Privacy Policy

Update date: 2024-07-05

Shanghai Zhengfeng Technology Co., Ltd. (hereinafter referred to as "we") is fully aware of the importance of personal information to you and will do its best to protect your personal information safely and reliably. We are committed to maintaining your trust in us and abiding by the following principles to protect your personal information: the principle of consistency of rights and responsibilities, the principle of clear purpose, the principle of choice and consent, the principle of minimum sufficiency, the principle of ensuring safety, the principle of subject participation, and the principle of openness and transparency. At the same time, we promise that we will take corresponding security protection measures to protect your personal information in accordance with the mature security standards of the industry.

Please read and understand this Privacy Policy carefully before using our product Super Slow Metronome (hereinafter collectively referred to as our Product or Super Slow Metronome).

What you should know:

1. How do we collect and use your personal information?

Personal information refers to any information recorded electronically or otherwise that can, alone or in combination with other information, identify a specific natural person or reflect the activities of a specific natural person.

The purpose of collecting personal information is to provide you with products or services and to ensure that we comply with applicable laws, regulations and other normative documents. You have the right to choose whether to provide this information, but in most cases, if you do not provide it, we may not be able to provide you with the corresponding services or respond to your questions.

1. What information will we collect from you?

  1. Device information: In order to identify your device ID and prevent malicious programs and anti-cheating, improve service security, ensure operational quality and efficiency, and prevent phishing fraud and Trojan viruses, during your use of this product, we may collect your device information, including the unchangeable device unique identifier (including IMEI, device serial number, OAID, MEID, Android ID, IMSI, GUID, OPENUDID, MAC address, SIM card serial number, SIM card IMSI information), hardware serial number, MAC address, IP address, location, login/logout time, usage time, installed APP information or running process information, click position and click time of the metronome homepage and settings menu.
  2. Sensor information: When you are using interstitial ads or video content, in order to adapt to the state of your device, we will call the device's gravity and acceleration sensor information to identify the horizontal and vertical screen state of your device and switch the corresponding state for you.
  3. Read WIFI scan results: When you use network-related functions of the app, insert advertisements or video content, we will read the WIFI scan results to determine whether you have a network or are connected to WIFI, and decide whether to proceed to the next step.
  4. When you use "Super Slow Running Metronome" and related services, in order to ensure the normal and safe operation of the software and services and optimize the service experience, we will collect your hardware model, operating system version number, unique device identifier (IMEI), network device hardware address (MAC), IP address, current running process information, obtain acceleration sensor gyroscope sensor distance sensor magnetic field sensor information, software version number, network access method, type, status, network quality data, operation log, service log information. Please understand that this information is necessary information that we must collect to provide services and ensure the normal and safe operation of the product. When you switch the application to run in the background, due to some device models and system reasons, the information collection behavior generated by using the relevant functions of this application before switching (such as device MAC address, device unique identifier, IP address, location) may not be stopped immediately, resulting in a short-term background information collection behavior.

(II) Providing you with other related product functions and services

In order to realize the following product functions and/or services, we may need to collect corresponding personal information from you. If you refuse to provide it, you will not be able to use this specific service.

  1. Customer Service: When you file a complaint, make an inquiry or appeal to Super Slow Running Metronome, we may need you to provide the device ID and other valid contact information in order to facilitate contact with you or help you solve the problem. If you refuse to provide the above information, we may not be able to provide you with timely feedback on the relevant processing results.
  2. Maintain product security and troubleshoot in a timely manner: To maintain the normal operation of our services, protect your account security, troubleshoot product failures, improve and optimize our services, we will collect your EXIF ​​data, IMEI, device model information, login IP address, and operation log information through third-party SDKs. This type of information must be collected to provide services, and will be de-identified after collection and will not be used to identify any specific user.

(III) Self-start and associated start instructions

In order to ensure that this application can normally receive broadcast information pushed by the client when it is closed or running in the background, this application must use the (self-start) capability. There will be a certain frequency of broadcasts sent by the system to wake up this application for self-start or related startup behavior, which is necessary for realizing functions and services.

The above information you provide will be authorized for us to use during your use of this service. During the period when you are not using this service, we will keep it for you and will not disclose it to any third party.

The above information will be stored in China, in the servers and data disks purchased by our company from Alibaba Cloud. Our company has activated the high-tech necessary protection tools of Alibaba Cloud services. Without your permission, we will not disclose it to any third party, except in the following circumstances:

2. How we use cookies

Cookies and similar technologies are commonly used technologies on the Internet. When you use the "Super Slow Running Metronome" software and related services, we may use related technologies to send one or more cookies or anonymous identifiers to your device to collect and store information when you visit and use this product. We use cookies and similar technologies mainly to achieve the following functions or services:

  1. Ensure the safe and efficient operation of products and services: We may set authentication and security cookies or anonymous identifiers to help us confirm whether you have logged into the service securely or whether you have encountered any theft, fraud or illegal activities. These technologies will also help us improve service efficiency and increase login and response speed.
  2. Help you have an easier access experience: Using such technologies can help you save the steps and processes of repeatedly filling in personal information and entering search content (for example: implementing a one-click login process).

III. How do we share, transfer, and publicly disclose your personal information?

1. Sharing

We will not share your personal information with any other company, organization or individual, except in the following circumstances:

  1. Sharing with explicit consent: We will share your personal information with other parties after obtaining your explicit consent.
  2. We may share your personal information with external parties in accordance with laws and regulations or the mandatory requirements of government authorities.
  3. Sharing with authorized partners: Some of our services will be provided by authorized partners only for the purposes stated in this Privacy Policy. We may share some of your personal information with our partners to provide better customer service and user experience. For example, companies we hire to provide third-party data statistics and analysis services may need to collect and access personal data for data statistics and analysis. In this case, these companies must comply with our data privacy and security requirements. We will only share your personal information for legitimate, lawful, necessary, specific and clear purposes, and will only share personal information necessary to provide services.
  4. We will sign strict confidentiality agreements with companies, organizations and individuals with whom we share personal information, requiring them to handle personal information in accordance with our instructions, this Privacy Policy and any other relevant confidentiality and security measures. Our partners have no right to use the shared personal information for any other purpose. Our partners include the following types:
    1. Advertising and analysis service partners. We may introduce such partners as Google Ads, Pangolin, Xiaomi Ads, Huawei Ads, OPPO Ads, Umeng, Tencent Bugly, Huawei Analytics, and Firebase to help us count and evaluate the contact effects of online advertising. Unless we obtain your permission, we will not share information used to identify you personally (information that can identify you, such as your name, ID number, phone number or email address, through which you can be contacted or identified). The information we will share with them is: hardware model, operating system version number, unique device identifier (IMEI), network device hardware address (MAC), IP address, software version number, network access method, type, status, network quality data, operation log, service log information, current running process information, and obtaining acceleration sensor, gyroscope sensor, distance sensor, and magnetic field sensor information). We will not share your personal sensitive information with partners.
    2. Functional and technical partners. We will introduce services provided by third parties in the application. We may only provide them with your hardware model, operating system version number, unique device identifier (IMEI), network device hardware address (MAC), IP address, and software version number information, and will not share information used to identify you personally.

(II) Transfer

We will not transfer your personal information to any company, organization or individual, except in the following circumstances:

  1. Transfer with explicit consent: We will transfer your personal information to other parties with your explicit consent;
  2. In the event of a merger, acquisition or bankruptcy liquidation, if personal information is transferred, we will require the new company or organization that holds your personal information to continue to be bound by this Privacy Policy. Otherwise, we will require the company or organization to re-solicit your authorization and consent.

(III) Public Disclosure

We will only disclose your personal information in the following circumstances:

  1. With your explicit consent;
  2. Disclosure based on law: We may disclose your personal information publicly when required by law, legal procedures, litigation or government authorities.

IV. How do we protect your personal information?

  1. We have used industry-standard security measures to protect the personal information you provide and prevent it from being accessed, disclosed, used, modified, damaged or lost without authorization. We will take all reasonable and feasible measures to protect your personal information. For example, when exchanging data (such as credit card information) between your browser and the "Service", it is protected by SSL encryption; we also provide https secure browsing for our website; we will use encryption technology to ensure the confidentiality of data; we will use trusted protection mechanisms to prevent data from being maliciously attacked; we will deploy access control mechanisms to ensure that only authorized personnel can access personal information; and we will hold security and privacy protection training courses to enhance employees' awareness of the importance of protecting personal information.
  2. We will take all reasonable and feasible measures to ensure that no irrelevant personal information is collected. We will only retain your personal information for the period necessary to achieve the purposes stated in this policy, unless the retention period needs to be extended or permitted by law.
  3. The Internet is not an absolutely secure environment, and emails, instant messaging, and communication with other our users are not encrypted. We strongly recommend that you do not send personal information through such means. Please use a complex password to help us ensure the security of your account.
  4. The Internet environment is not 100% secure. We will do our best to ensure or guarantee the security of any information you send to us. If our physical, technical, or management protection facilities are damaged, resulting in unauthorized access, public disclosure, tampering, or destruction of information, which in turn damages your legitimate rights and interests, we will bear the corresponding legal liability.
  5. In the unfortunate event of a personal information security incident, we will promptly inform you of the following in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, suggestions for you to prevent and reduce risks on your own, and remedial measures for you. We will promptly inform you of the relevant situation of the incident by email, letter, phone, or push notification. When it is difficult to inform the subject of personal information one by one, we will take reasonable and effective measures to issue an announcement. At the same time, we will also proactively report the disposal of personal information security incidents in accordance with the requirements of the regulatory authorities.

V. Your Rights

In accordance with relevant Chinese laws, regulations, and standards, as well as common practices in other countries and regions, we guarantee that you can exercise the following rights over your personal information:

1. Accessing your personal information

You have the right to access your personal information, except for exceptions provided by laws and regulations. If you want to exercise your right to access data, you can access it yourself in the following ways:

(II) Correcting your personal information

If you find that the personal information we process about you is wrong, you have the right to ask us to make corrections. You can make a correction request through the methods listed in "(I) Accessing your personal information". If you are unable to correct the personal information through the above link, you can send an email to fastingreply@outlook.com at any time. We will respond to your correction request within 3 working days.

(III) Deleting your personal information

You may request us to delete your personal information in the following circumstances:

  1. If our handling of personal information violates laws and regulations;
  2. If we collect and use your personal information without your consent;
  3. If our processing of personal information violates our agreement with you;
  4. If you no longer use our products or services, or you cancel your account;
  5. If we no longer provide products or services to you.

If we decide to respond to your deletion request, we will also notify the entities that obtained your personal information from us and request them to delete it in a timely manner, unless otherwise provided by laws and regulations, or these entities obtain your independent authorization. When you delete information from our services, we may not immediately delete the corresponding information from the backup system, but we will delete the information when the backup is updated.

(IV) Changing the scope of your authorization

Each business function requires some basic personal information to be completed (see "Part I" of this Policy). You can give or withdraw your authorization consent for the collection and use of additional personal information at any time. You can do this by yourself in the following ways:

Once you withdraw your consent, we will no longer process the corresponding personal information. However, your decision to withdraw your consent will not affect the previous processing of personal information based on your authorization. If you do not want to accept the commercial advertisements we send you, you can cancel at any time by the following methods: Log out

(V) Deletion of account by the personal information subject

If you want to completely delete all your account information, please find the 'Clear all data' button in the settings. After confirmation, all your registration information in the software will be cleared directly.

(VI) Personal Information Subject Obtains a Copy of Personal Information

You have the right to obtain a copy of your personal information, which you can do by:

Where technically feasible, such as data interface matching, we may also transfer a copy of your personal information directly to a third party designated by you upon your request.

7. Constraining information system automatic decision-making

In certain business functions, we may make decisions solely based on non-manual automatic decision-making mechanisms, including information systems and algorithms. If these decisions significantly affect your legal rights and interests, you have the right to ask us for an explanation, and we will provide appropriate relief.

(VIII) Responding to your above requests

For security reasons, you may need to provide a written request or prove your identity in other ways. We may ask you to verify your identity before processing your request.

We will respond within 3 working days. If you are not satisfied, you can also complain through the following channels:

In principle, we do not charge you for reasonable requests, but we will charge a certain cost for repeated requests that exceed reasonable limits. We may reject requests that are unreasonably repeated, require too many technical means (for example, require the development of new systems or fundamentally change existing practices), pose risks to the legitimate rights and interests of others, or are extremely impractical (for example, involving information stored on backup tapes).

In the following circumstances, we will be unable to respond to your request in accordance with laws and regulations:

  1. Related to national security and national defense security;
  2. Related to public safety, public health, and major public interests;
  3. Related to the investigation, prosecution and trial of crimes;
  4. There is sufficient evidence that you have subjective malice or abuse of rights;
  5. Responding to your request will cause serious damage to the legitimate rights and interests of you or other individuals or organizations.

VI. How do we handle children’s personal information?

  1. Our products are mainly for adults. Children should not create their own personal information subject accounts without the consent of their parents or guardians. If you are under the age of 14, before using our products or services, please be sure to read this policy in the company of your guardian and make sure that you have obtained your guardian's explicit consent before using our services.
  2. When collecting children’s personal information when using our products or services with the consent of their guardians, we will only use, share, transfer or disclose this information when permitted by laws and regulations, with the explicit consent of the guardians or when it is necessary to protect the children.
  3. If your guardian does not agree with your use of our services or provision of personal information to us in accordance with this Policy, please immediately terminate your use of our services and notify us in a timely manner.

VII. How your personal information is transferred globally

In principle, the personal information we collect and generate within the territory of the People's Republic of China will be stored within the territory of the People's Republic of China.

Since we provide products or services through resources and servers around the world, this means that, after obtaining your authorization and consent, your personal information may be transferred to or accessed from jurisdictions outside the country/region where you use the product or service. Such jurisdictions may have different data protection laws or even no relevant laws. In such cases, we will ensure that your personal information is adequately protected within the territory of the People's Republic of China. For example, we will request your consent to the cross-border transfer of personal information, or implement data de-identification security measures before cross-border data transfer.

8. Applicable Law and Jurisdiction

This Personal Information Protection Policy is subject to the laws of mainland China. Any dispute arising from this Personal Information Protection Policy shall be subject to the jurisdiction of the court where the defendant resides.

IX. How to update this policy

Our personal information protection policy may be changed from time to time according to business adjustments, changes in laws, regulations or policies. Without your explicit consent, we will not reduce the rights you should enjoy under this personal information protection policy. We will publish any changes to this policy on a dedicated page. For major changes, we will notify you through pop-ups or push notifications in the product or service. If you do not agree to the revised personal information protection policy, you have the right and should immediately stop using our products and/or services. If you continue to use our products and/or services, it will be deemed that you accept the changes we have made to the relevant terms of this policy.

Major changes referred to in this policy include but are not limited to:

  1. Changes in the purposes for which we process personal information, the types of personal information we process, or the ways in which we use personal information;
  2. Changes in your rights to participate in the processing of personal information and how to exercise them;
  3. When the personal information security impact assessment report indicates that there is a risk.

10. Our Contact Information

If you have any questions or comments about this Privacy Policy or need to complain or report that your information has been damaged, please contact us through the following methods:

11. Appendix: Permission Application and Application Scenarios

App permissions Permission Description Permission usage scenarios
Network permissions IP address, carrier information, WiFi status Used for account services and to ensure network service stability. IP addresses and WiFi status are also used for traffic grouping strategies, etc.
location information System country/region information Advertising traffic grouping strategy
Get mobile phone information Device identifiers (such as AndroidID, hardware serial number build_serial, GAID, IMEI, MEID, device MAC address, OAID, IMSI; specific fields vary depending on the software and hardware versions) Read the phone status, which involves the IMEI information of the user's device, which is used to identify the user, protect your account, network, operation and system security, prevent phishing fraud and Trojan viruses, and conduct user data statistics (installation, activity, etc.).
Read and write mobile phone storage Access photos, media content, and files on your device For information caching
Self-start and associated start instructions In order to ensure that this application can normally receive broadcast information pushed by the client when it is closed or running in the background, this application must use the (self-start) capability. There will be a certain frequency of broadcasts sent by the system to wake up this application for self-start or related startup behavior, which is necessary for realizing functions and services.