How we collect and use your personal information
1. Definition of personal information and personal sensitive information
Personal information refers to various information recorded electronically or in other ways that can be used alone or in combination with other information to identify a specific natural person or reflect the activities of a specific natural person.
Sensitive personal information refers to personal information that, if leaked, illegally provided or misused, may endanger personal and property safety, easily lead to damage to personal reputation, physical and mental health, or discriminatory treatment.
2. Bluetooth permission
Bluetooth permission is the basic permission used by the APP. Only the APP with this permission can search and connect to Edifier Bluetooth products through Bluetooth. We promise that the Bluetooth permission will only use the functions related to this APP, and will not be used for other purposes.
3. Location permissions
Location permission is also a basic permission for use. The mobile phone system requires location permission when searching for nearby Bluetooth products. Only with this permission can we search for nearby Bluetooth products. We promise that the location permission will only be used for relevant functions and not for other purposes.
4. Network access rights
Network access permission is the basic permission for APP use. Network permission is used for account login, loading discovery pages, updating website product information, and downloading product information (product pictures, models and manuals). We promise that the network access rights will only be used for related functions, and will not be used for other purposes.
5. Data read and write permissions
Data read and write permissions are the basic permissions for use. Data read and write permissions are used to create a local database to record server cached data, cache network pictures, and read local photo albums (the background of the music playback interface is customized, and the contents of the local photo album will be read). We promise that data read and write permissions are only used for related functions and not for other purposes.
How we share, transfer and publicly disclose your personal information
We will not share your personal information with any company, organization or individual other than us, except in the following cases:
(1) Your explicit authorization or consent has been obtained in advance.
(2) Share your personal information in accordance with applicable laws and regulations, government administrative orders or judicial case-handling needs.
(3) To the extent required or permitted by law, it is necessary to provide your personal information to a third party in order to protect the interests and property of its users or the public from damage.
We will not transfer your personal information to any company, organization or individual, except in the following cases:
(1) After obtaining your explicit consent, we will transfer your personal information to other parties.
3. Public disclosure
We will only publicly disclose your personal information under the following circumstances:
(1) After obtaining your explicit consent.
(2) Disclosure based on law: In the case of mandatory requirements of laws, legal procedures, litigation or government authorities.
How we protect your personal information
We or our partners have adopted industry-standard security measures to protect the personal information you provide to prevent unauthorized use, disclosure, modification or loss of data.
We will take all reasonable and feasible measures to protect your personal information. For example, we use encryption technology to ensure the confidentiality of data; we will use trusted protection mechanisms to prevent data from malicious attacks; we will deploy access control mechanisms to ensure that only authorized personnel can access personal information; and we will organize security and privacy Protection training courses to strengthen employees' awareness of the importance of protecting personal information. Although the above-mentioned reasonable and effective measures have been taken and the standards stipulated by relevant laws have been complied with, please understand that due to technical limitations and possible malicious means, in the Internet industry, even if we do our best to strengthen security measures, It is impossible to always guarantee 100% security of information, and we will do our best to ensure the security of the personal information you provide to us. You know and understand that the system and communication network you use to access our services may have problems due to factors beyond our control. Therefore, we strongly recommend that you take active measures to protect the security of your personal information, including but not limited to using complex passwords, changing passwords regularly, and not disclosing your account password and related personal information to others.
1. Access and correct your personal information
Unless otherwise provided by laws and regulations, you have the right to access your personal information, and if you think that any personal information we hold about you is wrong, you can contact us by email. When we process your request, you need to provide us with sufficient information to verify your identity. Once we have confirmed your identity, we will process your request free of charge within a reasonable time prescribed by law.
2. Deletion of your personal information
In the following situations, you can send us a request to delete personal information by email and provide us with sufficient information to verify your identity:
(1) If our handling of personal information violates laws and regulations.
(2) If we collect and use your personal information without your consent.
(3) If our handling of personal information violates our agreement with you.
(4) If you no longer use our products or services, or you cancel your account.
(5) If we no longer provide you with products or services.
If we decide to agree to your deletion request, we will also notify the entity that obtained your personal information from us and request it to be deleted as well. After you delete information from our service, we may not delete the corresponding information in the backup system immediately but will delete the information when the backup is updated.
3. Withdrawal of consent
You can also withdraw your consent to the collection, use or disclosure of your personal information that we hold by submitting a request. You can complete the cancellation by sending an email. We will process it within a reasonable time after receiving your request, and will no longer collect, use or disclose your personal information according to your request thereafter.
4. Cancel the account
You can contact us through the service hotline to apply for account cancellation. Within 7 working days of submitting the cancellation application, we will verify your cancellation behavior to let you know that the process is irreversible, and after getting your confirmation, we will cancel your account and delete your personal information, except as otherwise provided by laws and regulations.
How we handle children's personal information
We believe it is the responsibility of parents or guardians to supervise their children's use of our products or services. We generally do not provide services directly to children, nor do we use children's personal information for marketing purposes.
If you are a parent or guardian and you believe that a minor has submitted personal information to Techpooch, you can contact us by email to ensure that such personal information is deleted immediately.
How to contact us
Service hotline: 727-203-6048
Address: 1828 Walnut St, Kansas City, MO, 64108