Privacy Policy

To make our data collection practices easier to understand, you will notice that we have provided some quick links and a summary of our privacy policy. Please be sure to read our entire Privacy Policy to fully understand our practices and what we do with your information.

Introduction

Techpooch (hereinafter referred to as "we") attaches great importance to your privacy, and this privacy policy has fully taken your concerns into consideration. It is important that you gain a comprehensive understanding of our personal information collection and use practices while ensuring that you ultimately have control over the personal information you provide to us.

How we collect and use your personal information

1. Definition of personal information and personal sensitive information
Personal information refers to various information recorded electronically or in other ways that can be used alone or in combination with other information to identify a specific natural person or reflect the activities of a specific natural person.
Sensitive personal information refers to personal information that, if leaked, illegally provided or misused, may endanger personal and property safety, easily lead to damage to personal reputation, physical and mental health, or discriminatory treatment.
2. Bluetooth permission
Bluetooth permission is the basic permission used by the APP. Only the APP with this permission can search and connect to Edifier Bluetooth products through Bluetooth. We promise that the Bluetooth permission will only use the functions related to this APP, and will not be used for other purposes.
3. Location permissions
Location permission is also a basic permission for use. The mobile phone system requires location permission when searching for nearby Bluetooth products. Only with this permission can we search for nearby Bluetooth products. We promise that the location permission will only be used for relevant functions and not for other purposes.
4. Network access rights
Network access permission is the basic permission for APP use. Network permission is used for account login, loading discovery pages, updating website product information, and downloading product information (product pictures, models and manuals). We promise that the network access rights will only be used for related functions, and will not be used for other purposes.
5. Data read and write permissions
Data read and write permissions are the basic permissions for use. Data read and write permissions are used to create a local database to record server cached data, cache network pictures, and read local photo albums (the background of the music playback interface is customized, and the contents of the local photo album will be read). We promise that data read and write permissions are only used for related functions and not for other purposes.

How we share, transfer and publicly disclose your personal information

1. Sharing
We will not share your personal information with any company, organization or individual other than us, except in the following cases:
(1) Your explicit authorization or consent has been obtained in advance.
(2) Share your personal information in accordance with applicable laws and regulations, government administrative orders or judicial case-handling needs.
(3) To the extent required or permitted by law, it is necessary to provide your personal information to a third party in order to protect the interests and property of its users or the public from damage.
(4) Your personal information may be shared among our affiliated companies. We will only share necessary personal information, and such sharing is governed by this Privacy Policy. If the affiliated company wants to change the use authority of personal information, it will obtain your authorization and consent again.
2. Transfer
We will not transfer your personal information to any company, organization or individual, except in the following cases:
(1) After obtaining your explicit consent, we will transfer your personal information to other parties.
(2) When it comes to company mergers, acquisitions or bankruptcy liquidation, if personal information is inherited together with other company assets, we will require the new legal person holding your personal information to continue to be bound by this privacy policy, otherwise, we will Ask the legal entity to reauthorize you.
3. Public disclosure
We will only publicly disclose your personal information under the following circumstances:
(1) After obtaining your explicit consent.
(2) Disclosure based on law: In the case of mandatory requirements of laws, legal procedures, litigation or government authorities.

How we protect your personal information

We or our partners have adopted industry-standard security measures to protect the personal information you provide to prevent unauthorized use, disclosure, modification or loss of data.
We will take all reasonable and feasible measures to protect your personal information. For example, we use encryption technology to ensure the confidentiality of data; we will use trusted protection mechanisms to prevent data from malicious attacks; we will deploy access control mechanisms to ensure that only authorized personnel can access personal information; and we will organize security and privacy Protection training courses to strengthen employees' awareness of the importance of protecting personal information. Although the above-mentioned reasonable and effective measures have been taken and the standards stipulated by relevant laws have been complied with, please understand that due to technical limitations and possible malicious means, in the Internet industry, even if we do our best to strengthen security measures, It is impossible to always guarantee 100% security of information, and we will do our best to ensure the security of the personal information you provide to us. You know and understand that the system and communication network you use to access our services may have problems due to factors beyond our control. Therefore, we strongly recommend that you take active measures to protect the security of your personal information, including but not limited to using complex passwords, changing passwords regularly, and not disclosing your account password and related personal information to others.

Your rights

1. Access and correct your personal information
Unless otherwise provided by laws and regulations, you have the right to access your personal information, and if you think that any personal information we hold about you is wrong, you can contact us by email. When we process your request, you need to provide us with sufficient information to verify your identity. Once we have confirmed your identity, we will process your request free of charge within a reasonable time prescribed by law.
2. Deletion of your personal information
In the following situations, you can send us a request to delete personal information by email and provide us with sufficient information to verify your identity:
(1) If our handling of personal information violates laws and regulations.
(2) If we collect and use your personal information without your consent.
(3) If our handling of personal information violates our agreement with you.
(4) If you no longer use our products or services, or you cancel your account.
(5) If we no longer provide you with products or services.
If we decide to agree to your deletion request, we will also notify the entity that obtained your personal information from us and request it to be deleted as well. After you delete information from our service, we may not delete the corresponding information in the backup system immediately but will delete the information when the backup is updated.
3. Withdrawal of consent
You can also withdraw your consent to the collection, use or disclosure of your personal information that we hold by submitting a request. You can complete the cancellation by sending an email. We will process it within a reasonable time after receiving your request, and will no longer collect, use or disclose your personal information according to your request thereafter.
4. Cancel the account
You can contact us through the service hotline to apply for account cancellation. Within 7 working days of submitting the cancellation application, we will verify your cancellation behavior to let you know that the process is irreversible, and after getting your confirmation, we will cancel your account and delete your personal information, except as otherwise provided by laws and regulations.

How we handle children's personal information

We believe it is the responsibility of parents or guardians to supervise their children's use of our products or services. We generally do not provide services directly to children, nor do we use children's personal information for marketing purposes.
If you are a parent or guardian and you believe that a minor has submitted personal information to Techpooch, you can contact us by email to ensure that such personal information is deleted immediately.

How this Privacy Policy is updated

Our Privacy Policy is subject to change. We will not reduce your rights under this Privacy Policy without your express consent. We will post any changes to this Privacy Policy on this page. For major changes, we will also provide more prominent notices.

How to contact us

If you have any questions, comments or suggestions about this Privacy Policy, you can contact us in the following ways. Generally, we will reply to you within 7 working days.

Email: b.jessen@techpooch.com
Service hotline: 727-203-6048
Address: 1828 Walnut St, Kansas City, MO, 64108

{ "name": "page_detail", "settings": [], "presets": [{ "name": "page_detail", "cname": "自定义页面", "category": "基础", "ccategory": "基础", "display": false, "blocks": [] }] } { "name": "anker_footer", "settings": [{ "$item.type": "header", "content": "基础设置" }], "presets": [{ "name": "anker_footer", "cname": "页脚(ANKER)", "category": "素材", "ccategory": "素材", "display": true, "blocks": [] }] }