Privacy Policy

This software (timebit clock) respects and protects the privacy of all users who use the service. This software will use and disclose your personal information in accordance with this Privacy Policy. However, this software will treat this information with a high degree of diligence and prudence. Except as otherwise provided in this Privacy Policy, our company will not disclose or provide this information to third parties without your prior permission. Our company will update this privacy policy from time to time. When you agree to this Software Service Use Agreement, you are deemed to have agreed to the entire content of this Privacy Policy. This privacy policy is an integral part of this software service usage agreement.

1. How we collect your personal information

Personal information refers to various information recorded electronically or in other ways that can identify a specific natural person alone or in combination with other information or reflect the activities of a specific natural person. When you use the APP service, in order to provide you with the basic functions and additional functions of our products and/or services, you may choose to authorize us to collect, store and use the following information about you. If you refuse to provide it, you will not be able to use the relevant additional functions normally or achieve the functional effects we intend to achieve, but it will not affect your normal use of the basic functions of our products and/or services. This information mainly includes:

1. Function optimization

We will collect information generated when you use the service, including: BSSID, cookies, mobile device model, mobile device system version, App version number, Internet service provider, network status, WIFI SSID, IP address, network card (MAC) ) address, device MAC address, software installation list, clipboard information. The above information you provide is only used for statistics on the usage of the App, immersion bar style settings, positioning error issues, and the need to continuously improve the stability, security, and user experience optimization of the App. This function does not affect all functions you use the App.

2. How we use your personal information

1. Providing services to you
(1) When we provide services, it is used for identity verification, customer service, security prevention, fraud monitoring, archiving and backup purposes to ensure the security of the products and services we provide to you;
(2) Help us design new services and improve our existing services through information data analysis;
(3) Evaluate the effectiveness of advertising and other promotions and promotional activities in our services and improve them;
(4) Software certification or management software upgrades;
(5) Let you participate in surveys about our products and services;
(6) Other situations where you authorize and agree to provide personal information.

2. After collecting your personal information, we will de-identify the data through technical means. The de-identified information will not be able to identify the subject. Please understand and agree that in this case we have the right to use de-identified information; and subject to relevant laws and regulations, we have the right to conduct an overall analysis and analysis of the user database including your personal information. use.

3. When we want to use the information for other purposes not specified in this policy, we will ask for your consent in advance.

4. You are fully aware that we do not need to obtain your authorization and consent to use personal information in the following situations:
(1) Related to national security and national defense security;
(2) Related to public security, public health, and major public interests;
(3) Related to criminal investigation, prosecution, trial and judgment execution;
(4) To protect the life, property and other major legitimate rights and interests of the personal information subject or other individuals but it is difficult to obtain the consent of the individual;
(5) Collected The personal information is disclosed to the public by the personal information subject on his own initiative;
(6) Your personal information is collected from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels;
(7) According to your Necessary to sign a contract;
(8) Necessary to maintain the safe and stable operation of the products and/or services provided, such as discovering and handling product and/or service failures;
(9) Necessary for legitimate news reports Necessary;
(10) It is necessary for academic research institutions to conduct statistical or academic research based on public interests, and when providing externally the results of academic research or descriptions, the personal information contained in the results is de-identified;
(11) Law Other circumstances specified by regulations.

3. How we use cookies and similar technologies

(1) Cookies To ensure the normal operation of the client, we will store small data files named Cookies on your computer or mobile device. Cookies usually contain an identifier, the site name, and some numbers and characters. With the help of cookies, client logins can get better services when they visit this platform again. We will not use Cookies for any purpose other than those stated in this policy. You can manage or delete cookies according to your preferences. You can clear all cookies saved on your computer or mobile device, and most web browsers have the function to block cookies. But if you do this, you will need to change the user settings yourself each time you visit our client.
(2) Other similar technologies Currently, we do not use other similar technologies except Cookies.

4. How we share, transfer and publicly disclose your personal information

(1) Sharing
We will not share your personal information with any company, organization or individual other than timebit clock, except in the following circumstances:
1. Sharing with explicit consent: After obtaining your explicit consent, we will share your personal information with Sharing of your personal information with other parties.
2. We may share your personal information externally in accordance with laws and regulations, or in accordance with the mandatory requirements of government authorities.
3. Sharing with our affiliated companies: Your personal information may be shared with our affiliated companies. We will only share necessary personal information and subject to the purposes stated in the user privacy policy. If affiliated companies want to change the purpose of processing personal information, they will ask for your authorization and consent again. Our affiliated companies include any companies, institutions, and legal successors of the above companies or institutions that timebit clock now or in the future controls, is controlled by, or is under common control with. "Control" refers to the ability to influence the management of the company mentioned, directly or indirectly, whether through ownership, voting shares, contracts or other means determined by the People's Court.
4. Sharing with authorized partners: Only to achieve the purpose stated in this policy, some of our services will be provided by authorized partners. With your explicit consent, we may share some of your personal information with our partners to provide better customer service and user experience. For example, when you purchase goods or order business through our client, we must share your personal information with logistics service providers to arrange delivery, or arrange for partners to provide services. We will only share your personal information for legal, legitimate, necessary, specific and clear purposes, and will only share the personal information necessary to provide services. Our partners have no right to use the shared personal information for any other purpose.
Currently, our authorized partners include the following three types:
A. Suppliers, service providers and other partners. We send information to our vendors, service providers and other partners around the world who support our business, including providing technical infrastructure services, analyzing how our services are used, measuring the effectiveness of our advertising and services, providing customer Services, payment facilitation or conducting academic research and surveys.
B. Third-party merchants. We must share your order information and necessary transaction-related information with third-party merchants to fulfill your need to purchase goods or services from them and enable them to complete subsequent after-sales services.
(2) Transfer
We will not transfer your personal information to any company, organization or individual, except in the following circumstances:
1. Transfer with explicit consent: After obtaining your explicit consent, we will transfer it to other parties Your personal information;
2. When a merger, acquisition or bankruptcy liquidation is involved, if personal information is transferred, we will require the new company or organization that holds your personal information to continue to be bound by this user privacy policy, otherwise we will The company or organization will be required to seek authorization from you again.
(3) Public Disclosure
We will only publicly disclose your personal information under the following circumstances:
1. After obtaining your explicit consent;
2. Disclosure based on law: when required by law, legal proceedings, litigation or when required by the competent government authorities. Under circumstances, we may publicly disclose your personal information.

5. How we store your personal information

(1) Storage location
In accordance with laws and regulations, your personal information will only be stored locally on your mobile phone and will not be uploaded to a remote server. Currently, we will not transfer the above information overseas. If we transfer it overseas, we will comply with relevant national regulations or seek your consent.
(2) Storage period
We only retain your personal information for the period necessary for the purpose of providing timebit clock and services. After exceeding the necessary period, we will delete or anonymize your personal information, unless otherwise provided by laws and regulations.

6. How we protect your personal information

(1) We will strictly abide by the "Cyber ​​Security Law", "Decision of the Standing Committee of the National People's Congress on Strengthening Network Information Protection", and "Regulations on the Protection of Personal Information of Telecommunications and Internet Users" (Ministry of Industry and Information Technology Order No. 24) , "Telephone Users' Real Identity Information Registration Regulations" (Ministry of Industry and Information Technology Order No. 25) and other relevant requirements of laws and regulations, establish an information security system, and take technical measures and other necessary measures to protect the security of your personal information.
(2) We will only retain your personal information for the period necessary to achieve the purposes stated in this policy, unless the retention period needs to be extended or permitted by law.
(3) Please understand: The Internet environment is not 100% safe. We will try our best to ensure or guarantee the security of any information you send us. However, due to technical limitations and various possible malicious means, even if we do our best to enhance security measures, it is impossible to always guarantee 100% information security. After an unfortunate personal information security incident occurs, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, and the steps you can take to prevent and reduce risks on your own. Suggestions, remedies for you, etc. We will promptly notify you of the incident-related information by email, letter, phone, etc. When it is difficult to inform the personal information subjects one by one, we will issue announcements in a reasonable and effective manner. At the same time, we will also proactively report the handling of personal information security incidents in accordance with the requirements of regulatory authorities.

7. How we process personal information of minors

1. We attach great importance to the protection of minors’ personal information. If you are a minor under the age of 18, you should obtain the written consent of your parent or legal guardian before using our services. We will protect the personal information of minors in accordance with relevant national laws and regulations.
2. For the collection of personal information of minors with the consent of parents or legal guardians, we will only use or publicly disclose this information when permitted by law, with the explicit consent of parents or guardians, or when necessary to protect minors.
3. If we find that we have collected personal information from minors without prior consent from verifiable parents or legal guardians, we will try to delete the relevant data as soon as possible.

8. How to update this policy

Our user privacy policy is subject to change.
We will not reduce your rights under the User Privacy Policy without your explicit consent. We will post any changes to this policy in the form of a notice. In this case, if you continue to use our services, you agree to be bound by the revised Privacy Policy.

9. How do you manage your personal information?

In accordance with the requirements of China's "Network Security Law", "Provisions on the Protection of Personal Information of Internet Users" and other laws, regulations and rules, as well as with reference to common practices in other countries and regions, we attach great importance to your independent control over personal information and take multiple measures. It is guaranteed that you can exercise the following rights over your personal information:
1. Access your personal information: You have the right to access your personal information, except for exceptions provided by laws and regulations. You can query and edit your personal information in the account setting center by logging in to your registered account. If you are unable to manage this personal information through the above methods, you can contact us at [284956732@qq.com].
2. Correct your personal information:
When you find that there is an error in the personal information we process about you, you have the right to correct or update the incorrect or incomplete information. If you are unable to operate independently in the account center, you can go through [ 284956732@qq.com] Contact us.
3. Delete your personal information:
Under the following circumstances, you can make a request to us to delete your personal information through [284956732@qq.com]: Our processing of your personal information violates mandatory provisions of laws, regulations, etc.; We The collection and processing of your personal information does not require your consent; the collection and processing of your personal information by us violates the agreement with you; one of our products and services ceases operation and will no longer be provided to you; you no longer use it If you are interested in our products and services, choose to log out of your account.
4. Withdraw your authorization:
If you want to withdraw the permissions you have agreed to, you can set the withdrawal setting in the mobile phone system Settings - Application Management - Permissions. However, please understand and agree that when you withdraw certain authorizations, the related product functions will be unavailable, and we will be unable to continue to provide you with the specific functions and/or services corresponding to the withdrawal of consent or authorization, and you withdraw your authorization. The decision will not affect the previous processing of personal information based on your authorization.

10. Application permissions

(1) "android.permission.ACCESS_NETWORK_STATE"
permission description: View network status
Existence description: APP needs to be connected to the Internet to determine whether it is currently in a network environment
(2) "android.permission.ACCESS_WIFI_STATE"
permission description: View WLAN status
Existence description: APP Use requires high-quality network status to determine the current network signal
(3) "android.permission.INTERNET"
Permission description: Access the network
Existence description: User update data needs to be updated when there is a network
(4) "android.permission.WRITE_EXTERNAL_STORAGE" and "android.permission.MANAGE_EXTERNAL_STORAGE"
permission description: modify/delete the contents of the SD card.
Existence description: This permission needs to be requested when the App is upgrading the version and making statistics on Umeng; you can also turn off or withdraw the corresponding function at any time.
(5) "android.permission.SCHEDULE_EXACT_ALARM" and "android.permission.USE_EXACT_ALARM"
permission description: Alarm clock precise reminder notification permission
Existence description: Android 12+ alarm clock setting time system triggers precise notification permission function.
(6) "android.permission.READ_EXTERNAL_STORAGE"
Permission description: Read the contents of the SD card
Existence description : This permission needs to be requested when the App is upgrading its version and making statistics on Umeng; you can also turn off or withdraw the corresponding function at any time.
(7) "android.permission.WAKE_LOCK"
permission description: wake lock
existence description: used to load and display video type advertisements.
(8) "android.permission.WRITE_SETTINGS"
permission description: Read and write system settings
Existence description: This permission is required to set mobile phone ringtones
(9) "android.permission.ACCESS_COARSE_LOCATION"
permission description: Rough positioning permission
Existence description: The compass module displays longitude and latitude, Location information requires this permission, and you can also turn off or withdraw the corresponding function at any time.
(10) "android.permission.VIBRATE"
permission description: Control the vibrator
Existence description: Alarm clock, vibration reminder at the end of timer, you can also turn off or withdraw the corresponding functions at any time.
(11) "android.permission.READ_PHONE_STATE"
permission description: Phone state permission
Existence description: Used to recommend and display video-type ads more accurately.
(12) "android.permission.SYSTEM_ALERT_WINDOW"
permission description: system pop-up window permission
Existence description: used for alarm reminder pop-up window display.
(13) "android.permission.ACCESS_NOTIFICATION_POLICY"
permission description: System Do Not Disturb permission
Existence description: Used for the alarm reminder task 'Mobile Sound Mode' additional action, empowered when setting.
(14) "android.permission.RECEIVE_BOOT_COMPLETED"
permission description: Self-starting monitoring permission at boot
. Existence description: Used for initialization processing of the alarm after the phone restarts.
(15) "android.permission.READ_INTERNAL_STORAGE"
permission description: read the contents of the SD card.
Existence description: used for operations such as reading ringtone files in the mobile phone system.
(16) "android.permission.ACCESS_FINE_LOCATION"
permission description: Precise positioning permission
Existence description: This permission is required for the compass module to display longitude, latitude, altitude, and location information. You can also turn off or withdraw the corresponding functions at any time.

11. How to contact us

If you have any questions, comments, suggestions or complaints about this policy or service content, you can contact us in the following ways: Please send an email to the person in charge of information protection: 284956732@qq.com We will review the issues involved as soon as possible and After verifying your user identity, we will respond to you within fifteen days.

Effective time: 2024.02.01
Update time: 2044.12.15