Privacy policy
This Software (Beagleprint) respects and protects the personal privacy rights of all users of the services. In order to provide you with more accurate and personalized services, the Software (Beagleprint) will use and disclose your personal information in accordance with the provisions of this Privacy Policy. However, the Software (Beagleprint) will treat this information with a high degree of diligence and prudence. Unless otherwise provided in this Privacy Policy, the Software will not disclose or provide such information to a third party without your prior permission. This Software will update this Privacy Policy from time to time. When you agree to this Software Service Use Agreement, you shall be deemed to have agreed to the whole content of this Privacy Policy. This Privacy Policy is an integral part of this Software Service Use Agreement.
Please note that we will examine our policies from time to time, and therefore the measures in question will change accordingly. We request you to visit this page regularly to ensure that we remain aware of the latest version of our Privacy Policy. After reading this policy, if you have any questions about this Privacy Policy, please contact us.
If you use or continue to use the services of the Company (Shenzhen Mintion Technology Co., Ltd), you agree that we collect and use your information in accordance with this Privacy Policy
1. Scope of application
A) When you use the software network service, the software automatically receives and records the information on your mobile phone, including but not limited to your used language, access date and time, hardware and software feature information and other data; <>
2. Use of the information
B) When you use our services, we may collect and aggregate information such as a user's mobile phone, such as recording the browser software of each user using the company's services.
3. Information disclosure
A) The Software will not disclose your information to untrusted third parties.
B) disclose to a third party or administrative or judicial organs in accordance with the relevant provisions of the law or the requirements of administrative or judicial organs;
C) If you violate the relevant laws, regulations or relevant rules, you need to disclose them to a third party;
4. Information security
A) Data security technical measures We will adopt security protection measures in line with industry standards, including the establishment of reasonable institutional norms and security technologies to prevent unauthorized access and modification of your information to avoid data
B) Other security measures we take to protect information We manage the storage and use of standardized information through the establishment of data classification and classification system, data security management norms, and data security development norms. We conduct comprehensive security control of the data through information contact confidentiality agreements, monitoring and audit mechanisms. Strengthen safety awareness. We will also hold security and privacy protection training courses to enhance employees' awareness of the importance of protecting information.
C) We only allow our employees and partners who are required to access your information and set up a strict access control and monitoring mechanism for this purpose. We also require all personnel who may have access to your information to perform their confidentiality obligations. Failure to fulfill these obligations may be held legally liable or suspended from their cooperation with the Company.
D) We will take all reasonable and feasible measures to ensure that no irrelevant information is collected.
E) The Internet is not an absolutely secure environment, and the communication methods between email, instant messaging, social software or other service software and other users cannot be completely encrypted. We suggest that you use complex passwords and pay attention to protect your information security.
F) The Internet environment is not 100% secure, and we will do our best to ensure or guarantee the security of any information you send to us. If our physical, technical, or management protection facilities are damaged, resulting in unauthorized access, public disclosure, tampering, or destruction, resulting in your legitimate rights and interests, we will bear the corresponding legal responsibility.
G) Handling of security incidents
In order to deal with the possible risks of information leakage, damage and loss, we have formulated a number of systems to clarify the classification and classification standards of security incidents and security loopholes and the corresponding processing procedures. We have also set up a special emergency response team for safety incidents. According to the requirements of safety incident handling norms, we start safety plans for different safety incidents, stop losses, analyze, locate, formulate remedial measures, and trace and strike with relevant departments.
After the unfortunate occurrence of an information security event, we will timely inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security event, the disposal measures we have taken or will take, suggestions that you can independently prevent and reduce risks, remedial measures for you, etc. At the same time, we will timely inform you of the relevant information of the event by email, letter, telephone, push notification, etc. When it is difficult to inform the information subject one by one, we will take a reasonable and effective way to issue an announcement. At the same time, we will also take the initiative to report the handling of information security incidents in accordance with the requirements of the regulatory authorities.
Please understand that due to the limitations of technology and risk prevention, even if we have tried to strengthen the security measures, the information is not always 100 percent safe.