"Pikez" refers to the products developed by Ltd. (hereinafter referred to as "us").

As operators of "Pikez", we fully understand the importance of personal information to you. We will protect your personal information and privacy security in accordance with laws and regulations. We have formulated this privacy policy and specifically remind you to carefully read and understand this privacy policy before using Pikez Bluetooth earphones and related services in order to make appropriate choices.

Summary

We will introduce to you through our privacy policy how we handle personal information in different scenarios. When you enable or use "Pikez", in order to achieve the functions and services you choose to use, or to comply with legal and regulatory requirements, we will process relevant information. In addition to implementing "Pikez", you may refuse our application for basic functions, information, and permissions required for services, but this may result in us being unable to provide corresponding functions and services. We will explain the relevant situation item by item in our privacy policy. When you use our products and/or services, or continue to use them after this policy update, it is deemed that you have read, understood, and agreed to this policy and its updated version. If you do not agree to any terms of this policy, you have the right to immediately stop using our products and/or services.

1. What personal information will we collect about using your device

Collect and use your personal information for the purposes described below, as required by product functionality. We will follow the principles of legality, legitimacy, and necessity.

The personal information you voluntarily provide during the process of providing services and/or using products to you.

1.1 In order to achieve our basic business functions, you only need to provide us with the storage and device information corresponding to that function, unless there are special requirements in relevant laws, regulations, and normative documents. If you refuse to provide it, we will not be able to provide you with the corresponding services.

1.1.1 When pairing and connecting this software with Bluetooth earphones, we will collect your Bluetooth earphone SN number and Mac address by enabling Bluetooth permission and accessing precise location permission (Android) with your consent. After completing the pairing connection, we will only transmit data through Bluetooth when you actively activate the call transcription, recording, voice dialing, and audio delivery functions within this software. If you refuse to enable Bluetooth and access precise location permissions, this software will not be able to connect to your PIKEZ app, and you will not be able to use the basic functions of this software.

1.1.2 After obtaining your consent and enabling access to storage, we will save your Pikez Bluetooth earphone SN number and Mac address so that you can pair and connect the earphones normally. If you refuse to enable access to storage, the software will not be able to connect to your Pikez Bluetooth earphones, and you will not be able to use the basic functions of this software.

1.1.3 When you provide feedback, complaints, or inquiries to our customer service regarding related issues, in order to help you solve the problem or record the handling plan and results of the relevant issues, with your consent to enable camera permissions, you need to provide us with corresponding proof materials (pictures or videos). The system may record communication records between you and customer service, in order to better help you solve the problems you are inquiring about and improve customer service quality. If you do not provide the above information, we may not be able to provide you with timely feedback on the consultation results, but it does not affect your normal use of Pikez products and/or services.

1.1.4 The above services require you to enable access permissions for your camera, album, microphone, contact book, call records, and message notifications on your device, in order to collect and use the information involved in these permissions. You can check the status of the above permissions one by one in your device settings or our client "My Settings Privacy System Permissions", and you can decide whether these permissions can be turned on or off at any time.

Please note that by enabling any permission, you agree to authorize us to collect and use relevant personal information to provide you with corresponding services. Once you close any permission, it means that you have cancelled the authorization. We will no longer continue to collect and use relevant personal information based on the corresponding permission, nor can we continue to provide you with services corresponding to changing the permission. Your decision to close permissions will not affect the collection and use of information previously provided based on your authorization.

1.2 We proactively collect personal information during the process of providing you with products and/or services. We attach great importance to protecting the personal information of users ("you") and hope to provide you with a brief introduction to how we collect, use, and protect your personal information through this summary. Under the premise of complying with laws and regulations, in order to ensure the security of your account and better provide you with high-quality services, we will collect and use the following information generated during your use of Pikez products and/or services:

1.2.1 Device Information
When you use Pikez products and/or services, to ensure the security of your account and usage, we may receive and record your relevant device information based on your specific permissions during software installation and use, including phone hardware model, phone system information, phone screen information, operating system information, PIKEZ App installation information, IMEI, DFV (iOS), CCID (Android), IMSI (Android) unique device identification code (Android ID/IDFA/OPENUDID/GUID), headphone SN number, and Mac address.

1.2.2 Log Information
When you use Pikez products and/or services, we may automatically collect (including in the background running state) your detailed usage of our services as relevant network logs, including PIKEZ App startup and login IP information, call transfer records, device model information, exit information, operating system information, so that we can calculate the usage of Pikez products and/or services and optimize them, to provide you with a better service experience. Please note that individual intelligent device information and log information are information that cannot identify a specific natural person.

2. How do we use cookies and similar technology

2.1 About Cookies and Similar Technologies

2.1.1 Cookies are a mechanism that supports server-side (or script) storage and retrieval of information on websites or clients and are a commonly used technology in the Internet. Cookie-like technologies are other technologies that can be used for cookie-like purposes, such as Beacon, website beacons, and embedded scripts. At present, we will place secure cookies and website beacons in the software to collect your information, with the aim of collecting and using your information through cookies and storing it as log information. We use our own cookies to provide you with a more personalized user experience and services, and for the following purposes:

2.1.2 Remember your identity. For example, cookies help us identify you as our registered user, or save information you provide us about your preferences or other information.

2.1.3 Analyze your use of our services. For example, we can use cookies to learn about your use of our services for what activities, or which web pages or services are most popular with you.

2.2 Our commitment to the use of cookies and similar technologies: We promise that the research on cookies and related technologies collected by PIKEZ will only be used for the purpose of improving service/product quality and optimizing user experience, and we will not use them for any purpose other than those stated in this policy. In addition, for third-party service providers who integrate their services into our products or services, if they also collect your personal information through cookies and similar technologies, we will make every commercial effort to constrain them to comply with the requirements of cookies and related technology applications under this policy.

3. How do we delegate, share, transfer, and publicly disclose your personal information.

3.1 Entrusted processing

We may entrust authorized partners to process your personal information, in order to authorize partners to provide you with certain services or implement specific functions within the authorized scope on our behalf. We will entrust the processing of your information for the legitimate, legitimate, necessary, specific, and clear purposes stated in this policy statement. At the same time, we will clarify the purpose, deadline, processing method, and type of personal information entrusted for processing through a written agreement, and agree with authorized partners on strict data protection measures to process personal information in accordance with this policy and the written agreement, and supervise the personal information processing activities of authorized partners. If authorized partners use your information for processing purposes that we have not delegated, they will separately obtain your consent.

In addition, when authorized partners provide processing of entrusted information through embedded SDKs or other similar applications, we will conduct strict security checks on the application program interfaces (APIs) and software tool development kits (SDKs) used by authorized partners to obtain relevant information, ensuring that they receive and use entrusted information within the agreed scope.

3.2 Sharing

We promise to only share your personal information with third parties for legitimate, legitimate, necessary, specific, and clear purposes, and only share personal information necessary to achieve the relevant purpose. At the same time, we will also carry out third-party management through strict access, confidentiality agreements, audits, and supervision, and require them to handle relevant information with confidentiality and security measures not lower than those required by this policy.

We will not share your personal information externally, except for the following situations:

3.2.1 Obtain your or your guardian's explicit consent: After obtaining your or your guardian's explicit consent, we will share your personal information with other parties.

3.2.2 Sharing necessary for fulfilling legal obligations: We may share your personal information in accordance with laws and regulations, as necessary for litigation and dispute resolution, or as required by judicial, administrative, and other competent authorities in accordance with the law, as well as other legal obligations.

3.2.3 Sharing with our affiliated companies: We will only share necessary personal information and are bound by the purposes stated in this policy. If we share your sensitive personal information or if our affiliated companies change the purpose of using and processing personal information, we will seek your authorization again. We promise that we will only share necessary personal information, and this sharing is subject to the purpose of this policy. At the same time, we will ensure security through various measures, including legal documents between affiliated companies, internal systems, and employee permission isolation.

3.2.4 According to the relevant service agreements, usage rules, and sharing with our partners for the purpose of providing services to you between you and PIKEZ: the specific information depends on the products or services you purchase through various PIKEZ software, as well as the cloud services and/or value-added services you choose to enable.

Please note that the shared party may have its own independent privacy policy or related statements. We suggest that you carefully review them before making relevant authorizations and make the choices you consider appropriate.

3.3 Transference

With the development of our business, we and our affiliates may engage in mergers, acquisitions, restructurings, asset transfers, or similar transactions. If the transfer of personal information is involved, we will require the company or organization that received your personal information to continue to be bound by this privacy policy. Otherwise, we will require the company or organization to seek your authorization and consent again. Except for the above situations, we will not transfer your personal information without your explicit consent.

3.3.1 Transfer with explicit consent.

3.3.2 Transfer in accordance with applicable laws and regulations, legal procedures, and mandatory administrative or judicial requirements.

3.3.3 In the event of a merger, acquisition, or bankruptcy liquidation involving the service provider of this product, or any other merger, acquisition, or bankruptcy liquidation involving the transfer of personal information, we will require the new company or organization holding your personal information to continue to be bound by this policy. Otherwise, we will require the company, organization, and individual to seek authorization and consent from you again.

3.4 Public Disclosure

We will only publicly disclose your personal information in the following circumstances:

3.4.1 With your explicit consent or based on your proactive choice, we may publicly disclose your personal information.

3.4.2 Disclosure based on law: In cases where required by law, legal proceedings, litigation, or government regulatory authorities, or in order to protect the personal and property safety of users or the public from infringement, we may publicly disclose personal information related to your illegal or breach of contract within the scope specified in the legal documents of administrative, judicial, and other functional departments.

3.5 Exceptions to obtaining prior authorization and consent when sharing, transferring, or publicly disclosing personal information.

In the following situations, we do not need your authorized consent to share, transfer, or publicly disclose your personal information:

3.5.1 Related to the fulfillment of obligations stipulated by laws and regulations by Pikez.

3.5.2 Directly related to national security and national defense security.

3.5.3 Directly related to public safety, public health, and major public interests.

3.5.4 Directly related to criminal investigation, prosecution, trial, and execution of judgments.

3.5.5 For the purpose of safeguarding your or other individuals' significant legitimate rights and interests such as life and property, but it is difficult to obtain your consent.

3.5.6 Personal information that you disclose to the public on your own.

3.5.7 Collecting personal information from legally disclosed information, such as legitimate news reports, government information disclosure, and other channels.

4. How do we protect your personal information

4.1 We attach great importance to the privacy and personal information protection of users and will also take reasonable measures to protect their personal information. Unless otherwise stipulated by laws and regulations or this policy, we will not disclose or disclose user personal information to third parties without the user's permission and will use professional encrypted storage and transmission methods to ensure the security of user personal information.

4.1.1 We will use various security technologies and procedures to establish a comprehensive management system to protect your personal information from unauthorized access, use, or disclosure.

4.1.2 According to relevant laws and regulations, collecting your personal information does not require your authorized consent in the following situations:

4.2 You understand and agree that, without disclosing individual user privacy information, we have the right to conduct technical analysis of the entire user database. Only the user data that has been analyzed and organized to achieve anonymization can be commercially utilized.

5. How do we store your personal information

In principle, the personal information we collect and generate within the territory of the People's Republic of China is stored within the territory of the People's Republic of China and will not be transmitted across borders.

5.1 How do we store information

5.1.1 Geography where information is stored We comply with laws and regulations, and the information and materials collected about you will be stored on our servers in mainland China. We will not transmit your personal information overseas unless it is in compliance with regulatory requirements or with your explicit consent. Except for the following situations:

5.1.2 Period for storing information Generally speaking, we will retain your personal information for the shortest period of time necessary to achieve the purposes stated in this policy during your use of Royal Listening products and/or services, unless otherwise specified by applicable laws, regulations, or national regulatory documents.

After the above deadline is exceeded or you voluntarily request the deletion of your personal information, we will delete your personal information as soon as possible in accordance with applicable laws and regulations, unless applicable laws and regulations or national regulatory documents require the retention of this information for a longer period of time. However, in the following circumstances, we may change the storage time of personal information to comply with legal requirements:

6. How do you achieve the right to manage your personal information

In accordance with relevant Chinese laws, regulations, standards, and common practices in other countries and regions, we guarantee that you exercise the following rights regarding your personal information. You can refer to the following steps for relevant operations:

6.1 You have the right to access, correct, and delete your personal information, except for exceptions specified by laws and regulations. You can manage your information in the following ways: Delete the tag information you created. Yuting only stores the device parameter information you created during use. You can delete it by clicking "More" on the "Control" page of the app and entering the tag management page.

6.2 Respond to your above request We will take appropriate technical measures to ensure that you can query, supplement, correct, or delete your personal information, or apply for us to supplement, correct, or delete relevant information through feedback or complaint channels released by our products and/or services;

After receiving your application, we will process it according to the process. To ensure security, we may first request you to verify your identity. We need you to provide your account (phone number) and SMS verification code. After successful verification, we will process your request and provide a response within 15 working days. In principle, we will not charge any fees for your reasonable requests. However, for repeated requests that exceed reasonable limits, we will charge a certain cost according to the situation.

For requests that are unfounded, require excessive technical means (such as developing new systems or fundamentally changing existing practices), pose risks to the legitimate rights and interests of others, or are highly impractical (such as involving information stored on backup tapes), we may refuse them.

If you are unable to access, correct, or delete your personal information, or if you need to access, correct, or delete other personal information generated during your use of PIKEZ, or if you believe that we violate any laws and regulations or have any agreements with you regarding the collection or use of personal information, you can contact us through the official feedback channels of the relevant products or services publicly announced by us.

Please be aware that we will not be able to respond to your request in the following situations:

7. How do we protect the personal information of minors

We attach great importance to the protection of personal information of minors. We do not rely on age recognition when providing products or services to users, but the nature of our products and/or services requires that you be an adult with full civil capacity. If you are a minor, we request that you ask your parents or other guardians to carefully read this privacy policy and use our services or provide information to us with the consent and supervision of your parents or other guardians.

If you collect or submit personal information of minors to us through our products and/or services for the purpose of interacting with children, please ensure that you have obtained the authorization and consent of their legal guardian in advance.

7.1 We protect the personal information of minors in accordance with relevant national laws and regulations. Although local laws and customs have different definitions of minors, we consider anyone under the age of 18 to be a minor. According to relevant laws and regulations, if you are a minor, you should be accompanied by your guardian to read this policy and obtain written consent from your guardian before registering, logging in, and using Royal Listening products and/or services. If you are the guardian of a minor, if you have any questions about the personal information of the minor under your guardianship, please contact us through the contact method mentioned in Article 10.

7.2 For the personal information of children under the age of 14 who may be involved, we further take the following measures to protect it:

7.2.1 For the collected personal information of children, in addition to complying with the provisions of this policy regarding user personal information, we will also adhere to the principles of legitimate necessity, informed consent, clear purpose, security protection, and lawful use, and strictly follow the requirements of laws and regulations such as the "Regulations on the Network Protection of Children's Personal Information" for storage, use, and disclosure, and will not exceed the period necessary to achieve the purpose of collection and use. After the expiration, we will delete or anonymize the personal information of children. We will also establish an internal specialized system for the protection of children's personal information, and designate a dedicated person to be responsible for the protection of children's personal information.

7.2.2 When you, as a guardian, choose to use Royal Listening related services for the child under guardianship, we may need to collect personal information of the child under guardianship from you for the necessary performance of related services. If personal information about children needs to be collected from you in specific services, we will obtain your authorization and consent in advance and inform you of the purpose and purpose of the collection. If you do not provide the aforementioned information, you will not be able to enjoy the relevant services we provide. As a guardian, you should correctly fulfill your guardianship responsibilities and protect the security of children's personal information. If children themselves need to register or use our products and/or services, you should provide proper guidance and supervision.

7.2.3 Children or their guardians have the right to access and correct their personal information at any time and can also request correction and deletion from us. If you have any opinions, suggestions, complaints or reports regarding children's personal information, please contact us through the methods mentioned in Article 10, and we will delete the relevant data according to your request. In addition, if we discover that we have collected personal information about children without obtaining verifiable parental consent in advance, we will also try to delete the relevant data as soon as possible.

8. How do we update this policy

8.1 In order to provide you with better services, our products and/or services will be updated and changed from time to time. We will revise this policy from time to time, and these revisions form a part of this policy. However, without your explicit consent, we will not reduce your rights under this policy.

8.2 After the update of this policy, we will issue an updated version on PIKEZ, and remind you to read the updated privacy policy again through the application market's new version feature announcement or popup window, so that you can keep up with the latest version of this policy in a timely manner. If you do not agree with this policy, or have objections to the modifications or updates to this policy, you can choose to stop using our products and/or services or cancel your PIKEZ account. However, please be aware that your behavior and activities prior to account cancellation and cessation of use of this service are still subject to this policy.

The significant changes referred to in this policy include but are not limited to:

9. How to contact us

To better protect your personal information, we have established a dedicated network security and personal information protection department. If you have any questions or suggestions regarding this policy or your personal information during the use of Royal Listening, please contact us through the following contact information:

Normally, we will reply within 15 days. If you are not satisfied with our response, especially if you believe that our personal information processing behavior has harmed your legitimate rights and interests, and we are unable to provide you with a satisfactory response and refuse to improve after you provide feedback to us, you can file a complaint and report to the relevant regulatory authorities.

10. Other

Any disputes related to this policy shall be resolved through friendly consultation between both parties. If it cannot be resolved through negotiation, you hereby agree to file a lawsuit with the Shenzhen Municipal People's Court.

If any court with jurisdiction determines or determines that any provision of this policy is invalid, that provision will be removed from this policy, but the invalidity of that provision does not affect the validity of the remaining provisions of this policy. The remaining provisions of this policy will continue to be implemented.