Privacy Policy

Welcome to use the services provided by Echo Eye! Shenzhen Heshengcheng Company (hereinafter referred to as Shenzhen Heshengcheng Technology Co., Ltd. and its affiliates, also referred to as "we") attaches great importance to the protection of your privacy and personal information. Echo Eye Privacy Policy (hereinafter referred to as "this Agreement") applies to your use of Echo Eye services in different ways, including the official website, multiple application versions including Echo Eye such as IOS and Android, and smart devices equipped with Echo Eye.

You can use Echo Eye to connect devices, obtain device information , set button functions , chat with AI Q& A, and use WiFi real-time video (hereinafter collectively referred to as "Echo Eye products or services"). We will only process the personal information required for your use of products or services.

This Agreement is intended to help you understand what personal information we collect, why we collect it, what we do with it, and how to protect it. We will collect and use your personal information in accordance with the Privacy Policy, but we will not collect all of your personal information in a mandatory bundling manner simply because you authorize and agree to this Agreement. We will strictly follow the requirements of laws and regulations and seek your separate consent in specific circumstances. In addition to this Agreement, we may also explain to you the rules for our processing of your personal information through product page notifications, pop-up prompts, etc. The processing of personal information corresponding to specific business functions will be subject to the specific rules, and the specific rules have the same effect as this Agreement.

Unless otherwise provided by laws and administrative regulations, you have the right to know and decide how we handle your personal information, and you have the right to restrict or refuse us or other parties from processing your personal information. At the same time, you have the right to ask us to explain the personal information processing rules we provide to you. Please read and understand this Agreement carefully before using Echo Eye related products and services so that you can make appropriate choices.

This agreement will help you understand the following:

1. Information we collect and the purposes for which we use it

2. How we use cookies and similar technologies

3. How we share, transfer, and publicly disclose your personal information

4. How do we store and protect your personal information?

5. Your rights

6. Third-party SDKs

8. How to update this agreement

9. How to Contact Us

We are fully aware of the importance of personal information to you, and we are also fully aware that providing effective protection for your information is the cornerstone of the healthy and sustainable development of our business. Thank you for your use and trust in Echo Eye! We are committed to maintaining your trust in us and abiding by the following principles to protect your personal information: the principle of consistency of rights and responsibilities, the principle of clear purpose, the principle of choice and consent, the principle of minimum sufficiency, the principle of ensuring safety, the principle of subject participation, the principle of openness and transparency, etc. We solemnly promise that we will take appropriate security measures to protect your personal information in accordance with the mature security standards of the industry.

1. Information we collect and the purposes for which we use it

We will collect and use your personal information in accordance with the principles of legality, legitimacy and necessity. Specifically, we collect and process your personal information in order to provide you with corresponding business functions . In the corresponding functions, if you provide the personal information of others, please ensure that you have obtained the authorization of the relevant subject. We reserve the right to verify the legal source of such personal information at any time.

You need to provide us with personal information for us to implement the basic business functions of Echo Eye. The information required to implement the basic business functions is necessary personal information. If you refuse to provide such necessary personal information, we will not be able to provide you with the basic business functions and corresponding services. In addition to the basic business functions, you can choose to provide us with some personal information for us to implement the extended business functions of Echo Eye. We will inform you of the purpose of use and process such personal information based on your authorization or the purpose necessary to implement the extended business functions you choose. Your refusal to provide such extended business function information will not affect your use of our basic business functions, but if you refuse to provide the personal information necessary to implement the extended business functions, we will not be able to provide you with the extended business functions.

For your convenience, we list the business functions we provide, the purposes of processing, and the personal information required as follows:

Information collection function description

(a) Device information, including: device serial number, IMEI, Android ID, OAID, GAID, MAC address, installed APP information, used for registration and binding of unique device account and binding of user membership rights;

(b) Storage permissions are used to save and display user information, cache error information, etc.;

(c) Access network connections, which may generate GPRS traffic;

(d) Obtain network information status to remind users to pay attention to traffic consumption;

(e) Voice permission, used for user voice recognition and voice communication;

(f) Location permission, used to scan nearby Bluetooth devices to obtain recording location information;

(g) Bluetooth permissions, used for scanning and connecting to nearby Bluetooth devices;

1.1. Register and log in to your account

Device information includes: device serial number, IMEI, AndroidID, OAID, GAID, MAC address, installed APP information, used for registration and binding of unique device account, binding of user membership rights, you can create an Echo Eye account through your mobile phone number, and you can complete your account information. When registering and logging in to an Echo Eye account, you need to provide us with your mobile phone number or email address .

1.2. Providing you with intelligent voice services

When you activate the Echo Eye program, we will automatically receive and record audio, video and other related information (including appropriate environmental parameters, such as noise indicators) generated during your interaction with the device terminal for the purpose of providing services to you. Please note that if the wake-up function of the program is turned on, when Echo Eye receives a wake-up action, she will be awakened, and we will only collect voice information after receiving the wake-up action. If you refuse us to collect the above information, please turn off the device's information collection function or do not wake up the device, but this will also result in you being unable to obtain related services.

In order to provide you with voice recognition and conversation functions, we need to collect the voice information you input and device identifier . If you do not provide this information, you will not be able to perform voice recognition and text input through Echo Eye.

When you use the intelligent voice interaction function of Echo Eye, you can interact with Echo Eye by voice input. At this time, we will ask you to authorize microphone permissions and collect your voice information (only for text conversion), which will be deleted immediately after processing and will not be retained. We will automatically receive and record the text conversation information converted from your voice during the interaction with Echo Eye, and use this information to output content to you to provide human-computer interaction services. At the same time, we will store the aforementioned text conversation information for your subsequent inquiries. If you refuse us to collect and process the aforementioned personal information, please enter the aforementioned information with caution, but this may affect your normal use of the aforementioned functions.

1.3. Complete payment

When you use the payment function, we will collect the payment method, order information, and paid content information you set . You can choose the payment service provided by a third-party payment institution (WeChat Pay, Apple Pay). The payment behavior itself does not collect your personal information, but we need to share your order number and transaction amount information with these payment institutions so that they can confirm your payment instructions and complete the payment.

1.4. Smart device connection and control

We collect your device information in order to provide more suitable services for different device terminals.

In order to ensure that we can provide you with normal services, we will collect your mobile phone MAC address, smart device MAC address, device Bluetooth MAC address, WiFi MAC address, network card MAC address in the background state , so that you can safely connect and manage smart devices and Bluetooth devices. In addition, in the background state, we will also collect your IMEI information for daily activity data statistics.

When you use the AI function of your smart device, we will apply for microphone and recording permissions to collect your voice input content for the purpose of voice-to-text, recording and translation. We will encrypt your voice input content for transmission and processing, and delete it immediately after the purpose of use is achieved to ensure data security and prevent it from being used for other purposes.

1.5. New service and function operation and customer service processing

If you participate in relevant operational activities, we may collect your identity information, contact information, transaction account information through the operational activity interface in order to contact you and send you operational rewards, etc. If you do not participate in relevant operational activities, you do not need to provide the aforementioned information.

To ensure call quality and that disputes are properly resolved, we may save records of your communications with us, including call records , information you provide related to your dispute resolution, and contact information you use or provide.

1.6. To ensure service security, optimize and improve service purposes

When you use Echo Eye, we will collect your device information, location information, log information and other information related to the login environment in order to ensure that you can use the Echo Eye service normally, more accurately locate and solve the problems you encounter when using the Echo Eye service, protect the security of your account, prevent, discover and investigate fraud, security hazards, illegal or violations of our agreements, policies or rules, and protect the legitimate rights and interests of you, us or our affiliates, partners and the general public .

Please understand that when you switch Echo Eye from the device screen to the background of the device, due to some device models and system reasons, the information collection generated by your previous use of Echo Eye related functions may not be stopped immediately, resulting in a short period of background information collection.

1.7 . Additional functions based on location information

When you use the location-based services provided by Echo Eye, we may collect and process information about your device, location information , and network identity information so that you can use the following services without manually entering your own geographic coordinates. Location information includes precise location information obtained through GPS information, WLAN access points, Bluetooth, base stations, and other sensor information , as well as rough geographic location information obtained through IP addresses or other network information. When you use the following features, we will request authorization for precise geographic location permissions. If you refuse to authorize precise geographic location permissions, we will not provide you with the above services based on precise location information. We will only provide you with services through the city and/or county information corresponding to the IP address or other network information and the rough location information inferred based on other network location information. Please understand that the IP address information we use has been de-identified, and data analysis and speculation only correspond to specific codes that cannot be directly associated with your identity, and will not be associated with your real information.

When you use the device adding function, we will collect your location information to ensure that devices near you can be discovered via Bluetooth.

stop collecting your precise location information at any time by canceling the system authorization for Echo Eye to access your precise location information. After that, you may not be able to use the above-mentioned services or functions based on precise location information, or achieve the intended effects of the above-mentioned services based on precise location information. However, this will not affect your normal use of other business functions of Echo Eye that are not based on precise location information.

1.8 . Additional microphone-based services:

When you use Echo Eye products or services, you can enable microphone permission to record. We will collect your recording content and process the voice content based on the functional purpose. For the AI voice question and answer function, we will also collect the identifier of the receiving device to achieve the purpose of transmitting and playing voice information to the Echo Eye you specify.

1.9 . Exceptions to prior authorization

Please note: In the following circumstances, the collection and use of personal information does not require your prior authorization and consent:

Directly related to national security and national defense security;

Necessary for the conclusion or performance of a contract to which the individual is a party;

Necessary for the performance of statutory duties or obligations;

It is necessary to respond to public health emergencies or to protect the life, health and property safety of natural persons in an emergency;

Directly related to criminal investigation, prosecution, trial and execution of judgment;

To protect your or other individuals' life, property and other major legal rights and interests, but it is difficult to obtain their consent;

Collect personal information that you have disclosed to the public or that has been legally disclosed within a reasonable scope in accordance with laws and regulations;

Collect your personal information from legally disclosed information within a reasonable scope in accordance with laws and regulations, such as legal news reports, government information disclosure and other channels;

Carry out news reporting, public opinion supervision and other activities for the public interest and process personal information within a reasonable scope;

When academic research institutions conduct statistical or academic research based on public interests and provide the results of academic research or descriptions to the public, they shall de-identify the personal information contained in the results;

Other circumstances prescribed by laws and regulations.

1.1 1. Anonymization of personal information

Without disclosing or providing your personal information to any third party, Heshengcheng has the right to mine, analyze and utilize (including commercially) the anonymized user database, compile statistics on product/service usage and share the anonymized statistical information with the public/third parties.

1.1 2. Device permission call

In the process of providing services, in order to ensure that you can use the product functions normally, we will apply to the system for the following system device permissions for your device. We will ask for your consent before applying, and you can choose to "allow" or "forbid" the permission application. After your authorization, we will enable the relevant permissions. You can cancel the authorization in the system at any time. If you cancel the authorization, you will be unable to use the relevant business functions, but it will not cause you to be unable to use other business functions.

When you use Echo Eye When using the APP, we call the privacy permissions of the mobile phone system as follows:

Device permissions

Business Functions

Permission authorization method

Can it be closed?

Access Phone Status

User device identification

When the user opens the App for the first time, a pop-up window asks

yes

Location

Address Management

Pop-up window to ask when the user performs location-related services for the first time

yes

microphone

Live recording, simultaneous interpretation, face-to-face translation, AI chat

A pop-up window will appear when you use a voice-related function for the first time

yes

Wireless network

Network connection for various business functions

When the user opens the App for the first time, a pop-up window asks

yes

Bluetooth

Device adding; device connection; device setting

When the user uses the related function for the first time, a pop-up window will be displayed to ask

yes

notify

Send notification message

When the user opens the App for the first time, a pop-up window asks

yes

IDFA

Keep your account safe

When the user opens the App for the first time, a pop-up window asks

yes

 

 

 

 

The way permissions are displayed and closed may vary on different devices. Please refer to the instructions or guidelines of the device and system developer for details.

1.1 3. Other purposes you agree to

When we want to use the information for other purposes not specified in this Agreement, we will ask for your consent in advance. When we want to use the information collected for a specific purpose for other purposes, we will ask for your consent in advance.

2. How we use cookies and similar technologies

Cookies and anonymous identifiers . Cookies are a mechanism that enables a server (or script) to store and retrieve information on a client. When you use an Echo Eye product or service, we will send one or more cookies or anonymous identifiers to your device. When you interact with an Echo Eye service, we allow cookies or anonymous identifiers to be sent to Heshengcheng.

Company servers. Cookies usually contain identifiers, site names, and some numbers and characters.

We will not use cookies for any purpose other than the purposes described in this Agreement. You can manage or delete cookies according to your preferences. For more information, please see AboutCookies.org. You can clear all cookies saved on your computer, and most web browsers have the function of blocking cookies. However, if you do this, you will need to change your user settings personally every time you visit our website, but you may not be able to log in or use services or functions that rely on cookies due to such changes.

You can clear your cookies and limit the use of cookies by going to [My] - [Settings] - [Clear Cache].

3. How we share, transfer, publicly disclose, and entrust your personal information to third parties

Some of our services will be provided by authorized partners. We may share some of your personal information with partners only for the purposes stated in this Agreement to provide better customer service and user experience. We will only share your personal information for legitimate, legal, necessary, specific and clear purposes, and will only share personal information necessary to provide services. Unless otherwise authorized by you or required by laws and regulations, our partners have no right to use the shared personal information for any other purpose.

3.1. Sharing

Unless you agree in advance or in accordance with other laws and regulations, we will not share your personal information with any third party other than Heshengcheng Company, except when the personal information cannot be identified and cannot be restored after processing.

For companies, organizations and individuals with whom we share personal information, we will investigate their data security environment, sign strict confidentiality agreements with them, and require them to take confidentiality and security measures in accordance with the law to handle personal information.

We may share your personal information with the following third parties in the following circumstances:

3.1.1. Third-party product or service providers.

Echo Eye has access to a wide range of third-party services. When you use third-party services accessed by Echo Eye, you may need to submit your personal information. We will provide your personal information to the third party that provides you with services based on your valid authorization or when it is necessary to conclude or perform a contract to which an individual is a party. For details on how third-party services collect and use your personal information, we recommend that you refer to the relevant service agreements and privacy policies of the third-party services .

When you participate in marketing activities or service content provided by a third party, you may be required to provide account nickname, avatar, name, contact information and other information based on service needs. We will share your personal information with the third party with your separate consent or when it is necessary for the third party to provide you with marketing activities or service content, so as to ensure that the third party can smoothly provide you with services or redeem rewards to you in a timely manner. If you refuse to share when it is necessary to provide you with marketing activities or service content, the third party will not be able to provide you with services or refuse your participation.

3.2. Transfer

We will not transfer your personal information to any company, organization or individual other than Heshengcheng , except in the following circumstances:

Obtain your explicit authorization or consent in advance;

To comply with laws, regulations, legal processes, or mandatory government requests or judicial decisions;

If we or our affiliates are involved in mergers, divisions, liquidations, acquisitions or sales of assets or businesses, and if personal information is transferred, we will ensure the confidentiality of such information during the transfer and inform you of the name and contact information of the recipient. At the same time, we will require the transferee to use the same or higher standards and requirements as this policy for processing and protection, otherwise we will require the transferee to re-ask for your consent. In addition, we will anonymize or destroy personal information that has no data recipient.

3.3. Public Disclosure

We will only disclose your personal information in the following circumstances:

Obtain your separate consent;

Based on laws, regulations, legal procedures, litigation or mandatory requirements of government authorities.

When announcing penalties for violating accounts and violations, we will disclose the information of the relevant accounts, which will inevitably include account-related authentication information and violation status.

3.4. Exceptions to prior authorization and consent when sharing, transferring, or publicly disclosing personal information

In the following circumstances, the sharing, transfer, and public disclosure of personal information does not require the prior authorization and consent of the personal information subject:

Directly related to national security and national defense security;

Necessary for the conclusion or performance of a contract to which the individual is a party;

Necessary for the performance of statutory duties or obligations;

Directly related to public safety, public health, and major public interests. For example, necessary to respond to public health emergencies, or to protect the life, health, and property safety of natural persons in an emergency;

Directly related to criminal investigation, prosecution, trial and execution of judgment;

For the purpose of protecting the life, property and other major legitimate rights and interests of the personal information subject or other individuals, but it is difficult to obtain the consent of the individual;

Process personal information that is disclosed by individuals themselves or has been legally disclosed within a reasonable scope in accordance with laws and regulations, such as legal news reports, government information disclosure and other channels.

Circumstances where laws and administrative regulations provide otherwise.

3.5. Third-party software development kits (SDKs) we connect to

In order to adapt to the use of Echo Eye and third-party platform services on different mobile devices, to achieve your mobile device identity authentication, mobile device security, login to third-party platform accounts, information sharing through third-party platforms, and payment security, Echo Eye has access to third-party SDKs. The above-mentioned third-party SDK providers include mobile device manufacturers, social platforms, communication operators, and third-party payment institutions. Some third-party SDKs may call your device permissions and obtain your relevant information so that you can use the corresponding functions normally on different mobile devices or third-party platforms. The types of device permissions called by different third-party SDKs and the information obtained may be different, which may include obtaining your location, reading/writing your external storage card, reading your phone status and identity, viewing WLAN connections, and retrieving running applications/Bluetooth information. Regarding the specific types of device permissions called by third-party SDKs, and how to collect and use your personal information, it is recommended that you refer to the relevant service agreement and privacy policy of the third-party SDK. If you want to learn more about the third-party SDKs we have accessed, please read the third-party SDK situation description .

3.6 Entrusted Processing and Joint Processing

In order to provide you with better services, we may entrust third-party partners to process your personal information. We will only entrust third-party partners to process your information for legal, legitimate, necessary, specific and clear purposes. We will strictly limit the information processing purposes of the trustee and require the trustee to take adequate data security measures. If a third-party partner uses your information for purposes not entrusted by us, it will obtain your consent separately. The authorized partners we entrust include authorized partners of advertising and analysis services. We will entrust these partners to process information related to advertising, advertising effects, and advertising reach under the premise of complying with industry-standard security technologies. Among them, in order to identify the effect of advertising clicks on smart devices, we may provide the advertising partners with the IMEI and OAID of the mobile phone equipped with the Echo Eye APP bound to the device in an encrypted manner . Without your effective authorization, we will not entrust third-party partners to process information that can directly identify your personal identity. If you actively leave your contact information, address information and other personal information for a specific third-party partner so that they can contact you, they will directly process your personal information.

In the joint processing scenario, we will also sign relevant agreements with our partners in accordance with the requirements of laws and regulations and fulfill relevant personal information protection obligations.

4. How do we store and protect your personal information?

4.1. Shelf life

We will retain your personal information for the period necessary to provide services. However, if laws and regulations provide otherwise for the retention period, you agree to retain it for a longer period, to ensure the safety and quality of the services, to achieve dispute resolution purposes, or it is technically difficult to achieve, after the expiration of the aforementioned retention period, we will extend the retention period in accordance with the law, contract, or within a reasonable range.

After the retention period expires, we will delete your personal information or anonymize it in accordance with legal provisions.

4.2. Storage area

In principle, the personal information we collect and generate within the territory of the People's Republic of China will be stored within the territory of the People's Republic of China. If your personal information may be transferred to a jurisdiction outside the country/region where you use the product or service, or accessed from these jurisdictions, we will strictly fulfill the obligations required by laws and regulations and obtain your separate consent in advance in accordance with the law . Such jurisdictions may have different data protection laws or even no relevant laws. In such cases, we will transfer your personal information in accordance with the provisions of the current laws of China and ensure that your personal information is sufficiently and equally protected within the territory of the People's Republic of China. For example, we will request your consent to the cross-border transfer of personal information, or implement security measures such as data de-identification before cross-border data transfer.

4.3. Security measures

We will collect, use, store and transmit user information based on the principle of “minimization” and inform you of the purpose and scope of use of the relevant information through the User Agreement and Privacy Policy.

We attach great importance to information security. We have set up a dedicated team to develop and apply a variety of security technologies and procedures. We will conduct security background checks on security management personnel and key security positions. We have established a complete information security management system and internal security incident handling mechanism. We will take appropriate security measures and technical means that meet industry standards to store and protect your personal information to prevent your information from being lost, unauthorized access, public disclosure, use, damage, loss or leakage. We will take all reasonable and feasible measures to protect your personal information. We will use encryption technology to ensure the confidentiality of data; we will use trusted protection mechanisms to prevent data from being maliciously attacked.

We will train and assess employees on data security awareness and security capabilities, and strengthen their awareness of the importance of protecting personal information. We will authenticate and control the identities of employees who handle personal information, and sign confidentiality agreements with employees and partners who have access to your personal information, clarify job responsibilities and codes of conduct, and ensure that only authorized personnel can access personal information. If there is any violation of the confidentiality agreement, the cooperative relationship with Heshengcheng will be terminated immediately , and relevant legal responsibilities will be pursued. Confidentiality requirements are also made for personnel who have access to personal information when they leave their posts.

We remind you that the Internet is not an absolutely safe environment. When you exchange your geographic location or whereabouts with other users through third-party social software, email, text messages, etc. embedded in Echo Eye , you are not sure whether the third-party software completely encrypts the transmission of information. Please pay attention to ensure the security of your personal information .

We also ask you to understand that in the Internet industry, due to the limitations and rapid development of technology and the various possible malicious attacks, even if we do our best to strengthen security measures, it is impossible to always guarantee 100% security of information. Please understand that the system and communication network you use when using our products and/or services may have security problems in other links beyond our control .

4.4. Security Incident Notification

We will formulate emergency plans for network security incidents and promptly deal with security risks such as system vulnerabilities, computer viruses, network attacks, and network intrusions. When an incident that endangers network security occurs, we will immediately activate the emergency plan, take appropriate remedial measures, and report to the relevant competent authorities in accordance with regulations.

The leakage, damage, and loss of personal information are considered company-level major security incidents. We will be responsible for regularly organizing working group members to conduct security plan drills to prevent such security incidents from happening. If unfortunately, we will activate the emergency plan with the highest priority, form an emergency response team, trace the cause and reduce the loss in the shortest time.

After the unfortunate occurrence of a personal information security incident, we will promptly inform you of the basic situation and possible impact of the security incident, the measures we have taken or will take, suggestions for you to prevent and reduce risks on your own, and remedial measures for you in accordance with the requirements of laws and regulations. We will promptly inform you of the relevant situation of the incident through in-site notifications, SMS notifications, phone calls, emails, and other contact information you have reserved. When it is difficult to inform you one by one, we will take reasonable and effective ways to issue announcements. At the same time, we will also proactively report the handling of personal information security incidents in accordance with the requirements of the regulatory authorities. Please understand that according to the provisions of laws and regulations, if the measures we take can effectively avoid harm caused by information leakage, tampering, and loss, we can choose not to notify you of the personal information security incident unless the regulatory authorities require you to be notified.

5. Your rights

In accordance with relevant Chinese laws, regulations, and standards, as well as common practices in other countries and regions, we guarantee that you can exercise the following rights regarding your personal information. If you have any questions or claims regarding the exercise of your rights, you can also contact us through the methods in [8. How to Contact Us]:

5.1. Right of access

In principle, you can access your personal information in the following ways:

Account information: Visit [My] - [Settings] - [Account Management] to access or edit the personal profile information in your account.

5.2 . Right to erasure

You may request us to delete your personal information in the following circumstances:

If we process your personal information in violation of laws, regulations or our agreement with you;

If our processing purposes have been achieved, cannot be achieved or are no longer necessary for the fulfilment of processing purposes;

If we stop providing products or services, or the shelf life has expired;

If you withdraw your consent;

Other circumstances prescribed by laws and administrative regulations.

When you delete information from our services, we may not delete the corresponding information from the backup system immediately, but we will delete the information when the backup is updated. Please be aware and understand that if the retention period prescribed by laws, administrative regulations or described in this Agreement has not expired, or it is technically difficult to delete personal information, we will stop processing except for storage and taking necessary security protection measures.

5.3 . Withdrawal of consent

Each business function requires some basic personal information to be completed. You can give or withdraw your authorization consent for the collection and use of additional personal information at any time.

You can directly turn off system permissions such as storage, location information, camera, microphone, camera, address book, etc. in the device system, change the scope of consent or withdraw your authorization.

Once you withdraw your consent, we will no longer be able to provide you with the services corresponding to the consent you have withdrawn, and we will no longer use your corresponding personal information. However, your decision to withdraw your consent will not affect the processing of personal information previously carried out based on your consent.

5.4 . Right of cancellation

You can log out of your account on Echo Eye by following the path: [My] - [Settings] - [Account Logout].

    Once you cancel your account, you will not be able to use the services of all Heshengcheng products, so please proceed with caution. In order to protect the legitimate rights and interests of you or others, we will determine whether to support your cancellation request based on your use of Heshengcheng products. Unless otherwise provided by laws and regulations, we will stop providing you with products and services after canceling your account and delete your personal information as required by you.

5.6. Right of reproduction and right of portability

You have the right to copy your personal information that we have collected. Under the conditions stipulated by laws and regulations, and in compliance with the instructions and conditions stipulated by the national cybersecurity and informatization department, if technically feasible, you can also ask us to transfer your personal information to other entities designated by you.

5.7. The right to be notified in advance of product and service discontinuation.

Echo Eye is willing to accompany you all the time. If Echo Eye products cease to operate due to special reasons, we will notify you within a reasonable period of time on the main page of the product or service or in-site letter or send you an email or other appropriate means to reach you, and will stop collecting your personal information. At the same time, we will delete or anonymize your personal information that has been collected in accordance with legal provisions.

5.8. Right to explanation

You have the right to ask us to explain our personal information processing rules. You can contact us through the contact information in Section 8.

5.9. Exceptions to the exercise of rights

We may not be able to respond to your requests for review, correction, supplement, deletion, copy, portability, information, and decision in the following circumstances:

Directly related to national security and national defense security;

Directly related to public safety, public health, and major public interests;

Directly related to criminal investigation, prosecution, trial and execution of judgment;

We have sufficient evidence to show that you have subjective malice or abuse of rights (for example, your request will endanger public safety and the legitimate rights and interests of others, or your request is beyond the scope of general technical means and commercial costs);

Responding to the request of the personal information subject will cause serious damage to the legitimate rights and interests of you or other individuals or organizations;

Involving trade secrets;

Circumstances where laws and administrative regulations provide otherwise.

5.10. How to respond to your rights request

For security reasons, you may need to provide a written request or prove your identity in other ways. We may ask you to verify your identity before processing your request. After verification, we will respond within fifteen working days.

In principle, we do not charge fees for your reasonable requests, but we will charge a certain cost for repeated requests that exceed reasonable limits. We may reject requests that are unreasonably repeated, require too many technical means (for example, require the development of new systems or fundamentally change existing practices), pose risks to the legitimate rights and interests of others, or are extremely impractical.

6. Third-party SDKs

When the third-party SDK is in silent mode or running in the background, it will collect your relevant device information at a certain frequency, and we cannot control the background operation and collection behavior of the third-party SDK. The acquisition and use of such information will comply with the SDK's own privacy policy, but we will fulfill our reasonable supervision obligations.

(a) Location SDK (com.amap.api.location) Information collected Device information: device identifiers (such as IMEI, Android ID, MAC address, GPS location information. Use the collected location information to provide accurate positioning services, including navigation, location query and other functions. Developer: AutoNavi Software Co., Ltd. Privacy link: https://lbs.amap.com/pages/privacy/

(b) Information collected by WeChat OpenSDK (com.tencent.mm.opensdk) Device identifiers (such as IMEI, Android ID, MAC address) are used to support WeChat payment functions, including payment information processing and payment result callback. Developer: Shenzhen Tencent Computer Systems Co., Ltd. Privacy link: https://support.weixin.qq.com/cgi-bin/mmsupportacctnodeweb-bin/pages/RYiYJkLOrQwu0nb8

(c) Tencent Speech Recognition SDK (com.tencent.speech) collects information device identifiers (such as IMEI, Android ID, MAC address), user voice input data. Used to convert user voice input into text and provide speech recognition and synthesis functions. Developer: Shenzhen Tencent Computer Systems Co., Ltd. Privacy link: https://open.tencent.com

(d) Information collected by Microsoft Speech Recognition SDK (com.microsoft.cognitiveservices.speech) Device identifiers (such as IMEI, Android ID, MAC address), user voice input data. Used to convert user voice input into text and provide speech recognition and synthesis functions. Developer: Microsoft Corporation Privacy link: https://privacy.microsoft.com/en-us/privacystatement

(e) Information collected by Baidu Speech Recognition SDK (com.baidu.speech) Device identifiers (such as IMEI, Android ID, MAC address), user voice input data. Used to convert user voice input into text and provide speech recognition and synthesis functions. Developer: Beijing Baidu Netcom Technology Co., Ltd. Privacy link: https://ai.baidu.com/ai-doc/REFERENCE/Qkdykq1r3

(f) Information collected by Tencent Audio and Video SDK (com.tencent.qcloud) Device identifiers (such as IMEI, Android ID, MAC address) and accelerometers are used to implement common functions in video call scenarios, such as two-person audio and video calls, group audio and video calls, mid-way calls to third parties, AI call noise reduction, call freeze optimization, etc. The accelerometer is used to obtain the horizontal and vertical screen states of the mobile phone during video calls to adapt to the direction of the captured image. Developer: Shenzhen Tencent Computer Systems Co., Ltd. Privacy link: https://cloud.tencent.com/document/product/1640/80198

7. How do we handle personal information of minors?

Heshengcheng Company attaches great importance to the protection of information of minors.

Our products and services are mainly for adults. We will only process personal information of minors with the permission of laws and regulations and the consent of parents or other guardians.

If you are a minor under the age of 14, before using Echo Eye products and services, you should ask your parents or other guardians to read this Agreement carefully, or read this Agreement carefully together with your parents or other guardians under the supervision and guidance of your parents or other guardians, and use our products and services or provide information to us only with the consent of your parents or other guardians .

If we find that we have collected personal information of minors under the age of 14 without the prior verifiable consent of their parents or other guardians, we will take measures to delete the relevant information as soon as possible. If at any time the guardian has reason to believe that we have collected the personal information of minors without the guardian's consent, please contact us at fapiaozhuanyong@hsc-tech.cn and we will take measures to delete the relevant data as soon as possible.

1. If you are a minor under the age of 18, you should carefully read and agree to this Agreement under the supervision and guidance of your guardian and with the consent of your guardian before you can use the Echo Eye software and related services. If you do not obtain the consent of your guardian, the guardian can contact the customer service contact information officially published by Heshengcheng Company to notify Heshengcheng Company to handle the relevant account. The company has the right to restrict the functions and use of the relevant account, including but not limited to browsing, posting information, interactive communication and other functions.

2. Heshengcheng Company attaches great importance to the protection of personal information of minors. When minors fill in their personal information, please strengthen their awareness of personal protection and treat it with caution. They should obtain the consent of their guardians and use Echo Eye software and related services correctly under the guidance of their guardians.

3. Minor users and their guardians understand and confirm that if you violate laws and regulations or the contents of this Agreement, you and your guardian shall bear all legal responsibilities that may result therefrom in accordance with the law.

4. Heshengcheng Company provides a youth mode specifically for minors, and guardians should choose to use the youth mode for minors.

5. Special tips for minors

(1) Minors who use Echo Eye software and related services should learn to use the Internet correctly within a reasonable range under the supervision and guidance of their guardians, avoid being addicted to the virtual online space, and develop good Internet habits;

(2) Young users must abide by the National Youth Internet Civility Convention;

(3) Be good at online learning and avoid browsing harmful information;

(4) Communicate honestly and in a friendly manner, and do not insult or deceive others;

(5) Enhance self-protection awareness and do not casually date online friends;

(6) Maintain network security and do not disrupt network order;

(7) It should be beneficial to physical and mental health, and not addictive to virtual time and space.

6. In order to better protect the privacy rights and interests of minors, Heshengcheng Company specially reminds you to be cautious when publishing content containing materials related to minors. Once published, it is deemed that you have obtained the consent of the rights holder to display the portraits, voices and other information of minors in the Echo Eye software and related services, and allow the company to use and process such content related to minors in accordance with this agreement.

 

8. Revision of Privacy Policy

Our Privacy Policy may change.

Without your explicit consent, we will not reduce your rights under this Agreement. We will post any changes to this Agreement on this page.

For major changes, we will notify you on the main exposure page of the product or service, or send you an email or other appropriate means to reach you . If you do not agree to such changes, please stop using Echo Eye products and services immediately.

Major changes referred to in this Agreement include but are not limited to:

Our service model has undergone major changes, such as the purpose of processing personal information, the type of personal information processed, and the way personal information is used;

We have major changes in ownership structure, organizational structure, etc., such as changes in ownership caused by business adjustments, bankruptcy and mergers and acquisitions, etc.;

The main recipients of personal information provided, transferred or disclosed have changed;

There are significant changes in your rights to participate in the processing of personal information and how to exercise them;

When our responsible department for handling personal information security, contact information and complaint channels change;

When the personal information security impact assessment report indicates that there is a high risk.

9. How to Contact Us

The growth of Echo Eye is inseparable from the joint efforts of users from all parties. We are very grateful for your contribution to Echo Eye data updates and usage feedback.

You can contact us by sending an email to fapiaozhuanyong@hsc-tech.cn .

In order to ensure that we handle your issue efficiently and provide you with timely feedback, you are required to submit proof of identity, valid contact information, written request and relevant evidence. We will process your request after verifying your identity.

Appendix: Glossary

Personal information refers to various information related to an identified or identifiable natural person recorded electronically or otherwise, excluding information that has been anonymized. Personal information includes name, date of birth, ID number, personal biometric information, address, communication contact information, communication records and content, account passwords, property information, credit information, whereabouts, accommodation information, health and physiological information, transaction information, etc.

Sensitive personal information refers to personal information that, once leaked or illegally used, may easily cause infringement upon the personal dignity of a natural person or endanger the safety of his or her person or property. It includes information such as biometrics, religious beliefs, specific identities, medical health, financial accounts, whereabouts, and personal information of minors under the age of fourteen.

Device means a device that can be used to use our products and/or services, such as a desktop, tablet or smartphone.

Device information may include the information you use to install and run Echo Eye The device attribute information of the SDK's terminal device (such as hardware model, operating system version and system status, device configuration, international mobile equipment identity code IMEI, international mobile subscriber identity code IMSI, network device hardware address MAC, advertising identifier IDFA, vendor identifier IDFV, mobile device identifier MEID, anonymous device identifier OAID, integrated circuit card identifier ICCID, Android ID, hardware serial number and other device identifiers), device connection information (such as browser type, telecom operator, language used, WIFI information) and device status information (such as device application installation list).

Log information refers to the requests you make when you visit Echo Eye that are automatically recorded by our servers, such as your IP address, browser type and language used, hardware device information, operating system version, network operator information, the date, time and duration of your access to the service, and other information you provide, generate or retain when using our products or services.

Cookie refers to a mechanism that supports the server (or script) to store and retrieve information on the client, and expands the Web-based client/server application by adding simple, persistent client state. The server sends a state message when returning the HTTP object to the client, and the client saves it. The state information describes the valid URL range under this state. After that, all HTTP requests within this range initiated by the client will return the current value of the state information from the client to the server. This state information is called a cookie.

Location information refers to the precise location information obtained through GPS information, WLAN access points, Bluetooth, base stations and other sensor information, and also includes rough geographic location information obtained through IP addresses or other network information.

De-identification refers to the process by which personal information is processed so that it can no longer identify a specific natural person without the aid of additional information.

Anonymization refers to the process of making the subject of personal information unidentifiable and the processed information irreversible through technical processing of personal information. The information obtained after anonymization of personal information does not constitute personal information.

Affiliates refer to Shenzhen Heshengcheng Technology Co., Ltd., the operator of Echo Eye , and other affiliated companies, either singly or collectively. "Affiliates" refers to any subject (including individuals, companies, partnerships, organizations or any other entities), that is, the subject it directly or indirectly controls, or the subject that directly or indirectly controls it, or the subject that is directly or indirectly controlled by the same subject. The aforementioned "control" means that through holding voting rights, contracts or other means, directly or indirectly, the power to instruct or instruct others to give instructions on the management and decision-making of the relevant subject, or other relationships that in fact constitute actual control.

Thank you again for your trust in and use of Echo Eye!

Shenzhen Heshengcheng Technology Co., Ltd.

April 18 , 2025​