:
1.1.1 Information indirectly collected through registration.
When you use Leefine Kids watch, we require you to register account first. When you register account, may collect your phone number, e-mail, user name and password.
When you log in, the APP will automatically obtain your account information, including your Leefine ID, your nickname and profile picture, which is used to log in to the app to manage your paired Watch devices.
1.1.2 Managing Watch Information
Including the phone number, gender, and date of birth. The phone number is used for the voice call services. The purpose of collecting the gender and date of birth information is to determine the default profile picture displayed on the app.
You can amend your children’s information on the APP, and upload or change your children’s profile, including the phone number, gender, and date of birth. The phone number is used for the voice call services. The purpose of collecting the gender and date of birth information is to determine the default profile picture displayed on the app. The APP will request access to your photo library when you upload your children’s profile.
1.1.3 Location-based Services
a. Remote MonitoringAfter being matched to a mobile phone/mobile phones, the Watch will be connected to the Software via Leefine’s server. The remote monitoring is enabled by the Watch’s locating function. After you click the Watch locating button on the map page, Leefine’s server will send a location order to the Watch, and the Watch will be located via GPS, GPRS or Wi-Fi. The location information will be uploaded to Leefine’s server. The location can only be viewed from the Software, Due to limited storage space, Leefine will regularly sort out and delete such data. Your information will not be sold, leased or exchanged with anything.
b. Pedometer FunctionWhen you use the pedometer function, you can use the Software to view the step data that is stored in the Watch via Leefine’s server, and convert such step data into calorie consumption through omnibus algorithm. Such data is stored on Leefine’s server. Due to limited storage space, Leefine will regularly sort out and delete such data. Your information will not be sold, leased or exchanged with anything.
1.3 Authenticate
When you use a feature or service for authentication (Parent or Counselor), according to relevant laws and verification. You may need to provide your real identity information(Phone number) or relevant certificate (psychologist Qualification) to complete the verification. This information is sensitive to personal information that you may refuse to provide. but you may not be able to access the services without affecting the normal use of other features and services.
1.4 Information browsing
a. Actions you take when using the Services: click, follow,share
b. Information you provide on your initiative: feedback
c. Geographical information:
Sensor information such as GPS information, WI-FI access points, Bluetooth and base stations
d. The above information we collect and use is De-identified, and data analysis corresponds only to specific, unrelated codes that do not directly relate to your identity and is not associated with your real identity.
1.5 Function and Interaction
a. Function
When you use features related to uploading images, WeChat, and video chat, we will ask you to authorize your camera, photo, microphone. If you refuse, you will not be able to use this feature, but it will not affect the normal use of other features.
b. Interactive Communication
When you add contacts by using the Phone Book, Receipt Address feature, we will request contacts permission and encrypt the information in the address book with an encryption algorithm. Contacts information is sensitive personal information, if you refuse to provide,it will only prevent you from using the Quick Add feature, use of other features on Leefine would not affect.
1.6 Safe Operation
1.6.1 Security Features
We are committed to providing you a safe, trusted product and environment,and providing quality and reliable service,and it is our core goal. Information collected to achieve security features is essential.
1.6.2 Device Information and Log Information
a. To keep your software and services running securely, we collect your hardware model, operating system version number, international mobile device identification number, unique device identifier, network device hardware address, IP address, WI-FI access point, base station, software version number, network access method, type, status, network quality data, operation, Use, service logs.
b. To prevent malicious programs and secure operations, we collect installed application information or process information that is running, the overall operation of the application, usage and frequency, application crashes, overall installation usage, performance data, application sources.
c. We may use your account information, device information, service log information, and information that our affiliates and partners may use to determine account security, authenticate, detect, and prevent security incidents when you are authorized or legally available to you.
1.7 Changes in the Purpose of Collecting and Using Personal Information
Please be aware that as our business grows, changes may be made to the functionality and services provided by us. In principle, when new features or services are relevant to the features or services we currently provide, the personal information collected and used will be directly or reasonably related to the original processing purpose. We collect and use your personal information in a situation where there is no direct or reasonable association with the original processing purpose, and we will inform you again and re-obtain your consent.
1.8 Exemption From Obtaining Consent To Collect and Use Personal Information
Please understand that in accordance with laws and regulations and relevant national standards,we collect and use your personal information without your authorization in the following cases :
a. Those Directly related to national security, national defense security;
b. Those Directly related to public safety, public health, and major public interests;
c. Those Directly related to criminal investigation, prosecution, trial and enforcement of sentences;
d. Those For the purpose of safeguarding the personal information subject or other personal life, property and other important legal rights and interests which is difficult to obtain an individual's consent;
e. Those The personal information we collect is that you disclose to the public by yourself;
f. Those Personal information collected from legally publicly disclosed information, such as legitimate news reports, government information disclosure, etc.;
g. Those Necessary to enter or perform a contract according to your request.;
h. hose Necessary to maintain the safe and stable operation of the software and related services, such as the detection, disposal of software and related service failures;
i. Those Necessary for legal news reporting;
j. Those Academic research institutions need to carry out statistical research or academic research based on the public interest, and De-identifying the personal information contained in the results when the results of academic research or description are provided to the outside world;
k. Those Other situations as required by laws and regulations.
Please remind that if the information cannot be personally identified individually or in conjunction with other information, it does not belong to your personal information in the legal; When it can or we will be able to use data that cannot be linked to any particular personal information in conjunction with other personal information,It will be processed and protected as your personal information in accordance with this Policy during we combined these information.
2. Where we store and how long we keep your information
2.1 International Transfers of Your Personal Data
Where permitted by law, we may transfer some of your personal information within Leefine (including to subsidiaries, affiliates and parent companies) and may transfer it to our servers (in other countries (such as Indonesia, Singapore) and accessed from China by us.
Please note that some countries have privacy laws that are not equivalent to privacy laws in your own country. In such countries, Leefine will still handle information in the manner we describe here and will take such measures as are necessary to comply with applicable data protection laws when transferring and processing your information.
We will ensure that your personal information is adequately protected through anonymity, encrypted storage, and other methods.
We will store your personal information only within the period necessary for the purpose of these policies and within the time limit required by laws and regulations.
If we stop to operate products or services, we will stop our activities to continue collecting your personal information in a timely manner, and send you a notice on the cessation on a case-by-case basis or in the form of announcement, and we will delete or anonymize the personal information we store.
3.Additional information for permission to use
This is a summary description of the permissions that might be used by Leefine related features.
3.1 Address Book Permissions
Features that use this permission: phone book, shipping address contact import function.
3.2 Call Permissions
Features that use this permission: call function.
3.3 location Permissions
Features that use this permission: map function, personal center profile settings function.
3.4 Camera Permissions
Features that use this permission: Scan QR code function, audio and video call function, personal center profile settings function, device user information settings function.
3.5 Album Permissions
Features that use this permission: Remote photo function, WeChat (send photos) function, Screen saver settings function,personal center profile settings function, device user information settings function.
3.6 Microphone Permissions
Features that use this permission: voice reminder function, WeChat function, video call function.
You can authorize us to obtain the public information registered on the third-party platform (such as avatar, nickname and other information authorized by you) and bind it to your Leefine account, so that you can directly log in and use our services. We will use your personal information on the premise of complying with relevant laws and regulations after confirming the legality of the source of personal information in accordance with the agreement with the third party. Your information will not be sold, rented or exchanged with anything. You can also log in to the third-party platform to delete authorization information.
In order to provide you a better experience, we would access high-quality third parties. And we will carefully evaluate the purpose of the use of shared information by related parties and third parties, conduct a comprehensive assessment of the security from them, and require them to comply with the Cooperative Legal Agreement. We will conduct strict security monitoring on software tool that partners obtain information,like software development kits (SDK), application program interfaces (API) , to protect data security. And sharing your personal information with our affiliates and third parties through your authorization and consent, unless the shared personal information is de-identified information, and the natural person subject who shared the third party cannot re-identify such information. If related parties and third parties use it beyond the scope of the original authorized consent, they need to re-obtain your consent.
5.1 Google Map(SDK)
Permissions are required as follows:
Get location permissions
Read phone map
Change network status (e.g.whether you can access the network); Access to network;
Write external storage; device;
Obtain network status;
Obtain WI-FI status;
5.2 Google log in(SDK)
Get Google avatar, nickname, etc. use Google account to login APP
5.3 FaceBook log in (SDK)
Get Google avatar, nickname, etc. use Google account to login APP
5.4 Push System (SDK)
Permissions are required as follows:
a. Access to network;
b. Write external storage devices ;
c. Obtain network status ;
d. Obtain WI-FI status ;
e. Read your phone's current status ;
f. Installation ;
g.Obtaining task information;
5.5 Video Call (SDK)
Permissions are required as follows:
a. Open camera device;
b. Change network status (e.g. whether you can access the network );
c. Modify sound settings;
d. Recording;
e. Access to network ;
f. Write external storage device;
g. Obtain network status ;
h. Obtain WI-FI status ;
i. Read your phone's current status;
j. Read external storage devices ;
k.Wake lock
6.1 Sharing
6.1.1 sharing principles
a. agreement: Sharing your personal information with our affiliates and third parties through your authorization and consent, unless the shared personal information is De-identified information, and the natural person subject who shared the third party cannot re-identify such information. If they use information beyond the scope of the original authorized consent, they need to receive your consent again.
b. Principles of Safety and Prudence: We will carefully evaluate the purpose of the use of shared information by related parties and third parties, conduct a comprehensive assessment of the security from them, and require them to comply with the Cooperative Legal Agreement. We will also conduct strict security monitoring on software tool that partners obtain information,like software development kits (SDK), application program interfaces (API) to protect data security.
6.1.2 Shared Information for Function or Service Implemented
Location services: When you use location related services, we share GPS information with our location service provider (AutoNavi) so that we can return location results to you. GPS information is sensitive personal information, if you refuse to provide, it only affect the location service, other functions still work.
6.1.3 Shared Information for Security and Analytics
6.1.4 Marketing and Promoting
When you participate in relevant marketing activities organized by us and our affiliates or third parties, you may be required to provide information such as your name, address, contact details, etc. This information is sensitive to personal information and if you refuse,it may affect your participation in related activities, but other features still work. Only with your consent will we share this information with a related party or third party to ensure that you receive a consistent experience in activities or to entrust a third party to redeem your reward in time.
6.2 Transfer
a. We will not transfer your personal information to any other third party without your expressly consent.
b. As our business grows, we will be able to conduct mergers, acquisitions, asset transfers, and your personal information may be transferred. In the event of the above changes, we will continue to protect your personal information in accordance with laws and regulations and security standards not lower than those set in this Policy, otherwise we will require the recipient to re-obtain your authorization and consent.6.3 Disclosure
a. We will not disclose your information publicly unless we comply with national laws and regulations or receive your consent. If we do,we will use security measures that comply with industry standards.b. We will disclose relevant account information when we announce penalties for illegal account and fraud.
6.4 Exemption From Obtaining Consent To Share,Transfer, Publicly Disclose of Personal Information
Please understand that in the following cases, we can share, transfer and publicly disclose your personal information without your authorization in accordance with laws, regulations and national standards:
a. Those Directly related to national security, national defense security;
b. Those Directly related to public safety, public health, and major public interests;
c. Those Directly related to criminal investigation, prosecution, trial and enforcement of sentences;
d. Those For the purpose of safeguarding you or other personal life, property and other important legal rights and interests which is difficult to obtain an individual's consent;
e. Those Personal information that you disclose to the public;
f.Those Collect personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels.
7. How we protect the security of personal information
a. We take the security of your personal information seriously and will strive to take reasonable security measures( both technical and administrative) to protect your personal information from improper use or unauthorized access, public disclosure, use, modification, damage, loss or disclosure of the personal information provided by you.
b. We will use encryption, anonymization and other reasonable and feasible means to protect your personal information with encryption technology no less than our industry peers, and use security mechanisms to protect your personal information from malicious attacks.
C. We will establish a professional security management system, data security processes to ensure the security of your personal information. We have a strict data usage and access system to ensure that only authorized personnel have access to your personal information and the data and technology are audited securely at the right time.
d. Despite the reasonable and effective measures described above and the standards required by the relevant legal requirements, please understand that it is impossible to ensure 100-percent-security of information at all times in the Internet industry, even if we do anything possible to strengthen security measures due to technical limitations and possible malicious means. Anyway,we will do our best to ensure the security of the personal information you provide to us.
e.You understand that the systems and communication networks you use to access our services may cause problems due to factors beyond our control. Therefore, we strongly recommend that you take positive measures to protect the security of your personal information, including but not limited to, using complex passwords, changing passwords periodically,not disclosing your account password and related personal information to others.
f. We develop contingency plans and will initiate it in the event of user information security incidents in an effort to prevent the impact and consequences of these security incidents from expanding. Once a user information security incident (leakage, loss) occurs, We will promptly inform you of the basic circumstances and possible impact of the security incident, the actions we have taken or will take, the proposals that you can take precautions and reduce risk, and the remedies you may remedy. We will inform you about the incident in push notifications, text messages, and related forms in time. When it is difficult to notify one by one, we will take a reasonable and effective way to make announcements. At the same time, we will also report the handling of user information security incidents in accordance with the requirements of relevant regulatory authorities.
g.Once you jump from our services to three parties for browsing or using other websites, services and content resources,we do not have the capacity or direct obligation to protect any personal information you submit on them,whether you log in, browse or use the software described above, or whether the website is based on links or guidance from Leefine.
H. The user information function in the APP only saves the user information you submit in the database of our server (domain name Leefine), and is not used for any commercial operation
You have the right to request the Leefine company to delete your personal information in the following circumstances:
a. We have collected your personal information without your express consent.You may contact us to request the deletion of your personal information through email: huojunhaoqinmi@gmail.com, and we will reply within 20 working days. When we delete your personal information from the server, we may not immediately delete the corresponding data from the backup system, but we will delete the information when the backup is updated.
9.Terms of use for minors
a. If you are a minor under the age of 18, you should read and agree this Policy under the supervision and guidance of your parent or other guardian before using our services.
b. We protect the personal information of minors according to the relevant laws and regulations of the State and will collect, use, store, share, transfer or disclose the personal information of minors only permitted by law, as expressly consented by parents or other guardians or if necessary to protect them. If we find that personal information of a minor has been collected without prior confirmation of Parental consent, we will try to delete it as soon as possible.c. If you are the guardian of a minor, and you have any questions about the personal information of the minor under your guardianship, please contact us through the contact information
|
Permission Name |
Permission description |
Use |
|
android.permission.INTERNET |
Link NetWork |
Network must have permission |
|
android.permission.VIBRATE |
vibrate |
video call.chat incoming hint |
|
android.permission.WRITE_EXTERNAL_STORAGE |
File read and save |
choose avatar picture and save APP crash file |
|
android.permission.ACCESS_NETWORK_STATE |
Network status monitoring and WiFi status and search |
Optimize network usage to avoid traffic overuse. |
|
android.permission.ACCESS_COARSE_LOCATION |
Location |
Google Maps display.When the watch is not bound, the watch is not uploaded, the historical position, and the security fence is set,The map moves to the user's location. |
|
android.permission.CAMERA |
Camera |
Used for camera scanning QR code, profile picture, photo, video call function acquisition |
|
android.permission.RECORD_AUDIO |
Record |
Used for recording and collection of micro chat and video call |
|
android.permission.WAKE_LOCK |
Screen Wake up |
Used to light up the screen video to electrolyze the lock |
|
android.permission.CALL_PHONE |
Call |
A telephony function for communicating with a device |
|
android.permission.MODIFY_AUDIO_SETTINGS |
volume control |
Used to control the volume of video calls |
|
android.permission.BLUETOOTH |
Bluetooth |
Bluetooth headset switching for video calling |
If you have complaints, suggestions, questions about personal information protection issues, you can follow Leefine Account (Log in APP—Setting--Feedback) and send the issue to customer service, we will promptly feedback your complaint and report after verifying your identity.