Effective date: Jan 31th, 2024.

This policy explains how we collect, use, store and share personal information when you use our products or services, and what your rights are. rights, and other matters.

This policy will help you understand the following:

1. How we collect and use your personal information

2. How we use cookies and similar technologies

3. How we share, transfer, and publicly disclose your personal information

4. How we protect your personal information

5. Your rights

6. How we handle minors' personal information

7. How your personal information is transferred globally

8. How this Privacy Policy is updated

I realize how important your personal information is to you and I will do my best to keep your personal information safe and secure. We are committed to maintaining your trust in us and to protecting your personal information by adhering to the following principles: the principle of consistency of rights and responsibilities, the principle of clarity of purpose, the principle of opt-in consent, the principle of minimum sufficiency, the principle of ensuring security, the principle of participation of the subject, the principle of openness and transparency, etc. I am also committed to protecting your personal information in accordance with this Privacy Policy. At the same time, I promise that we will take appropriate security measures to protect your personal information in accordance with the industry's mature security standards.

Please read and understand this Privacy Policy carefully before using our products (or services).

1. How we collect and use your personal information

1.1 How we collect your information

1.1.1 Provide you with a product or service

1) During your use of the Software, we will obtain local music information from you in order to prevent the screen cast connection from completely exiting when you exit the Software. Even so, we will not collect any of your local music information.

2) Information You Provide to Us

We collect information about your use of our products, services, and usage patterns and correlate this information to enhance our services, including:

A. Device Information: We receive and record information about the device you are using (e.g., device model, operating system version, device settings, hardware and software characteristics such as unique device identifiers, etc.), the location of the device (e.g., IP address, MAC address, GPS location, and sensor information such as Wi-Fi, Bluetooth, and base station information, etc.), based on specific permissions granted by you during software installation and use. access point, Bluetooth, base station and other sensor information.

B. Log Information: When you use products or services provided by our website or clients, we automatically collect details of your use of our services and save them as relevant web logs.

Please note that separate device information, log information, etc. is information that does not identify a specific natural person. If we combine such non-personal information with other information for the purpose of identifying a specific natural person or use it in combination with personal information, such non-personal information will be treated as personal information during the period of combination, and we will anonymize and de-identify such personal information, unless we have obtained your authorization or as otherwise provided for by laws and regulations.

C. When you contact us, we may save your communication/call records and contents generated within the application or the contact information you left, etc., in order to contact you or help you solve the problem, or record the solution and result of the related problems.

1.1.2 To provide you with security

We may collect or integrate your User Information, Service Usage Information, Device Information, Log Information, and information that we have obtained your authorization to share or that we are legally required to share, in order to prevent, detect, and investigate fraud, copyright infringement, security breaches, illegality, or violations of our agreements, policies, or rules.

1.1.3 Other Uses

We will ask for your prior consent when we will collect your information for other specific purposes not set out in this policy.

If we cease (1.2) How we use your information to operate our products or services, we will cease activities that continue to collect your personal information, notify you of the cessation of operations by way of individual delivery or announcement, and delete or anonymize the personal information held.

1.2 How we use your information

Your information is collected in order to provide you with services and to improve the quality of those services. In order to fulfill this purpose, we will use your information for the following purposes:

1) To provide you with our products or services that you use, and to maintain, improve, and optimize these services and the service experience.

2) To prevent, detect, and investigate fraud, infringement, endangerment of security, illegal or violation of our agreements, policies or rules, and to protect the legitimate rights and interests of you, other users or the public, and us, we may use or integrate your user information, service usage information, device information, log information, and information that we have obtained your authorization to share or share in accordance with the law, in order to comprehensively detect and prevent security incidents, and in accordance with the law We may use or integrate your user information, service usage information, device information, log information, and information that we have obtained your authorization or shared in accordance with the law, to comprehensively detect and prevent security incidents, and to take the necessary recording, auditing, analyzing, and disposing measures.

3) Other uses as authorized by you.

2. How we use cookies and similar technologies

We offer products or services that do not use cookies and similar technologies.

3. How we share, transfer, and publicly disclose your information

3.1 Sharing

We do not share your personal information with companies, organizations and individuals outside of our service providers, except in the following circumstances:

1) Sharing with explicit consent: We will share your personal information with other parties after obtaining your explicit consent.

2) Sharing under legal circumstances: We may share your personal information in accordance with the provisions of laws and regulations, the need for litigation dispute resolution, or at the request of administrative or judicial authorities in accordance with the law.

3) When you are complained about infringement of intellectual property rights or other legal rights by others, it is necessary to disclose your necessary information to the complainant in order to process the complaint.

3.2 Transfers

We will not transfer your personal information to any company, organization or individual, except in the following cases:

1) Transfer with explicit consent: We will transfer your personal information to other parties after obtaining your explicit consent.

2) In the event of a merger, acquisition, or bankruptcy and liquidation of us, or other situations involving mergers, acquisitions, or bankruptcy and liquidation of us, if there is a transfer of personal information involved, we will require the new company or organization holding your personal information to continue to be bound by this policy, or we will require that company, organization, and individual to seek authorization from you again for consent.

3.3 Public Disclosure

We will publicly disclose your personal information only under the following circumstances:

1) With your explicit consent;

2) If we determine that you have violated laws and regulations or seriously violated the rules of the service or product-related agreements, or to protect myself or the public from infringement of personal and property safety, we may disclose personal information about you with your consent in accordance with the laws and regulations or the rules of the service or product-related agreements, including the relevant violation of the law and the measures that I have taken against you.

3.4 Exceptions to obtaining prior authorized consent to share, transfer, or publicly disclose personal information

In the following cases, sharing, transferring, or publicly disclosing your personal information does not require prior authorized consent:

1) Related to national security, national defense security;

2) Related to public safety, public health, and significant public interests;

3) Related to crime investigation, prosecution, trial and judgment execution;

4) For the purpose of safeguarding your or other individuals' life, property and other significant legitimate rights and interests, but it is difficult to obtain my consent;

5) Personal information that you disclose to the public on your own;

6) Personal information collected from legitimate publicly disclosed information, such as legitimate news reports, government information disclosure and other channels;

7) Other cases stipulated by laws and regulations.

According to laws and regulations, the sharing and transfer of personal information processed by de-identification and ensuring that the recipient of the data is unable to recover and re-identify the subject of the personal information does not fall under the act of sharing, transferring and publicly disclosing personal information externally, and the preservation and processing of such data will be carried out without separate notification to you and your consent.

4. How we protect your information

4.1 Retention Period

During your use of our products and services, we will continue to store your personal information for you. If you voluntarily delete the above information, we will keep your information in accordance with the Cybersecurity Act and other laws and regulations. After you voluntarily delete the above information, we will not use your personal information commercially, but we may use your personal information after anonymizing it.

4.2 Protection

Your personal information is stored in the People's Republic of China. If some of our products or services involve cross-border and we need to transfer your personal information outside of China, we will strictly follow the laws and regulations and ensure the security of your personal information.

4.3 Security Measure

1.) We take precautions to protect your personal information from unauthorized access, public disclosure, use, modification, damage or loss. We use encryption technology to ensure data confidentiality; we use trusted protection mechanisms to prevent malicious attacks on data; and we deploy access control mechanisms to ensure that only authorized personnel have access to personal information. We will enhance employee awareness of the importance of protecting personal information.

2) At present, we have obtained the following certifications: GB/T29490-2013 system certification, ISO20000 certification, ISO27001 certification.

3) We will take reasonably practicable steps to avoid collecting irrelevant personal information. We will only retain your personal information for as long as is necessary to fulfill the purposes set out in this policy, unless we need to extend the retention period or are permitted to do so by law.

4.4 The Internet environment is not 100% secure, and although we have these security measures in place, please note that there is no such thing as "perfect security" on the Internet, and we will do our best to ensure the security of your information.

1) The Internet is not an absolutely secure environment, and since e-mail and instant messaging are not encrypted, we strongly recommend that you do not send personal information through such means. Please use complex passwords to help us keep your account secure.

2) In the unfortunate event of personal information security, we will, in accordance with the requirements of laws and regulations, promptly inform you of: the basic situation of the security incident and the possible impact, the measures we have taken or will take to deal with the situation, the suggestions you can independently prevent and reduce the risk, and the remedial measures for you, etc. We will promptly inform you of the situation related to the incident in a timely manner. We will promptly inform you of the situation related to the incident by email, letter, phone call, push notification, etc. When it is difficult to inform the subject of personal information one by one, we will take a reasonable and effective way to make a public announcement.

At the same time, we will also take the initiative to report the disposition of personal information security incidents in accordance with the requirements of the regulatory authorities.

5. Your Rights

In accordance with the relevant laws, regulations and standards of China, as well as the common practice of other countries and regions, we guarantee that you will exercise the following rights with respect to your personal information:

5.1 Access to your personal information

You have the right to access your personal information, subject to the exceptions provided for in laws and regulations.

5.2 Correction of your personal information

When you become aware of an error in the personal information we process about you, you have the right to ask us to make a correction. You can notify us by phone or e-mail. We will respond to your request for correction within fifteen working days. For security reasons, we will verify your identity before you exercise your right to correct your information.

5.3 Delete your personal information

In the following cases, you may make a request to us to delete your personal information:

1) If our handling of personal information violates laws and regulations;

2) If we collect and use your personal information without obtaining your consent;

3) If our behavior of handling personal information violates the agreement with you;

4) If we no longer provide products or services to you.

If we decide to respond to your request for deletion, we will also simultaneously notify the entities that obtained your personal information from us and ask them to delete it in a timely manner, unless otherwise required by law or regulation, or if those entities have been independently authorized by you.

When you delete information from our Services, we may not immediately delete the corresponding information in our backup systems, but may delete or anonymize the information when the backups are updated.

5.4 Changing the scope of your authorized consent

Each business function requires some basic personal information in order to be completed. For the collection and use of additional personal information, you can give or withdraw your authorized consent at any time.

When you withdraw your consent, we will no longer process the corresponding personal information. However, your decision to withdraw your consent will not affect the processing of personal information previously carried out on the basis of your authorization.

5.5 Automated decision-making in constraint information systems

In certain business functions, we may make decisions based solely on non-human, automated decision-making mechanisms, including information systems, algorithms, and the like. If these decisions significantly affect your legitimate interests, you have the right to an explanation and we will provide appropriate remedies.

5.6 Responding to your request above

For security purposes, you may be required to provide a written request or otherwise prove your identity. We may ask you to verify your identity before processing your request. We will respond within fifteen working days.

For your reasonable requests, we do not charge a fee in principle, but for requests that are repeated several times and exceed reasonable limits, we will charge a fee for certain costs as appropriate. We may deny requests that are unnecessarily repetitive, require excessive technical means (e.g., requiring the development of a new system or a fundamental change in existing practices), pose a risk to the legal rights of others, or are highly impractical (e.g., involving the backing up of information stored on magnetic tapes).

In the following cases, as required by law or regulation, we will not be able to respond to your request:

1) Those directly related to national security and national defense security;

2) directly related to public safety, public health, and major public interests;

3) directly related to crime investigation, prosecution, trial and judgment execution;

4) there is sufficient evidence that you have subjective malice or abuse of rights;

5) responding to your request will lead to serious damage to your legitimate rights and interests or those of other individuals or organizations;

6) involving trade secrets.

6. Minors' protection

Our products, websites and services are primarily intended for adults. Minors may not create their own user accounts without the consent of a parent or guardian.

Although local laws and customs define minors differently, we consider anyone under the age of 18 to be a minor.

If we become aware that we have collected personal information from a minor without first obtaining verifiable parental consent, we will attempt to delete the data as quickly as possible.

7. How your personal information is transferred globally

In principle, the personal information we collect and generate in the People's Republic of China will be stored in the People's Republic of China.

Because we provide products or services through resources and servers located around the world, this means that, with your authorized consent, your personal information may be transferred to, or accessed from, jurisdictions outside the country where you use the product or service.

Such jurisdictions may have different data protection laws or may not even have such laws in place. In such cases, we will ensure that your Personal Information receives sufficiently equivalent protection within the People's Republic of China. For example, we may request your consent for cross-border transfers of personal information or implement security measures such as data de-identification prior to cross-border data transfers.

8. How this policy will be updated

Our privacy policy is subject to change.

We will not reduce your rights under this Privacy Policy without your express consent. We will post any changes to this policy on this page.

We will also provide more prominent notice of material changes (including, for certain services, by sending a notice via e-mail stating the specific changes to the Privacy Policy).

Significant changes referred to in this policy include, but are not limited to:

1) Significant changes in our service model. For example, the purpose of processing personal information, the type of personal information processed, and how personal information is used;

2) We experience significant changes in our ownership structure, organizational structure, etc. Such as changes in ownership caused by business adjustments, bankruptcy and mergers and acquisitions;

3) Changes in the main targets of sharing, transferring or publicly disclosing personal information;

4) Significant changes in your right to participate in the handling of personal information and how it is exercised;

5) Changes in the department responsible for handling the security of personal information, contact information and complaint channels;

6) When the security impact assessment report of personal information indicates that there is a high risk.