User privacy policy(用户隐私协议)

User privacy policy

Updated: October 22, 2023
Effective date: October 22, 2023
If you have any questions, comments or suggestions, please contact us through the following contact information: Email: lihao@zmvr.cn

Thank you for trusting and using Duokai Clone Hidden Master (formerly Hidden Application Master) software. Changsha Zhimeng Experience Technology Co., Ltd. (hereinafter referred to as "we"), as the operator of "Duokai Clone Hidden Master (formerly Hidden Application Master)", We are fully aware of the importance of personal information to you and will do our best to protect the safety and reliability of your personal information. We are committed to maintaining your trust in us and abiding by the following principles to protect your personal information: principle of consistency of rights and responsibilities, principle of clear purpose, principle of choice and consent, principle of minimum necessity, principle of ensuring security, principle of subject participation, principle of openness and transparency, etc.

Special instructions for children’s guardians:

If we learn that your child is under the age of fourteen, we will take special steps to protect your child's personal information we obtain in accordance with this policy. Please help us protect your children's personal information and privacy, require them to read and accept this policy under your supervision, and use our App services and submit personal information with your consent and guidance. If you do not agree with the content of this policy, it may cause our products and services to not operate properly, or fail to achieve the service effects we intend to achieve. You should ask your children to stop accessing/using our App services immediately. By clicking to agree to this policy, you agree to the collection, use, storage and sharing of your child's personal information in accordance with this policy (including updated versions).

Special instructions for children:

If you are a minor under the age of 14, before using our products and services or providing any personal information, please read this "Children's Privacy Protection Policy" carefully with your guardian, and obtain the consent of your guardian before using our products, services or provide information to us. If you click online to agree to this policy, or if you use/continue to use Zhongxiang Education's services or submit personal information, it means that you have obtained your guardian's permission, and your guardian has agreed to our collection and use in accordance with this privacy policy. , store and protect your relevant personal information.

 

1. How we collect and use information

In order to better provide you with the services/functions of our products, when you use our services/functions, after you agree to this privacy policy, we will invite you based on business functions, operational security, network security and other needs. Become our registered user and you can use it directly without registering. During use, we may collect the following information from you:

In order to ensure the security of your account, system operation security and product operation risk control, with your authorization we will collect the following device information from you: device information (including device model, device MAC address, device unique identifier (IMEI, Android ID, IDFA) , IDFV, OpenUDID, GUID, IMSI, CCID, hardware device serial number), operating system version, resolution, telecom operator, device settings, installed or in-process application information.

When you register or log in to this website through a third-party account, we may collect your nickname, avatar, etc.;
Personal information about you may be obtained from third parties or business partners through legal means;
In order for you to use our services normally, we will collect certain log, behavior, device, and diagnostic information from the mobile phones, tablets, and other devices (hereinafter referred to as "devices") through which you access the application. Such information may include:
3.1 Network log information. When you use our products and services, we may collect certain information through logs or certain program software. Such information may include: detailed usage of products and services, such as the opening time of your application, duration of use, page addresses visited, etc.; device event information, such as crashes, system activities, etc.; IP address, etc., used to monitor your application. Optimize your equipment and improve our services;

3.2 Your device information. In order for you to use our services normally, we will collect your relevant device information, which may include:

3.2.1 Device attributes: information such as the brand, model, operating system, network connection status, software version, storage space, browser type, application and file names and types, plug-ins and other information of your mobile device, used to determine whether the user is currently 4G environment, reminding network environment changes to avoid consuming user traffic, and intelligently identifying whether the accessed WiFi network is safe, etc.;

3.2.2 Device serial number or other device identifier: such as International Mobile Equipment Identity IMEI, network device hardware address, unique identity identifier, etc.;

3.2.3 Device signal: the network status, signal strength, Bluetooth status, WIFI access point information, etc. of the device you use;

3.2.4 Location information: We may use GPS, WiFi or other technical methods to collect and process information about your location for updating local information, providing content services, etc.;

For the more sensitive personal information among the above information, such as user IMEI number and GPS location information, we will obtain your consent before collecting it. For some non-sensitive information, the collection may be by default and automatically. You can limit our collection of relevant information from your mobile device or the use of specific permissions by adjusting the "Settings" options of your mobile device. When you restrict our access to a certain permission, we may not be able to continue to provide you with corresponding services, and we may no longer process your corresponding information.

We will not collect sensitive personal information such as your ID number, personal biometric information, bank account number, property information, credit information, health and physiological information, album pictures, etc.
At the same time, we promise that we will take corresponding security protection measures to protect your personal information in accordance with mature security standards in the industry. Please read carefully and understand the relevant personal information protection policies in this Privacy Policy before using our products or services. [Special Tip] Please read and understand this privacy policy carefully before using our products or services, especially the terms marked in bold and underlined. You should read them carefully and use our products after confirming that you fully understand and agree. or services. Once you start using our products or services, it means that you have fully understood and agreed to this policy, and agree that we collect, use, store and share your relevant information in accordance with this privacy policy. If you have any questions, comments or suggestions about the content of this policy, you can contact us through the various contact methods provided in this privacy policy.

This policy will help you understand the following:

Our rules and principles for collecting and using personal information
How we protect your personal information
How we store your personal information
your rights
How we process children's personal information
How your personal information is transferred globally
How to update this policy
How to contact us
2. Our rules and principles for the collection and use of personal information

1. Provide you with the core functions of multiple clone hidden master (original hidden application master)

(1) The display of the application can be hidden. To help you find the apps you want to hide and use the app hiding feature, we display a list of apps installed on your phone. In order to get this list, we need to get the device's app installation list information. When using the add app function on devices with Android 11 and above, you will be prompted to authorize permission to read the app installation list. You can turn off the permission to read the application list through the local "Settings -> Permission Management -> Open Multiple Avatar Hidden Master (formerly Hidden App Master)" on your phone.

(2) Message notification. In order to push real-time messages or event push messages from third-party applications to you, we will use the system notification function of your device. We will prompt you with the authorization message notification function when you use Dual Avatar Hidden Master (original Hidden Application Master). You can turn off the message notification permission in the local "Settings -> Permission Management -> Open Multiple Avatar Hidden Master (formerly Hidden App Master)" on your phone.

(3) Start the password lock. You can turn on and set the digital password lock for you to enter the multi-open clone hidden master (formerly hidden application master) through the "Home Page - Startup Password" function. When starting the system password unlocking, the software only calls the local password unlocking system of the phone to complete the verification, and returns the verification results to Duokai Clone Hidden Master (former Hidden Application Master). We will not read your password information. You can modify the startup password lock through "My->Modify startup password".

(4) Private photo album and video functions. You can import pictures and videos from your mobile phone into Duokai Hide Master (original Hide App Master) through private photo albums and video functions. In order for you to freely import and export files, we need storage permissions on your phone. You can turn off storage permissions through "Settings->Permission Management->Open Multiple Avatar Hidden Master (formerly Hidden Application Master)". The above information will only be processed locally and will not be uploaded to our servers.

(6) Use of third-party applications. In order to ensure the normal use of third-party application functions, you can choose whether to enable the following permissions.

l Camera permission: This permission can be used for third-party applications to upload, take photos/pictures/videos, scan QR codes, modify avatar pictures, etc.

l Address book permission: This permission can be used by third-party applications to obtain your address book friend information, so that you can query friend status, share content, backup address books and call records in the application and other functions.

l Microphone permission: Provide this permission for third-party applications to use the voice function, record videos, or make voice/video calls.

l Location permission: Providing this permission can be used by third-party applications to obtain your location information, communicate with nearby people, or provide content for the application.

l Calendar permission: This permission can be used by third-party applications to enable functions such as calendar reminders and scheduled message notifications.

l Call record permission: used by third-party applications to make and receive calls.

l Phone permissions: Used by third-party applications to ensure account and usage security.

l SMS permission: used for third-party applications to log in through SMS verification codes.

Duokai Clone Hidden Master (formerly Hidden Application Master) will not collect the information provided in the above permissions and will only provide it to third-party applications for use. You can turn off the above permissions through the local "Settings->Permission Management->Open Multiple Avatar Hidden Master (formerly Hidden App Master)" on your phone.

When you turn on any permission, you authorize the third-party application to collect and use relevant information to provide you with corresponding services. Once you turn off any permission, you cancel the authorization, and the third-party application will no longer continue to collect and use relevant information based on the corresponding permission. Using relevant information, we cannot provide you with services corresponding to this permission. However, your decision to turn off permissions will not affect the previous collection and use of information based on your authorization. Please refer to the "Device Permission Call List" for details.

What personal information we collect about you
The business functions we provide rely on some information to function. When you choose to use the relevant business functions of this software, the necessary information you need to provide us or allow us to collect includes:

(1) [Account ID, avatar, nickname for third-party authorized login]: In order to be able to record user membership information normally;

(2) [Third-party payment order number]: In order to record user payment information normally;

(3) [MAC Address]: Our integrated WeChat login SDK will collect your MAC address for payment and data statistics related services. For details, please see the "Third-party SDK section we access". This software will not collect it directly. your MAC address;

(4) [ANDROID ID]: Our integrated WeChat login SDK will collect your ANDROID ID in the foreground and background/silent state for payment and data statistics related services. For details, please see "The third-party SDK we have access to". This software will not directly collect your ANDROID ID address;

(5) [IMEI Unique Identification]: Our integrated WeChat login SDK will collect your IMEI unique identification for statistical analysis services and advertising display services. For details, please see "The Third-Party SDK Part of Our Access". This software does not Your IMEI will be collected directly;

(6) [Software List]: When you import the application you want to hide, you need to obtain the list of installed software on your phone, otherwise the software will not be imported normally;

When you use the relevant business functions of our software, our APP will apply to you for the following system permissions related to personal information:

(1) [Storage Permission]: The purpose is to hide the application normally and to hide the photo album to save photos. We will not collect any personal information related to this permission;

(2) [Camera Permission]: It is intended to be used when you use the photo and video functions in the "Hidden Album" function. If you do not authorize it, we will be unable to provide this business function, and we will not collect this permission. any relevant personal information;

(3) [Recording Permission]: It is intended to be used when you use the video recording function in the "Hidden Album" function. If you do not authorize it, we will be unable to provide this business function, and we will not collect information related to this permission. any personal information;

(4) [Read Contacts]: The purpose is to facilitate users to quickly select contacts when sharing or registering;

If you do not authorize the corresponding permissions, the application functions involved in the permissions may not be available. In addition to the above permissions, you can choose whether to grant other system permissions to the App.

The third-party SDKs we access and the personal information they may collect and their uses:

In order to ensure the realization of App-related functions and the safe and stable operation of the application, as well as provide better services and support advertising display, the third-party SDKs connected are as follows:

(1) WeChat login SDK:

Provided by Tencent, it will obtain your WeChat nickname, avatar, third-party authorized unique identification, your WeChat login status and whether WeChat is installed, in order to ensure your normal WeChat login process.

Purpose of use: Use WeChat account to log in to news products and/or services, help users share content to WeChat client

Information types: registration data and login data. Your name, username, mobile phone number, password, gender and IP address

Company Name: Shenzhen Tencent Computer Systems Co., Ltd.

Official website link: https://open.weixin.qq.com/

Service Agreement: https://open.weixin.qq.com/cgi-bin/frame?t=news/protocol_developer_tmpl

(2)Alipay SDK-Alipay (Hangzhou) Information Technology Co., Ltd.

Information sharing: User device information (local Mac address, BSSID, SSID, SIM card serial number, hardware serial number (Build.Serial), device screen density, Android ID, IMEI, IMSI, network information (network type (such as Wi- FI, 3G, 4G), current connection Wi-Fi information, operator name), application data (access to external memory card)