Date of this version : 2023-11-1

Effective date: 2023 -11 - 1

" Myfit Pro APP" (referred to as " Myfit Pro ") is a mobile application software with functions such as Bluetooth device data reporting, management, health reminders, etc., developed by Guangdong Welland Technology Co., Ltd. (referred to as "we" or "Guangdong Welland") supply.

Myfit Pro attaches great importance to the protection of your personal information and will do its best to protect the security of your personal information. This policy applies to products or services provided by us and our affiliates, except where a separate privacy policy is established for the provision of specific products or services. It should be noted that this policy does not apply to services or products provided to you by other third parties.

the information you provide to us through Myfit Pro when you use our products and services . If we ask you to provide certain information in order to verify your identity when using Myfit Pro products and services, we will use this information in strict compliance with this Privacy Policy and/or the terms and conditions of our User Agreement, and we are committed to complying with relevant laws and regulations to protect the confidentiality and security of your personal information.

[Special Tip] Before using " Myfit Pro ", please be sure to read and thoroughly understand this Privacy Policy, especially the content marked by bold underline, and make sure you understand our rules for processing your personal information. After you confirm that you fully understand and agree before starting to use Myfit Pro related services or products. You can indicate that you have read and accepted all the terms stated in this Privacy Policy by clicking to confirm your acceptance of this Privacy Policy or by using Myfit Pro products/services or other operations that are in compliance with the law and recognized by Guangdong Welland, including our regular or Any changes made from time to time. During the reading process, if you have any questions, you can contact Guangdong Welland’s customer service for consultation. If you do not agree with any terms in this privacy policy or after the change, you should immediately stop accessing or using Myfit Pro ’s products or services.

When you log in (including logging in via email account/WeChat account/QQ account/Weibo account/Apple ID account), you need to click to agree to this privacy policy. Please make sure you read and understand the content of the privacy policy and click the check mark. Select Agree to log in.

view the contents of this Privacy Policy at any time by clicking "My" - "System Settings" - "Privacy Policy" on the login page or after entering Myfit Pro .

This policy contains the following content:

1. How we collect and use your personal information

2. How we store and protect your personal information

3. How we share, transfer and publicly disclose your personal information

4. How you manage your personal information (your rights)

5. How we process personal information of minors

6. How to update this policy

7. How to contact us

1. How we collect and use your personal information

(1) Account acquisition and use

Myfit Pro account: When you confirm that you agree to the Privacy Policy and log in for the first time using your email/Apple ID, it will be automatically registered, and we will assign you an Myfit Pro account. If you log in using an account other than your own, you guarantee that you have obtained the authorization and consent of the relevant account owner and confirm that the account complies with our Privacy Policy. You can further edit your account information so that we can provide you with better services and experience.

Myfit Pro account usage: When you log in to your Myfit Pro account, you can use the related functions and/or services provided by Myfit Pro based on the account you logged in to. In order for you to better use the corresponding functions and/or services, we need or may need you to further ask you to provide corresponding information when using specific functions and/or services.

(2) Related definitions

Personal information: refers to various information recorded electronically or in other ways that can identify a specific natural person alone or combined with other information or reflect the activities of a specific natural person.

Sensitive personal information: refers to individuals that include identity document numbers, personal biometric information, bank account numbers, communication records and content, property information, whereabouts, transaction information, etc., and are closely related to citizens’ dignity and personal and property security. Information, as well as the personal information of children under the age of 14 (we will prominently identify specific sensitive personal information in this privacy policy with bold underline).

Anonymization: refers to the process of technical processing of personal information so that the subject of personal information cannot be identified or associated, and the processed information cannot be restored.

OpenId: refers to an ID that is not associated with any account information or user information and is generated by the third-party entity in order to protect user account information from being leaked when using a third-party login. This ID is our unique identifier for third-party login.

Token: Same as OpenId.

De-identification: refers to the process of technical processing of personal information so that the subject of personal information cannot be identified or associated without the use of additional information.

Information that cannot be used to identify a specific individual after technical processing (including anonymization or de-identification) of personal information is not considered personal information.

(3) What personal information we will collect from you

When you use Myfit Pro products or services, we need/may need to collect and use your personal information. If you refuse to provide the corresponding information, you will not be able to use our products and/or services normally, or the related products and/or services will not be able to achieve the expected results. In order to better protect your use of relevant products and/or services, Myfit Pro will follow the principles of "legal, legitimate and necessary" and collect and use your personal information in accordance with laws and regulations, mainly including:

(4) What personal information we will collect from you

1. Information you provide or upload

1.1 You need to log in to obtain an Myfit Pro account to access certain functions or services. When you log in to your Myfit Pro account, you need to provide us with your email account/Apple OpenId . When you log in to Myfit Pro and complete your account personal information, you need to provide us with information such as your avatar, nickname, gender, birthday, height, whether you are an athlete, and your target weight.

1.2 After you purchase a device that uses us and our certified partners, you can enjoy the device interconnection experience in Myfit Pro . You also authorize us to have the right to interact with your confirmed interconnected device for data (including connection feedback, in the background Get the user's device MAC information in the status ). For business development needs, we only retain device information actively reported by the device , including device MAC, device name, and device type.

1.3 When you use the Fitbit data synchronization function, we provide you with services based on the capabilities of a third-party service platform, which will jump to Fitbit's authorization page. We are unable to obtain any information you input to the authorization page. This page is provided by Fitbit. supply. After you authorize it, Fitbit will provide us with OpenId and Token, and we will synchronize your weight and body fat percentage information to the Fitbit service platform in order to provide you with this service. If the authorization page refuses authorization, you will be unable to use the above functions, but it will not affect your normal use of other Myfit Pro functions.

1.4 When you use the Apple Health data synchronization function, we provide you with services based on the capabilities of the third-party service platform, which will jump to the Apple Health authorization page. We are unable to obtain the information you entered on the authorization page. This page is provided by Provided by Apple Health. After you authorize it, Apple Health opens permissions to us, and we will synchronize your weight, BMI, body fat percentage, lean body mass, and heart rate information to the Apple Health platform in order to provide you with this service. If the authorization page refuses authorization, you will be unable to use the above functions, but it will not affect your normal use of other Myfit Pro functions.

Myfit Pro will share the weight data (weight, body fat percentage, BMI, lean body mass) after each weighing to Apple's Health App.

② Since the privacy of your health data is very important, Myfit Pro will prompt you to authorize the relevant options for sharing to the Apple Health app after entering the homepage for the first time. If you want to modify the authorization in the future, you can view the setting instructions of the Apple Health app in the Myfit Pro system settings interface.

③ Experience mode and guest mode will not share weight data to Apple’s Health app.

1.5 When Myfit Pro needs to use the Bluetooth function when binding and connecting devices, we need to authorize Bluetooth , positioning permissions (only required for Android 6.0 and above), and permission to discover and scan nearby devices (only required for Android 12 and above) . Refusal to provide permission will affect your normal ability to bind and connect devices, but will not affect your use of other Myfit Pro functions.

Special statement: Myfit Pro does not use positioning-related functions and requires positioning permissions. This is because Android 6.0 and above systems require positioning permissions to use the Bluetooth function. Android 12.0 and above systems require the use of Bluetooth scanning functions to discover and scan nearby areas. device permissions . Detailed information can be found in the official Android documentation: https://developer.android.com/guide/topics/connectivity/bluetooth.

1.6 When you edit your user avatar, we will need you to authorize us for album and camera permissions. The avatar will be uploaded to the Alibaba OSS system, and we will only display the avatar on the Myfit Pro interface. Refusal to provide permission to the album and camera will only affect your use of the above functions, but will not affect your normal use of other Myfit Pro functions.

1.7 When you use a QR code to bind your device, we will need you to authorize us for album and camera permissions. We will send the recognized content to the Myfit Pro server for device identification and binding. Refusal to provide permission to the album and camera will only affect your use of the above functions, but will not affect your normal use of other Myfit Pro functions.

1.8 When you use the feedback function in Myfit Pro , if you need to send us pictures to troubleshoot problems, we will need you to authorize us for album and camera permissions. Refusal to provide permission to the album and camera will only affect your use of the above functions, but will not affect your normal use of other Myfit Pro functions.

1.9 When you use the feedback function in Myfit Pro , in order to better troubleshoot problems, we will report the log files of the App to the Myfit Pro server for us to analyze and use. The log files are encrypted and key information such as passwords are removed. If you do not want to report log files, please do not use this function. This will not affect your normal use of other Myfit Pro functions.

1.10 When you use the network configuration function of a WIFI device in Myfit Pro, we will obtain the WIFI SSID currently connected to the mobile phone. The WIFI password entered during network configuration will not be recorded in the file and reported to the server. It will be cleared by the user after being sent to the device . Enter the password. If you do not want us to obtain the WIFI SSID currently connected to your phone and enter the WIFI password, please do not use the network configuration function. This will not affect your normal use of other Myfit Pro functions.

1.11 When you use the network distribution function of a WIFI device in Myfit Pro (pure WIFI devices, not all devices), we will obtain the WIFI SSID currently connected to the mobile phone. The WIFI password entered during network distribution will not be recorded in the file and reported to the server . , the password entered by the user is cleared after being sent to the device. At the same time, we need to query the WIFI status permission and the permission to automatically connect to WIFI . If you refuse authorization, it will only affect your use of the above functions and will not affect your normal use of other functions of Myfit Pro . (Android)

1.12 When you use the history function in the chart, we will need you to grant us calendar permissions. Refusal to provide calendar permissions will only affect your use of the above functions, but will not affect your normal use of other Myfit Pro functions.

1.13 When you use the eight-electrode report saving function, we will need you to grant us album (iOS)/memory card read and write (Android) permissions. Refusing to provide photo album (iOS)/memory card read and write (Android) permissions will only affect your use of the above functions, but will not affect your normal use of other Myfit Pro functions.

1.14 When you turn on the measurement sound effect function on Myfit Pro , we will need you to authorize us to vibrate (Android) . Refusing to provide vibration (Android) permission will only affect your use of the above functions, but will not affect your normal use of other Myfit Pro functions.

2. Information generated during your use of functions and services

2.1 When you use Myfit Pro , we will collect your height , weight , date of birth , gender , whether you are an athlete , and bioresistance values to calculate your BMI, body fat rate, muscle rate, subcutaneous fat rate, visceral fat index, and body moisture body rate, skeletal muscle rate, bone mass, protein mass, basal metabolic rate, physiological age and other information. Refusing to provide such information will prevent you from using Myfit Pro 's core services, but it will not affect your normal use of other Myfit Pro functions. We ensure that it is not used for other purposes and will always keep the information collected to a minimum.

2.2 When you use Myfit Pro , we will scan the surrounding Welland Bluetooth devices, and when binding, we will collect the device's MAC, broadcast name, and device type. Refusal to provide such information will affect your use of the above functions, but will not affect your normal use of other Myfit Pro functions.

2.3 When you use Myfit Pro to set your target weight and edit user information, we will collect your target weight . The data is only for better use of Myfit Pro services. We will not provide this information to third parties for use without your authorization and consent.

2.4 When you use the Myfit Pro device network configuration function, we will obtain the WiFi name of the current mobile phone connection to help the smart device connect to the network. We will not provide this information to third parties for use without your authorization and consent.

2.5 In order to ensure that the data is uploaded to the Myfit Pro server, we will detect the connectivity of Myfit Pro to the network. If the network is not smooth, we will remind you that we will not report this connectivity to the server.

2.6 In addition to the above information collection and use situations, in order to better provide you with services, we may also need to call or request you to open some access rights of the device in relevant business functions to realize the collection and use of information involved in these functions. use. For more information on user device permission calling, purpose of calling, and instructions on whether permissions are unnecessary, please click here (Attachment 1) to view. Among them, the necessary permissions listed are the necessary permissions required to realize the basic functions of the APP. If you refuse to provide them, it will affect the realization of the basic functions; except for the above necessary permissions, other permissions will only be granted when you use specific functions. Call, we will then apply for your authorization and consent through pop-up windows and other methods.

Myfit Pro may also collect other information about you, your equipment or your use of the service through other methods. These methods will be explained to you at the time of collection and your consent will be obtained.

3. Collection and use of non-identifying information

Non-identifying information refers to information that cannot be used to determine personal identity, including but not limited to website visits, application downloads, and product sales. Myfit Pro collects and aggregates relevant statistical information for the purpose of understanding how users use our products and services. Through this, Myfit Pro can improve its services and better meet user needs. Myfit Pro may collect, use, disclose, and transfer non-identifying information for other purposes at its sole discretion.

The above information you provide or upload will continue to be authorized for us to use during your use of the Myfit Pro service, unless you cancel or close the authorization. We have the right to continue to use the information that has been authorized before you cancel or close it. If you cancel or close the authorization, you will be unable to use relevant business functions, but it will not affect your use of other core business functions. When you cancel your account, we will delete or anonymize or de-identify your personal information collected in accordance with the law.

4. Retention and usage period of personal information

We will retain letters for as long as necessary to provide the Platform and for other purposes set out in this Privacy Policy. We also retain information where necessary to comply with contractual and legal obligations, when we have legitimate business interests (such as improving and developing the Platform, and enhancing its security and stability), and in order to exercise or defend legal claims.

Retention periods vary based on different criteria, such as the type of information and the purposes for which we use the information. For example, when we process information such as your profile information to provide you with the Platform, we will retain this information for as long as you have an account. If you violate our Terms of Service, Community Guidelines, or other conditions or policies, we may immediately remove your profile and User Content from public view, but may retain additional information about you to address the violation.

 

(2) We may use your personal information collected for the following purposes:

1. To provide you with services

(1) For identity verification, customer service, health analysis, archiving and backup purposes to ensure the security of the products and services we provide to you;

(2) Carry out internal audits, information data analysis and research, analyze business operation efficiency and measure market share, help us design new services and improve our existing products or services;

(3) Let us better understand how you use our services, so as to meet your needs in a targeted manner, including language settings, location settings, help services and instructions, or make other changes to you and other users of our services. response;

(4) Synchronize and store the data you upload or download and the data required to perform the upload or download.

2. After collecting your personal information, we will perform technical processing of the data through technical means. Information after technical processing will not be able to identify specific subjects. Please understand and agree that in this case we have the right to use anonymized or de-identified information, and in compliance with relevant laws and regulations, we have the right to conduct an overall review of the user database including your personal information. Chemical analysis and utilization (including commercial utilization).

3. When we want to use your personal information for other purposes not specified in this privacy policy, or when we use the information collected for a specific purpose for other purposes, we will ask for your consent in advance.

4. You are fully aware that we do not need to obtain your authorization to collect and use personal information in the following situations:

(1) Directly related to national security and national defense security;

(2) Relevant to public safety, public health, and major public interests;

(3) Relevant to criminal investigation, prosecution, trial and judgment execution;

(4) To protect the life, property and other major legitimate rights and interests of the personal information subject or other individuals but it is difficult to obtain the consent of the individual;

(5) The personal information collected is disclosed to the public by the personal information subject himself

(6) Your personal information collected from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels;

(7) Necessary to sign and perform a contract according to the requirements of the personal information subject;

(8) Necessary to maintain the safe and stable operation of the products and/or services provided, including discovering and handling product and/or service failures;

(9) The personal information controller is a news unit and it is necessary for it to carry out legal news reports;

(10) The controller of personal information is an academic research institution, and it is necessary to carry out statistical or academic research for the public interest, and when it provides externally the results of academic research or description, the personal information contained in the results will be de-identified. ;

(11) Other situations stipulated by laws and regulations.

2. How we store and protect your personal information

(1) Storage period

We will only retain your personal information for the period necessary to achieve the purposes stated in this policy. We will not extend the retention period without your consent or with a clear legal basis. If you cancel your account or voluntarily delete the above information, we will save your existing personal information in accordance with the minimum period stipulated by laws and regulations. During the minimum retention period required by laws and regulations, we will no longer commercialize your personal information. use. When your personal information exceeds the above retention period, we will anonymize it or delete it.

(2) Storage area

If you register an account in the People's Republic of China, your personal information will be stored on a server in the People's Republic of China; if you register an account in Europe, your personal information will be stored on a server in Europe; if it is not located in the above two regions Registered accounts are uniformly stored on servers in the United States;

(3) Safety protection measures

1. We will collect, use, store and transmit user information based on the principle of "minimum necessity", and inform you of the purpose and scope of use of relevant information through the user agreement and privacy policy. We will not collect personal information irrelevant to achieving the purpose. We will strictly follow the relevant requirements of local Internet laws, regulations and rules, establish an information security system, and take technical measures and other necessary measures to protect the security of your personal information. For details, see Appendix 3: Information System Security and Confidentiality System.

2. Myfit Pro will use various security technologies and procedures to establish a complete management system to protect your personal information from unauthorized access, use or disclosure. For example: use encryption technology to ensure the confidentiality of data transmission and storage; use trusted protection mechanisms to prevent data from malicious attacks; deploy access control mechanisms to ensure that only authorized personnel can access personal information and authorize relevant access; regularly carry out Security protection and detection measures such as special inspections of data security; provide employees with data security awareness and security capability training to strengthen employees' understanding of the importance of protecting personal information.

3. Please understand: The Internet environment is not 100% safe. We will try our best to ensure or guarantee the security of any information you send us. However, due to technical limitations and possible malicious means, even if we do our best to strengthen security measures , and it is impossible to always guarantee 100% information security.

4. After an unfortunate personal information security incident occurs, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, and you can prevent and reduce it on your own. Advice on risks, remedies for you, etc. We will promptly notify you of the incident-related information by email, letter, phone, etc. When it is difficult to inform the personal information subjects one by one, we will issue announcements in a reasonable and effective manner. At the same time, we will also proactively report the handling of personal information security incidents in accordance with the requirements of regulatory authorities.

 

3. How we share, transfer and publicly disclose your personal information

(1) Sharing

We will not share your personal information with any other company, organization or individual except in the following situations:

1. We may share your personal information externally in accordance with laws and regulations, litigation and dispute resolution needs, or as required by administrative and judicial authorities in accordance with the law.

2. Some services of Myfit Pro need to be provided or jointly provided by a partner (such as companies providing related technical services, transportation companies, mailing companies, companies providing prizes, etc.). In order to provide you with such services, it is necessary for Myfit Pro to share your personal information with this partner. If you do not want your information to be shared, you may refuse to have your personal information disclosed by not using that specific service.

For companies, organizations and individuals with whom we share personal information, we will sign corresponding confidentiality agreements with them, requiring them to handle personal information in accordance with our requirements, this Privacy Policy and any other relevant confidentiality and security measures.

3. In order to ensure the stable operation of the Myfit Pro client and enable you to enjoy and use more services and functions, our application will embed the SDK of authorized partners or other similar applications. You can click here (Appendix 2) to view it . We access the SDK details of authorized partners, the type of device permissions they call, and the information obtained. We will conduct strict security testing on the application programming interface (API) and software tool development kit (SDK) used by authorized partners to obtain relevant information, and agree on strict data protection measures with authorized partners.

(2) Transfer

We will not transfer your personal information to any company, organization or individual, except in the following circumstances:

1. Transfer with explicit consent: After obtaining your explicit consent, we will transfer your personal information to other parties based on your authorization;

2. When a merger, acquisition or bankruptcy liquidation is involved, if personal information is transferred, we will require the new company or organization that holds your personal information to continue to be bound by this privacy policy, otherwise we will require the company or organization to re- Ask for your authorization and consent.

(3) Public disclosure

We will only publicly disclose your personal information under the following circumstances:

1. After obtaining your explicit consent;

2. Public disclosure based on law or legal basis: In accordance with the requirements of laws and regulations, as well as administrative enforcement or judicial mandatory requirements, we may publicly disclose your personal information based on the required type of personal information and disclosure method. We will carefully review all requests to disclose users' personal information to ensure that they have a legal basis and are limited to data that the relevant departments have legal rights to obtain based on specific investigation purposes.

 

4. How you manage your personal information (your rights)

1. Query and correct your personal information

(1) You can log in to your personal account at any time and access or edit the personal information in the account, including clicking on the avatar to edit the avatar, nickname, gender, birthday, height, waistline, and usual place of residence. For other information, you can refer to Myfit Pro 's option settings for details.

(2) You have the right to correct or update incorrect or incomplete personal information provided that you pass user identity verification and the correction does not affect the authenticity, objectivity and accuracy of the information. You can make corrections in Myfit Pro yourself , or submit a correction request to us by contacting customer service. We will respond to your request in the manner and within the time periods set out in this Privacy Policy.

(3) Personal information that you cannot access and correct: In addition to the information listed above, we are unable to provide you with access and correction services for some of your personal information. This information is mainly used to improve your user experience and ensure transactions. Your device information collected securely and personal information generated when you use extended functions. We will use the above information within the scope of your authorization. You cannot access or correct it, but you can contact us to delete or anonymize it.

2. Delete personal information

You can make a request to us to delete personal information under the following circumstances:

(1) If our processing of personal information violates laws and regulations;

(2) If we collect and use your personal information without your consent;

(3) If our processing of personal information violates our agreement with you;

(4) If you no longer use our products or services, or you cancel your account;

(5) If we terminate our services and operations.

apply to delete your personal information to Guangdong Wolai, the operator of Myfit Pro , by calling the hotline +86 180-2368-9988.

When you delete information from our services, we may not delete the corresponding information from the backup system immediately, but we will delete the information when the backup is updated.

3.Withdrawal of consent

Please understand that each business function may require some basic personal information to be implemented. You can give or withdraw your consent at any time for the collection and use of additional personal information.

You can choose to log out of your account in "My" - "System Settings".

4. Cancel account

After entering Myfit Pro , you can initiate an account cancellation application in "My" - "System Settings" - "Delete Account". After canceling your account, we will stop providing you with products or services, and upon your request, we will destroy your personal data in an irrecoverable manner , unless otherwise provided by laws and regulations.

5. Methods and channels for making requests

When you make a request to us for inquiry, correction, withdrawal, or cancellation, you must make the request in the following ways and channels:

(1) Personal information subject requests must be made in writing. A request is valid even if the requester does not state the statute on which the request is based. Generally speaking, requests for access made verbally are not valid.

(2) When making a request, the personal information subject should ensure that the following specific requirements are followed: make the request through our dedicated personal information subject request channel (such as customer service contact number); provide sufficient information so that we can verify the identity of the personal information subject; the request content is specific , provide as detailed information as possible and be enforceable.

(4) We make every effort to ensure that we respond within fifteen working days after the personal information subject access request is made. Considering the complexity and number of requests, this period may be extended by 1-2 months when necessary. In the case of delayed provision of information, we will promptly notify the personal information subject of the relevant circumstances and reasons for the delay.

6.Special statement

(1) No one has the right to access other people’s personal information, unless they are authorized persons or guardians.

(2) According to relevant laws and regulations, the circumstances under which we may not provide data to personal information subjects include but are not limited to: providing data will undermine the ability to combat terrorism, the personal information subject has repeatedly applied for multiple times, or obtaining and providing information A disproportionate amount of resources will be consumed, etc.

(3) In principle, we will not provide the following information:

A. Information about other people - The data requested by the personal information subject may involve other people besides the personal information subject. We do not provide this information unless the individual involved consents.

B. Repeated application - the requester makes the same or similar request for the same personal information subject, the data has not changed in the past period of time, and we have already provided the data. In this case, we usually will not provide the data again. a copy of. In addition, we are under no obligation to provide information that is already publicly available.

C. Opinions given under conditions of confidentiality - If information about the personal information subject is given under conditions of confidentiality, we are under no obligation to provide such information.

D. Special Files – Any Special Information we retain will not be disclosed in response to a personal information subject’s request for access. Generally speaking, special information refers to any confidential documents (including direct communications between clients and their lawyers) and information generated for the purpose of obtaining or giving corresponding legal advice (including information involved in litigation).

5. How we process personal information of minors

1. We attach great importance to the protection of minors’ personal information. If you are a minor under the age of 18, you should obtain the consent of your guardian before using our products and/or services. We protect the personal information of minors in accordance with relevant national laws and regulations.

2. We will not actively collect personal information from minors directly. For cases where we collect personal information from minors with the consent of their guardians, we will only use, share, transfer or disclose this information as permitted by law, with the consent of the guardian or as necessary to protect the minors.

3. If there are facts that prove that minors have used our products and/or services without the consent of their guardians, we will negotiate with the relevant guardians and try to delete the relevant personal information as soon as possible.

4. We further take the following measures to protect the personal information of children under the age of 14 that may be involved:

(1) For the personal information collected from children, in addition to complying with the provisions of this privacy policy regarding user personal information, we will also adhere to the principles of legitimate necessity, informed consent, clear purpose, safety and security, and use in accordance with the law, and strictly abide by the "Children's Personal Information" Normative documents such as "Information Network Protection Regulations" require storage, use, and disclosure, and the period will not exceed the period necessary to achieve the purpose of collection and use. After expiration, we will delete or anonymize children's personal information.

(2) When you, as a guardian, choose to use our related services for a child under guardianship, we may need to collect the personal information of the child under guardianship from you for the purpose of performing relevant services to you. If we need to collect children's personal information from you in specific services, we will obtain your authorization and consent in advance and inform you of the purpose and use of the collection. If you do not provide the above information, you will not be able to enjoy the related services we provide. As a guardian, you should correctly perform your guardianship duties and protect the safety of children's personal information. If children need to use our products and/or services, you should guide them correctly and supervise them.

(3) Children or their guardians have the right to access and correct children’s personal information at any time, and can also make requests for correction and deletion to us. If you have any comments, suggestions, complaints or reports on matters related to children's personal information, please contact us. We're here to help.

6. Regarding the transfer of personal information overseas

In principle, the personal information we collect and generate in the territory of the People's Republic of China will be stored in the territory of the People's Republic of China; the personal information collected and generated in Europe will be stored in Europe; except for the above two situations, the personal information collected and generated will be stored in the territory of the People's Republic of China. Personal information is stored in the United States

If your personal information may be transferred to overseas jurisdictions in the country/region where you use products or services, or be accessed from these jurisdictions, we will strictly fulfill our obligations under laws and regulations and inform you in advance of the country of transfer, Transfer date, transfer method, transfer purpose, retention and use period to obtain your separate consent.

Your personal information may be transferred to overseas jurisdictions or accessed from these jurisdictions only after obtaining your separate consent; and, due to government supervision, judicial assistance requirements, etc., it needs to be transferred outside the People's Republic of China. For your personal information, we will inform you of the type of data involved in the cross-border transfer, the purpose of the cross-border transfer, the name of the recipient, contact information and relevant security measures, and your rights to provide personal information to the overseas recipient. methods and procedures, etc., and obtain your separate consent; when we perform such transfers, we will fulfill our legal obligations in cross-border provision of personal information in accordance with laws and regulations and this privacy policy, such as in accordance with the provisions of the national cyberspace department. The standard contract concludes a contract with the overseas recipient, stipulates the rights and obligations of both parties, organizes self-assessment of data outbound security, and passes the security assessment organized by the national cybersecurity and informatization department when conditions are met.

We will take necessary measures to ensure that the overseas recipient's personal information processing activities meet the personal information protection standards stipulated in relevant laws and regulations and this Privacy Policy. For example, we will ask for your separate consent to the cross-border transfer of personal information, or implement security measures such as data encryption and de-identification before cross-border data transfer.

7. How to update this policy

1. This privacy policy may be changed from time to time based on adjustments to national laws and policies, adjustments to business content, etc. We will not reduce your rights under this Privacy Policy without your explicit consent.

2. If there are changes in business functions, changes in the export of personal information, changes in the purpose of use, changes in the contact information of the person in charge of personal information protection, etc., we will publish any changes to this policy in the form of notices on the website and APP. For major changes, we will provide prominent notifications (including public announcements on Myfit Pro or even providing you with pop-up reminders). In this case, if you continue to use our services, you agree to be bound by the revised Privacy Policy.

3. Unless otherwise specified, the revised Privacy Policy will take effect from the effective date of publication.

8. How to contact us

If you have any questions, comments or complaints about this privacy policy, you can call the contact number: 0760-28160372 (working days), +86 180-2368-9988 (non-working days) or send an email to sdk@welland.hk , etc. Contact us through the method, we will actively verify, handle and reply as soon as possible. Under normal circumstances, we will make an initial reply within fifteen working days and will do our best to answer your questions within twenty working days. If you are not satisfied with our response, especially if our personal information processing behavior harms your legitimate rights and interests, you can also complain or report to the regulatory authorities such as Internet Information, Telecommunications, Public Security, and Industry and Commerce.

Myfit Pro basic information

Company Name: Guangdong Welland Technology Co., Ltd.

Company address: No. 85, Zhongshan Private Science and Technology Park, East Hebei, Shiqi District, Zhongshan City (2nd floor, Building B)

Company official website: https://www.welland.hk

Chief Privacy Officer: Chen Junming

Personal information protection contact number: 0760-28160372 (working days), 180-2368-9988 (non-working days)

Contact: Myfit Pro Customer Service Assurance Team

 

 

(Attachment 1) User device permission call list

serial number

Permission name

Permission description and

Call purpose

1

(Non-essential)

(android.permission.

READ_EXTERNAL_STORAGE)

Allows the application to read files from the device's external storage: for reading pictures

2

(Non-essential)

(android.permission.

WRITE_EXTERNAL_STORAGE)

Allows the program to write to external storage: used to save to local photo album

3

(Non-essential)

(android.permission.

CAMERA)

Allow the program to access the camera to take photos: (1) Modify personal avatar; (2) Use the scan function; (3) Shoot short videos.

4

(Non-essential)

(android.permission.

FLASHLIGHT)

Access flash: Used to turn on the flash when using the scan function

5

(Non-essential)

(android.permission.

VIBRATE)

Allow the phone to vibrate in specific scenarios of the program

6

(necessary)

(android.permission.

WAKE_LOCK)

Allow the program to stay on on the phone screen: used for program measurement pages to keep the phone awake.

7

(necessary)

(android.permission.

FOREGROUND_SERVICE)

Allows the program to remain connected to the service when running in the foreground, for notifications in specific scenarios

8

(necessary)

(android.permission.

QUERY_ALL_PACKAGES)

Query the list of installed APPs: Used to check whether WeChat, QQ, and Weibo are installed in the sharing function

9

(Non-essential)

(android.permission.

BLUETOOTH_ADMIN)

Allows the program to connect to paired Bluetooth devices: used for Bluetooth device connection and control

10

(Non-essential)

(android.permission.

BLUETOOTH)

Allows the program to connect to paired Bluetooth devices: used for Bluetooth device connection and control

11

(necessary)

(android.permission.

INTERNET)

Allow the program to connect to the network

12

(necessary)

(android.permission.

ACCESS_NETWORK_STATE)

Allows programs to monitor network changes

13

(Non-essential)

(android.permission.

ACCESS_WIFI_STATE)

Allow the program to obtain wifi status: used for smart device network configuration function

14

(Non-essential)

(android.permission.

CHANGE_WIFI_STATE)

Allow the program to obtain wifi status: used for smart device network configuration function

15

(Non-essential)

(android.permission.

READ_PHONE_STATE)

Allows reading of mobile phone unique identification, memory and other status

16

(Non-essential)

(android.permission.

ACCESS_FINE_LOCATION)

Allows programs to obtain positioning permissions for Bluetooth device search, connection, and control

17

(Non-essential)

(android.permission.

ACCESS_COARSE_LOCATION)

Allows programs to obtain positioning permissions for Bluetooth device search, connection, and control

18

(Non-essential)

(android.permission.

CHANGE_NETWORK_STATE)

Allow the program to obtain and change the network status: used for current network is not smooth, switch network

19

(necessary)

ios(Photo Library Additions Usage Description)

Allows the application to use the photo album for saving data details of photos

20

(necessary)

ios(Location Always Usage Description)

Allow the application to use positioning, which is used by the App to obtain the WIFI SSID when configuring the device. After iOS 13, obtaining the WIFI SSID requires positioning permission. We promise to only obtain the WIFI SSID and will not perform positioning. Not granting permission will not affect use

twenty one

(necessary)

ios(Bluetooth Always Usage Description)

Allows the app to use Bluetooth for Bluetooth smart body fat scale synchronization to store your weight and body fat data

twenty two

(necessary)

ios(Bluetooth Peripheral Usage Description)

Allows the app to use Bluetooth for Bluetooth smart body fat scale synchronization to store your weight and body fat data

twenty three

(necessary)

ios(Camera Usage Description)

Allows the application to use the camera to take photos as the user's avatar

twenty four

(necessary)

ios(Health Share Usage Description)

Allows the app to use Apple Health, for Apple Health to read Health's weight data

25

(necessary)

ios(Health Update Usage Description)

Allows apps to use Apple Health for syncing weight data to Health

26

(necessary)

ios(Photo Library Usage Description)

Allows the application to use the photo album to select photos from the photo album as the user's avatar

27

(necessary)

ios(Location When In Use Usage Description)

Allow the application to use positioning, which is used by the App to obtain the WIFI SSID when configuring the device. After iOS 13, obtaining the WIFI SSID requires positioning permission. We promise to only obtain the WIFI SSID and will not perform positioning. Not granting permission will not affect use

28

(necessary)

ios(Calendars Usage Description)

Allow application calendar to access system calendar to view historical data

29

(Non-essential)

(android.permission.

BLUETOOTH_SCAN)

Allows the program to scan nearby Bluetooth devices for Bluetooth device connection and control

30

(Non-essential)

(android.permission.

BLUETOOTH_CONNECT)

Allows the program to scan and connect nearby Bluetooth devices for Bluetooth device connection and control.

31

(Non-essential)

(android.permission.

POST_NOTIFICATIONS)

Allows the app to send message reminder notifications

 

 

(Appendix 2) Instructions for third-party SDK to collect and use user information

 

In order to ensure the implementation of Myfit Pro related functions and the safe and stable operation of the application, we may access the software development kit (SDK) provided by a third party to achieve the aforementioned purposes. We will conduct strict security testing on third-party SDKs and require our partners to take strict measures to protect your personal data.

The third-party SDK we access mainly serves the needs of you and other users. Therefore, when meeting new service requirements and changes in business functions, we may adjust the third-party SDK we access. We will promptly disclose to you the latest status of accessing third-party SDKs in this description.

currently connected to Myfit Pro and the user information that may need to be collected and the device permissions called are as follows:

1. Myfit Pro integrates Umeng+SDK. Umeng+SDK needs to collect your device’s Mac address, unique device identification code (IMEI/android ID/IDFA/OPENUDID/GUID/OAID/ICCID, SIM card IMSI information, and mobile phone model , mobile phone storage ) to provide statistical analysis services, calibrate report data accuracy through geographical location, and provide basic anti-cheating capabilities; collect your social account public information to share messages to target devices and specific social accounts. (Both Android and iOS include this SDK)

Privacy Policy Link: https://www.umeng.com/page/policy

 

2. Myfit Pro integrates Bugly SDK. Bugly SDK needs to collect your device Mac address, unique device identification code (IMEI/android ID/IDFA/OPENUDID/GUID/OAID, SIM card IMSI information, mobile phone model, mobile phone storage) and Provide statistical analysis services to help analyze problems encountered by Myfit Pro users, including but not limited to crash problems and network errors. Bugly SDK may need to collect relevant personal information from App developers and/or end users, including: log information (customized logs by third-party developers, Logcat logs, and APP crash stack information), device ID (android id and idfv), Internet connection information, system name, system version, and country code. (Both Android and iOS include this SDK)

Privacy policy link: https://privacy.qq.com/document/preview/fc748b3d96224fdb825ea79e132c1a56

 

3. Myfit Pro integrates QQ Interconnect SDK to provide the function of logging into the platform (both Android and iOS include this SDK) Privacy policy link: https://wiki.connect.qq.com/qq Interconnect sdk Privacy Protection Statement

4. Myfit Pro integrates Sina Weibo SDK to provide the function of logging into the platform (both Android and iOS include this SDK) Privacy policy link: https://open.weibo.com/wiki/Sdk/privacy

5. Myfit Pro integrates WeChat Open SDK to provide the function of logging into the platform (both Android and iOS include this SDK)

WeChat Open SDK personal information processing rules link: https://support.weixin.qq.com/cgi-bin/mmsupportacctnodeweb-bin/pages/RYiYJkLOrQwu0nb8

WeChat Open SDK personal information processing instructions link: https://support.weixin.qq.com/cgi-bin/mmsupportacctnodeweb-bin/pages/ONwPihxKd82RAkIJ

6. Myfit Pro integrates LottieSDK, with the purpose of loading animation effects in the app for use by the global UI. (Both Android and iOS include this SDK)

7. Myfit Pro integrates Material-dialogs for global UI use. (Only Android includes this SDK)

8. Myfit Pro integrates Alibaba Cloud Oss SDK for uploading and saving images. (Both Android and iOS include this SDK)

9. Myfit Pro integrates the Auth2.0 authentication information parsing of the AppauthSDK Jwtdecode SDK third-party platform as a basic component tool and is used globally. The SDK needs to obtain permissions to allow applications to open network sockets and identify network status. (Only Android includes this SDK)

10. Myfit Pro integrates BlackjUtilCodeSDK for the purpose of simplifying java method judgment, as a basic component tool, and for global use. (Only Android includes this SDK)

11. Myfit Pro integrates CncoderxWheelviewSDK for the purpose of loading the pulley effect for global UI use. (Only Android includes this SDK)

12. Myfit Pro integrates BumpTech Glide SDK for the purpose of loading pictures to facilitate your use of the picture display function. BumpTech Glide SDK requires permissions that allow applications to open network sockets and identify network status. (Only Android includes this SDK)

13. Myfit Pro integrates MPAndroidChart SDK for global UI use. (Only Android includes this SDK)

14. Myfit Pro integrates Charts SDK for global UI use. (Only iOS includes this SDK)

15. Myfit Pro integrates MaterialCalendarview SDK for global UI use. (Only Android includes this SDK)

16. Myfit Pro integrates RxPermission SDK to unify the permission request style and better manage permission request functions. The RxPermission SDK requires permission to access your location. (Only Android includes this SDK)

17. Myfit Pro integrates Rxjava SDK, which is used to handle network request callbacks and serves as a basic component tool for global use. (Only Android includes this SDK)

18. Myfit Pro integrates Google Play Services SDK, which is used to authorize Google and upload health data measured on smart devices. It will only be used by foreign users. (Only Android includes this SDK)

19. Myfit Pro integrates GsonSDK to convert json data into java objects. GsonSDK requires permission to allow applications to open network sockets. (Only Android includes this SDK)

20. Myfit Pro integrates ButterknifeSDK to simplify the binding code of Android View id. (Only Android includes this SDK)

21. Myfit Pro integrates Okio SDK, which is used to assist network IO requests and is used globally as the basic main component. (Only Android includes this SDK)

22. Myfit Pro integrates Okhttp SDK, which is used to assist network IO requests and is used globally as the basic main component. (Only Android includes this SDK)

23. Myfit Pro integrates PicassoSDK for the purpose of loading pictures and making it convenient for you to use the picture display function. PicassoSDK requires permissions that allow applications to open network sockets and identify network status. (Only Android includes this SDK)

24. Myfit Pro integrates Retrofit 2 SDK, which is used to encapsulate the upper layer of network requests for use by network request services. (Only Android includes this SDK)

25. Myfit Pro integrates TencentMarsXlog SDK for the purpose of recording crashes of collection page information analysis. (Only Android includes this SDK)

26. Myfit Pro integrates Apache Commons Lang SDK, which is intended to be a tool class package for processing Java basic object methods and is a basic component. (Only Android includes this SDK)

27. Myfit Pro integrates Apache Commons Collections SDK, which is intended to be a tool class package for processing Java collection methods and is a basic component. (Only Android includes this SDK)

28. Myfit Pro integrates Apache Commons Math3 SDK, which is intended to be a tool class package for processing Java collection methods and is a basic component. (Only Android includes this SDK)

29. Myfit Pro integrates Apache Commons IO SDK, which is intended to be a tool class package for processing Java collection methods and is a basic component. (Only Android includes this SDK)

30. Myfit Pro integrates JessyanArms SDK, which is intended to serve as the App infrastructure and basic framework. (Only Android includes this SDK)

31. Myfit Pro integrates JessyanArmsAutoSize SDK, which is intended to serve as a basic framework for multi-model UI adaptation. (Only Android includes this SDK)

32. Myfit Pro integrates YokeywordFragmentationxSDK, which is used as a basic component to manage the fragmentation operations of fragments. (Only Android includes this SDK)

33. Myfit Pro integrates Greenrobot EventBus SDK, which is used as a publishing and subscribing event bus and is a basic component for global use. (Only Android includes this SDK)

34. Myfit Pro integrates GreenDAO SDK to save local data for global use. (Only Android includes this SDK)

35. Myfit Pro integrates RxLifecycle2 for global use. (Only Android includes this SDK)

36. Myfit Pro integrates Zxing SDK for use in scanning and device binding scenarios. (Only Android includes this SDK)

37. Myfit Pro integrates SamsungHealth SDK for the purpose of accessing Samsung Health authorization and data synchronization. SamsungHealth SDK needs to obtain permissions to allow applications to open network sockets and identify network status. Only for foreign users (only Android contains this SDK)

38. Myfit Pro integrates the Websocket SDK in order to maintain a network connection with the server. The SDK needs to obtain permissions to allow the application to open network sockets and identify network status. (Both Android and iOS include this SDK)

39. Myfit Pro integrates MMKV SDK, a key-value cache library based on mmap memory mapping, in order to improve client performance and stability. (Only Android includes this SDK)

40. Myfit Pro integrates AndroidPickView SDK for the purpose of using date selection control. (Only Android includes this SDK)

41. Myfit Pro integrates Facebook SDK to provide the function of logging into the Facebook platform. (Only Android includes this SDK)

42. Myfit Pro integrates YYKit SDK for rich text display and data model conversion. (Only iOS includes this SDK)

43. Myfit Pro integrates AFNetworking SDK for network requests. (Only iOS includes this SDK)

44. Myfit Pro integrates SDWebImage SDK for downloading and displaying images. (Only iOS includes this SDK)

45. Myfit Pro integrates FMDB SDK, which is used for database addition, deletion, modification and query (only iOS includes this SDK)

46. Myfit Pro integrates Charts SDK for display and query of chart data (only iOS includes this SDK)

47. Myfit Pro integrates MJRefresh SDK, which is used for pull-down loading circle animation (only iOS includes this SDK)

48. Myfit Pro integrates Mob SDK. Mob SDK needs to collect system operation information, network status information, iOS Advertising Identifier (IDFA), International Mobile Equipment Identity (IMEI), Anonymous Device Identifier (OAID), and International Mobile Subscriber Identity. (IMSI), application list information, base station information, mobile phone model, mobile phone storage, social platform OpenID, geographical location for social sharing, third-party login. (Both Android and iOS include this SDK)

Privacy Policy Link: https://www.mob.com/about/policy

 

49. Myfit Pro integrates LuckPicture SDK with the purpose of providing the function of selecting mobile phone pictures. LuckPicture needs to obtain permissions for photo albums, permissions to read and write mobile phone files, permissions to allow applications to open network sockets, and permissions to identify network status. (Only Android includes this SDK)

 

50. Myfit Pro integrates Alibaba Cloud number authentication SDK for one-click login function com.mobile.auth (Alibaba one-click login) (both Android and iOS include this SDK)

Privacy Policy Link : https://terms.aliyun.com/legal-agreement/terms/suit_bu1_ali_cloud/suit_bu1_ali_cloud202112211045_86198.html?spm=a2c4g.11186623.0.0.3bff1f23mMA34N

(Annex 3) Information system security and confidentiality system

Article 1. "Information system security and confidentiality" is a constant and unremitting task. Every system administrator must improve the awareness of information security and confidentiality and fully realize the importance and necessity of information security and confidentiality. Conduct information system security and confidentiality training for employees in system positions in important systems.

Article 2: Implement the accountability system for information release. All information release must go through review and approval procedures in accordance with regulations, and must be true and valid and comply with the laws and regulations of the People's Republic of China. Information systems involving state and company secrets must be physically isolated from the intranet and the Internet. The censorship system for online information and the regulations that information involving state secrets must not be released on the corporate intranet are strictly implemented to prevent leaks. If any content that is false, reactionary, pornographic, leaky, etc. is published, the person who submitted the information and reviewed the information will be held accountable, causing significant economic losses to the company, and the responsible person will be held accountable for the corresponding legal liability.

Article 3: Information system management authority is divided into top secret, confidential and secret in terms of security level; in terms of applicable objects, it is divided into senior administrators, system administrators, advanced users, intermediate users, general users and special users: in terms of operation carriers Divided into servers (including system servers, application servers and control servers), work terminals, and user terminals. In terms of setting content, it is divided into full control, permission setting change, cancellation, creation, deletion, addition, editing, update, run, and read. , copy, other operations, etc.

Article 4. There must be an authorization relationship between users of all information systems and information of different security levels. Plans should be formed and designed during the development and construction phase of new information systems. Functions for setting corresponding relationships should be reserved in the software system. According to the use Adjustments should be made to changes in positions and responsibilities.

Article 5: Use IT technical means to strictly control the hardware configuration adjustment and software parameter modification of the information system. Use the security mechanisms provided by operating system database systems and application systems to set corresponding security parameters to ensure the security of system access. For important computer equipment, use software technology and other means to prevent employees from installing or uninstalling software or changing software system configurations without authorization. , and regularly check the above conditions

Article 6: If an information system needs to entrust a professional organization to carry out system operation, maintenance and management, its qualifications, market surplus and credit status, etc., should be strictly reviewed, and a formal service contract and confidentiality agreement should be signed with it.

Article 7: All information system servers, work terminals, and user terminals must install security anti-virus software. End users who have not installed anti-virus software have the right to refuse to provide network access services.

Article 8. Use firewalls, routers, intrusion detection and other network equipment to strengthen network security and strictly guard against hacker attacks and illegal intrusions from the Internet.

Article 9: For confidential or business-critical data transmitted through the Internet, necessary technical means must be adopted to ensure the confidentiality, accuracy, and integrity of information transmission.

Article 10: For obsolete systems that have ceased operation, follow-up work such as destruction and transfer of valuable and confidential information in the system should be carried out.

Article 11. System managers must abide by various management systems of the information system and prevent the use of computers to commit fraud and crime.

Article 12: Establish a user management system for access to important business systems, adopt hierarchical password management for various managers and users of different categories and levels, set password validity periods, and use non-plaintext secondary encryption technology to prevent password storage Various password leakage accidents occur.